var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F56%2F2713.bib&jsonp=1&noBootstrap=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F56%2F2713.bib&jsonp=1&noBootstrap=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdblp.org%2Fpid%2F56%2F2713.bib&jsonp=1&noBootstrap=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Stimulated Microcontroller Dataset for New IoT Device Identification Schemes through On-Chip Sensor Monitoring.\n \n \n \n \n\n\n \n Ramos, A.; Martín, H.; Camara, C.; and Peris-Lopez, P.\n\n\n \n\n\n\n Data, 9(5): 62. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"StimulatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/data/RamosMCP24,\n  author       = {Alberto Ramos and\n                  Honorio Mart{\\'{\\i}}n and\n                  Carmen Camara and\n                  Pedro Peris{-}Lopez},\n  title        = {Stimulated Microcontroller Dataset for New IoT Device Identification\n                  Schemes through On-Chip Sensor Monitoring},\n  journal      = {Data},\n  volume       = {9},\n  number       = {5},\n  pages        = {62},\n  year         = {2024},\n  url          = {https://doi.org/10.3390/data9050062},\n  doi          = {10.3390/DATA9050062},\n  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/data/RamosMCP24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploring the power of photoplethysmogram matrix for atrial fibrillation detection with integrated explainability.\n \n \n \n \n\n\n \n Fuster-Barceló, C.; Guerrero-López, A.; Camara, C.; and Peris-Lopez, P.\n\n\n \n\n\n\n Eng. Appl. Artif. Intell., 133: 108325. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"ExploringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eaai/FusterBarceloGCP24,\n  author       = {Caterina Fuster{-}Barcel{\\'{o}} and\n                  Alejandro Guerrero{-}L{\\'{o}}pez and\n                  Carmen Camara and\n                  Pedro Peris{-}Lopez},\n  title        = {Exploring the power of photoplethysmogram matrix for atrial fibrillation\n                  detection with integrated explainability},\n  journal      = {Eng. Appl. Artif. Intell.},\n  volume       = {133},\n  pages        = {108325},\n  year         = {2024},\n  url          = {https://doi.org/10.1016/j.engappai.2024.108325},\n  doi          = {10.1016/J.ENGAPPAI.2024.108325},\n  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eaai/FusterBarceloGCP24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; Safkhani, M.; and Bagheri, N.\n\n\n \n\n\n\n Sensors, 23(2): 937. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"ECGPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/CamaraPSB23,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Masoumeh Safkhani and\n                  Nasour Bagheri},\n  title        = {{ECG} Identification Based on the Gramian Angular Field and Tested\n                  with Individuals in Resting and Activity States},\n  journal      = {Sensors},\n  volume       = {23},\n  number       = {2},\n  pages        = {937},\n  year         = {2023},\n  url          = {https://doi.org/10.3390/s23020937},\n  doi          = {10.3390/S23020937},\n  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/CamaraPSB23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Fuster-Barceló, C.; Camara, C.; and Martín, H.\n\n\n \n\n\n\n In 19th IEEE International Conference on Body Sensor Networks, BSN 2023, Boston, MA, USA, October 9-11, 2023, pages 1–4, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/bsn/PerisLopezFCM23,\n  author       = {Pedro Peris{-}Lopez and\n                  Caterina Fuster{-}Barcel{\\'{o}} and\n                  Carmen Camara and\n                  Honorio Mart{\\'{\\i}}n},\n  title        = {Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces\n                  for Atrial Fibrillation Detection},\n  booktitle    = {19th {IEEE} International Conference on Body Sensor Networks, {BSN}\n                  2023, Boston, MA, USA, October 9-11, 2023},\n  pages        = {1--4},\n  publisher    = {{IEEE}},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/BSN58485.2023.10331002},\n  doi          = {10.1109/BSN58485.2023.10331002},\n  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/bsn/PerisLopezFCM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Unleashing the Power of Electrocardiograms: A novel approach for Patient Identification in Healthcare Systems with ECG Signals.\n \n \n \n \n\n\n \n Fuster-Barceló, C.; Camara, C.; and Peris-López, P.\n\n\n \n\n\n\n CoRR, abs/2302.06529. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"UnleashingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2302-06529,\n  author       = {Caterina Fuster{-}Barcel{\\'{o}} and\n                  Carmen Camara and\n                  Pedro Peris{-}L{\\'{o}}pez},\n  title        = {Unleashing the Power of Electrocardiograms: {A} novel approach for\n                  Patient Identification in Healthcare Systems with {ECG} Signals},\n  journal      = {CoRR},\n  volume       = {abs/2302.06529},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2302.06529},\n  doi          = {10.48550/ARXIV.2302.06529},\n  eprinttype    = {arXiv},\n  eprint       = {2302.06529},\n  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-06529.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ECGsound for human identification.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; Safkhani, M.; and Bagheri, N.\n\n\n \n\n\n\n Biomed. Signal Process. Control., 72(Part): 103335. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ECGsoundPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/bspc/CamaraPSB22,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Masoumeh Safkhani and\n                  Nasour Bagheri},\n  title        = {ECGsound for human identification},\n  journal      = {Biomed. Signal Process. Control.},\n  volume       = {72},\n  number       = {Part},\n  pages        = {103335},\n  year         = {2022},\n  url          = {https://doi.org/10.1016/j.bspc.2021.103335},\n  doi          = {10.1016/J.BSPC.2021.103335},\n  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/bspc/CamaraPSB22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks.\n \n \n \n \n\n\n \n Fuster-Barceló, C.; Peris-Lopez, P.; and Camara, C.\n\n\n \n\n\n\n Neurocomputing, 506: 37–49. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ELEKTRA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijon/Fuster-BarceloP22,\n  author       = {Caterina Fuster{-}Barcel{\\'{o}} and\n                  Pedro Peris{-}Lopez and\n                  Carmen Camara},\n  title        = {{ELEKTRA:} ELEKTRokardiomatrix application to biometric identification\n                  with convolutional neural networks},\n  journal      = {Neurocomputing},\n  volume       = {506},\n  pages        = {37--49},\n  year         = {2022},\n  url          = {https://doi.org/10.1016/j.neucom.2022.07.059},\n  doi          = {10.1016/J.NEUCOM.2022.07.059},\n  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijon/Fuster-BarceloP22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Challenging the security of \"A PUF-based hardware mutual authentication protocol\".\n \n \n \n \n\n\n \n Adeli, M.; Bagheri, N.; Martín, H.; and Peris-Lopez, P.\n\n\n \n\n\n\n J. Parallel Distributed Comput., 169: 199–210. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"ChallengingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jpdc/AdeliBMP22,\n  author       = {Morteza Adeli and\n                  Nasour Bagheri and\n                  Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez},\n  title        = {Challenging the security of "A PUF-based hardware mutual authentication\n                  protocol"},\n  journal      = {J. Parallel Distributed Comput.},\n  volume       = {169},\n  pages        = {199--210},\n  year         = {2022},\n  url          = {https://doi.org/10.1016/j.jpdc.2022.06.018},\n  doi          = {10.1016/J.JPDC.2022.06.018},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jpdc/AdeliBMP22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices.\n \n \n \n \n\n\n \n Bagheri, N.; Kumari, S.; Camara, C.; and Peris-Lopez, P.\n\n\n \n\n\n\n IEEE Syst. J., 16(3): 4501–4512. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"DefendingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sj/BagheriKCP22,\n  author       = {Nasour Bagheri and\n                  Saru Kumari and\n                  Carmen Camara and\n                  Pedro Peris{-}Lopez},\n  title        = {Defending Industry 4.0: An Enhanced Authentication Scheme for IoT\n                  Devices},\n  journal      = {{IEEE} Syst. J.},\n  volume       = {16},\n  number       = {3},\n  pages        = {4501--4512},\n  year         = {2022},\n  url          = {https://doi.org/10.1109/JSYST.2021.3131689},\n  doi          = {10.1109/JSYST.2021.3131689},\n  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sj/BagheriKCP22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generation and Classification of Illicit Bitcoin Transactions.\n \n \n \n \n\n\n \n de Juan Fidalgo, P.; Camara, C.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Bravo, J.; Ochoa, S. F.; and Favela, J., editor(s), Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, UCAmI 2022, Córdoba, Spain, 29 November - 2 December 2022, volume 594, of Lecture Notes in Networks and Systems, pages 1086–1097, 2022. Springer\n \n\n\n\n
\n\n\n\n \n \n \"GenerationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ucami/FidalgoCP22,\n  author       = {Pablo de Juan Fidalgo and\n                  Carmen Camara and\n                  Pedro Peris{-}Lopez},\n  editor       = {Jos{\\'{e}} Bravo and\n                  Sergio F. Ochoa and\n                  Jes{\\'{u}}s Favela},\n  title        = {Generation and Classification of Illicit Bitcoin Transactions},\n  booktitle    = {Proceedings of the International Conference on Ubiquitous Computing\n                  {\\&} Ambient Intelligence, UCAmI 2022, C{\\'{o}}rdoba, Spain, 29 November\n                  - 2 December 2022},\n  series       = {Lecture Notes in Networks and Systems},\n  volume       = {594},\n  pages        = {1086--1097},\n  publisher    = {Springer},\n  year         = {2022},\n  url          = {https://doi.org/10.1007/978-3-031-21333-5\\_108},\n  doi          = {10.1007/978-3-031-21333-5\\_108},\n  timestamp    = {Mon, 28 Nov 2022 10:41:25 +0100},\n  biburl       = {https://dblp.org/rec/conf/ucami/FidalgoCP22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Access Control for Implantable Medical Devices.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; de Fuentes, J. M.; and Marchal, S.\n\n\n \n\n\n\n IEEE Trans. Emerg. Top. Comput., 9(3): 1126–1138. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"AccessPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tetc/CamaraPFM21,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Samuel Marchal},\n  title        = {Access Control for Implantable Medical Devices},\n  journal      = {{IEEE} Trans. Emerg. Top. Comput.},\n  volume       = {9},\n  number       = {3},\n  pages        = {1126--1138},\n  year         = {2021},\n  url          = {https://doi.org/10.1109/TETC.2020.2982461},\n  doi          = {10.1109/TETC.2020.2982461},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tetc/CamaraPFM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing.\n \n \n \n \n\n\n \n Safkhani, M.; Camara, C.; Peris-Lopez, P.; and Bagheri, N.\n\n\n \n\n\n\n Veh. Commun., 28: 100311. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"RSEAP2:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/vcomm/SafkhaniCPB21,\n  author       = {Masoumeh Safkhani and\n                  Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Nasour Bagheri},\n  title        = {{RSEAP2:} An enhanced version of RSEAP, an {RFID} based authentication\n                  protocol for vehicular cloud computing},\n  journal      = {Veh. Commun.},\n  volume       = {28},\n  pages        = {100311},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.vehcom.2020.100311},\n  doi          = {10.1016/J.VEHCOM.2020.100311},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/vcomm/SafkhaniCPB21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange.\n \n \n \n \n\n\n \n Salimi, M.; Mala, H.; Martín, H.; and Peris-Lopez, P.\n\n\n \n\n\n\n CoRR, abs/2103.06170. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Full-ResilientPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2103-06170,\n  author       = {Majid Salimi and\n                  Hamid Mala and\n                  Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez},\n  title        = {Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange},\n  journal      = {CoRR},\n  volume       = {abs/2103.06170},\n  year         = {2021},\n  url          = {https://arxiv.org/abs/2103.06170},\n  eprinttype    = {arXiv},\n  eprint       = {2103.06170},\n  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-06170.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange.\n \n \n \n \n\n\n \n Salimi, M.; Mala, H.; Martín, H.; and Peris-Lopez, P.\n\n\n \n\n\n\n IEEE Access, 8: 8821–8833. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Full-ResilientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/SalimiMMP20,\n  author       = {Majid Salimi and\n                  Hamid Mala and\n                  Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez},\n  title        = {Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange},\n  journal      = {{IEEE} Access},\n  volume       = {8},\n  pages        = {8821--8833},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/ACCESS.2020.2964038},\n  doi          = {10.1109/ACCESS.2020.2964038},\n  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/access/SalimiMMP20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A True Random Number Generator Based on Gait Data for the Internet of You.\n \n \n \n \n\n\n \n Camara, C.; Martín, H.; Peris-Lopez, P.; and Entrena, L.\n\n\n \n\n\n\n IEEE Access, 8: 71642–71651. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/CamaraMPE20,\n  author       = {Carmen Camara and\n                  Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez and\n                  Luis Entrena},\n  title        = {A True Random Number Generator Based on Gait Data for the Internet\n                  of You},\n  journal      = {{IEEE} Access},\n  volume       = {8},\n  pages        = {71642--71651},\n  year         = {2020},\n  url          = {https://doi.org/10.1109/ACCESS.2020.2986822},\n  doi          = {10.1109/ACCESS.2020.2986822},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/access/CamaraMPE20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation.\n \n \n \n \n\n\n \n Ortiz-Martin, L.; Picazo-Sanchez, P.; and Peris-Lopez, P.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 105: 346–360. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"ArePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Ortiz-MartinPP20,\n  author       = {Lara Ortiz{-}Martin and\n                  Pablo Picazo{-}Sanchez and\n                  Pedro Peris{-}Lopez},\n  title        = {Are the Interpulse Intervals of an {ECG} signal a good source of entropy?\n                  An in-depth entropy analysis based on {NIST} 800-90B recommendation},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {105},\n  pages        = {346--360},\n  year         = {2020},\n  url          = {https://doi.org/10.1016/j.future.2019.12.002},\n  doi          = {10.1016/J.FUTURE.2019.12.002},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Ortiz-MartinPP20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.\n \n \n \n \n\n\n \n Ortiz-Martin, L.; Picazo-Sanchez, P.; Peris-Lopez, P.; Tapiador, J.; and Schneider, G.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 96: 283–296. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"FeasibilityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Ortiz-MartinPPT19,\n  author       = {Lara Ortiz{-}Martin and\n                  Pablo Picazo{-}Sanchez and\n                  Pedro Peris{-}Lopez and\n                  Juan Tapiador and\n                  Gerardo Schneider},\n  title        = {Feasibility analysis of Inter-Pulse Intervals based solutions for\n                  cryptographic token generation by two electrocardiogram sensors},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {96},\n  pages        = {283--296},\n  year         = {2019},\n  url          = {https://doi.org/10.1016/j.future.2019.02.021},\n  doi          = {10.1016/J.FUTURE.2019.02.021},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Ortiz-MartinPPT19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT.\n \n \n \n \n\n\n \n Aghili, S. F.; Mala, H.; Shojafar, M.; and Peris-Lopez, P.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 96: 410–424. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"LACO:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/AghiliMSP19,\n  author       = {Seyed Farhad Aghili and\n                  Hamid Mala and\n                  Mohammad Shojafar and\n                  Pedro Peris{-}Lopez},\n  title        = {{LACO:} Lightweight Three-Factor Authentication, Access Control and\n                  Ownership Transfer Scheme for E-Health Systems in IoT},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {96},\n  pages        = {410--424},\n  year         = {2019},\n  url          = {https://doi.org/10.1016/j.future.2019.02.020},\n  doi          = {10.1016/J.FUTURE.2019.02.020},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fgcs/AghiliMSP19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Editorial: Security and Privacy in Internet of Things.\n \n \n \n \n\n\n \n de Fuentes, J. M.; González-Manzano, L.; López, J.; Peris-Lopez, P.; and Choo, K. R.\n\n\n \n\n\n\n Mob. Networks Appl., 24(3): 878–880. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Editorial:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/monet/FuentesGLPC19,\n  author       = {Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Javier L{\\'{o}}pez and\n                  Pedro Peris{-}Lopez and\n                  Kim{-}Kwang Raymond Choo},\n  title        = {Editorial: Security and Privacy in Internet of Things},\n  journal      = {Mob. Networks Appl.},\n  volume       = {24},\n  number       = {3},\n  pages        = {878--880},\n  year         = {2019},\n  url          = {https://doi.org/10.1007/s11036-018-1150-8},\n  doi          = {10.1007/S11036-018-1150-8},\n  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/monet/FuentesGLPC19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks.\n \n \n \n \n\n\n \n Camara, C.; Martín, H.; Peris-Lopez, P.; and Naser, M.\n\n\n \n\n\n\n Sensors, 19(9): 2033. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/CamaraMPN19,\n  author       = {Carmen Camara and\n                  Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez and\n                  Mu'awya Naser},\n  title        = {Design and Analysis of a True Random Number Generator Based on {GSR}\n                  Signals for Body Sensor Networks},\n  journal      = {Sensors},\n  volume       = {19},\n  number       = {9},\n  pages        = {2033},\n  year         = {2019},\n  url          = {https://doi.org/10.3390/s19092033},\n  doi          = {10.3390/S19092033},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/CamaraMPN19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Real-time electrocardiogram streams for continuous authentication.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; González-Manzano, L.; and Tapiador, J. E.\n\n\n \n\n\n\n Appl. Soft Comput., 68: 784–794. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Real-timePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/asc/CamaraPGT18,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Juan E. Tapiador},\n  title        = {Real-time electrocardiogram streams for continuous authentication},\n  journal      = {Appl. Soft Comput.},\n  volume       = {68},\n  pages        = {784--794},\n  year         = {2018},\n  url          = {https://doi.org/10.1016/j.asoc.2017.07.032},\n  doi          = {10.1016/J.ASOC.2017.07.032},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/asc/CamaraPGT18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.\n \n \n \n \n\n\n \n Ortiz-Martin, L.; Picazo-Sanchez, P.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n Entropy, 20(2): 94. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"HeartbeatsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/entropy/Ortiz-MartinPPT18,\n  author       = {Lara Ortiz{-}Martin and\n                  Pablo Picazo{-}Sanchez and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis\n                  of the Randomness of Inter-Pulse Intervals},\n  journal      = {Entropy},\n  volume       = {20},\n  number       = {2},\n  pages        = {94},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/e20020094},\n  doi          = {10.3390/E20020094},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/entropy/Ortiz-MartinPPT18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation.\n \n \n \n \n\n\n \n Martín, H.; Martín-Holgado, P.; Peris-Lopez, P.; Morilla, Y.; and Entrena, L.\n\n\n \n\n\n\n Entropy, 20(7): 513. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/entropy/MartinMPME18,\n  author       = {Honorio Mart{\\'{\\i}}n and\n                  Pedro Mart{\\'{\\i}}n{-}Holgado and\n                  Pedro Peris{-}Lopez and\n                  Yolanda Morilla and\n                  Luis Entrena},\n  title        = {On the Entropy of Oscillator-Based True Random Number Generators under\n                  Ionizing Radiation},\n  journal      = {Entropy},\n  volume       = {20},\n  number       = {7},\n  pages        = {513},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/e20070513},\n  doi          = {10.3390/E20070513},\n  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/entropy/MartinMPME18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.\n \n \n \n \n\n\n \n Peris-Lopez, P.; González-Manzano, L.; Camara, C.; and de Fuentes, J. M.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 81: 67–77. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"EffectPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Peris-LopezGCF18,\n  author       = {Pedro Peris{-}Lopez and\n                  Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Carmen Camara and\n                  Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes},\n  title        = {Effect of attacker characterization in ECG-based continuous authentication\n                  mechanisms for Internet of Things},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {81},\n  pages        = {67--77},\n  year         = {2018},\n  url          = {https://doi.org/10.1016/j.future.2017.11.037},\n  doi          = {10.1016/J.FUTURE.2017.11.037},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Peris-LopezGCF18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; Martín, H.; and Naser, M.\n\n\n \n\n\n\n Sensors, 18(9): 2747. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"ECG-RNG:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/CamaraPMN18,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Honorio Mart{\\'{\\i}}n and\n                  Mu'awya Naser},\n  title        = {{ECG-RNG:} {A} Random Number Generator Based on {ECG} Signals and\n                  Suitable for Securing Wireless Sensor Networks},\n  journal      = {Sensors},\n  volume       = {18},\n  number       = {9},\n  pages        = {2747},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/s18092747},\n  doi          = {10.3390/S18092747},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/CamaraPMN18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification.\n \n \n \n \n\n\n \n Blasco, J.; and Peris-Lopez, P.\n\n\n \n\n\n\n Sensors, 18(9): 2782. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/BlascoP18,\n  author       = {Jorge Blasco and\n                  Pedro Peris{-}Lopez},\n  title        = {On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric\n                  Verification},\n  journal      = {Sensors},\n  volume       = {18},\n  number       = {9},\n  pages        = {2782},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/s18092782},\n  doi          = {10.3390/S18092782},\n  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/BlascoP18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.\n \n \n \n \n\n\n \n Aghili, S. F.; Mala, H.; and Peris-Lopez, P.\n\n\n \n\n\n\n Sensors, 18(11): 3663. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"SecuringPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/AghiliMP18,\n  author       = {Seyed Farhad Aghili and\n                  Hamid Mala and\n                  Pedro Peris{-}Lopez},\n  title        = {Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing\n                  a Three-Factor Authentication Protocol},\n  journal      = {Sensors},\n  volume       = {18},\n  number       = {11},\n  pages        = {3663},\n  year         = {2018},\n  url          = {https://doi.org/10.3390/s18113663},\n  doi          = {10.3390/S18113663},\n  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/AghiliMP18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Forensics Analysis of an On-line Game over Steam Platform.\n \n \n \n \n\n\n \n Tabuyo-Benito, R.; Bahsi, H.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Breitinger, F.; and Baggili, I. M., editor(s), Digital Forensics and Cyber Crime - 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings, volume 259, of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 106–127, 2018. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ForensicsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdf2c/Tabuyo-BenitoBP18,\n  author       = {Raquel Tabuyo{-}Benito and\n                  Hayretdin Bahsi and\n                  Pedro Peris{-}Lopez},\n  editor       = {Frank Breitinger and\n                  Ibrahim M. Baggili},\n  title        = {Forensics Analysis of an On-line Game over Steam Platform},\n  booktitle    = {Digital Forensics and Cyber Crime - 10th International {EAI} Conference,\n                  {ICDF2C} 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings},\n  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics\n                  and Telecommunications Engineering},\n  volume       = {259},\n  pages        = {106--127},\n  publisher    = {Springer},\n  year         = {2018},\n  url          = {https://doi.org/10.1007/978-3-030-05487-8\\_6},\n  doi          = {10.1007/978-3-030-05487-8\\_6},\n  timestamp    = {Thu, 14 Oct 2021 10:05:19 +0200},\n  biburl       = {https://dblp.org/rec/conf/icdf2c/Tabuyo-BenitoBP18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.\n \n \n \n \n\n\n \n de Fuentes, J. M.; González-Manzano, L.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n Comput. Secur., 69: 127–141. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"PRACIS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/compsec/FuentesGTP17,\n  author       = {Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  title        = {{PRACIS:} Privacy-preserving and aggregatable cybersecurity information\n                  sharing},\n  journal      = {Comput. Secur.},\n  volume       = {69},\n  pages        = {127--141},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.cose.2016.12.011},\n  doi          = {10.1016/J.COSE.2016.12.011},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/compsec/FuentesGTP17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.\n \n \n \n \n\n\n \n González-Manzano, L.; de Fuentes, J. M.; Peris-Lopez, P.; and Camara, C.\n\n\n \n\n\n\n Future Gener. Comput. Syst., 77: 136–148. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"EncryptionPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fgcs/Gonzalez-Manzano17,\n  author       = {Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Pedro Peris{-}Lopez and\n                  Carmen Camara},\n  title        = {Encryption by Heart (EbH) - Using {ECG} for time-invariant symmetric\n                  key generation},\n  journal      = {Future Gener. Comput. Syst.},\n  volume       = {77},\n  pages        = {136--148},\n  year         = {2017},\n  url          = {https://doi.org/10.1016/j.future.2017.07.018},\n  doi          = {10.1016/J.FUTURE.2017.07.018},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/fgcs/Gonzalez-Manzano17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A lightweight implementation of the Tav-128 hash function.\n \n \n \n \n\n\n \n Martín, H.; Peris-López, P.; Millán, E. S.; and Tapiador, J. E.\n\n\n \n\n\n\n IEICE Electron. Express, 14(11): 20161255. 2017.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ieiceee/MartinPMT17,\n  author       = {Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}L{\\'{o}}pez and\n                  Enrique San Mill{\\'{a}}n and\n                  Juan E. Tapiador},\n  title        = {A lightweight implementation of the Tav-128 hash function},\n  journal      = {{IEICE} Electron. Express},\n  volume       = {14},\n  number       = {11},\n  pages        = {20161255},\n  year         = {2017},\n  url          = {https://doi.org/10.1587/elex.14.20161255},\n  doi          = {10.1587/ELEX.14.20161255},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ieiceee/MartinPMT17.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Survey of Wearable Biometric Recognition Systems.\n \n \n \n \n\n\n \n Blasco, J.; Chen, T. M.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n ACM Comput. Surv., 49(3): 43:1–43:35. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/csur/BlascoCTP16,\n  author       = {Jorge Blasco and\n                  Thomas M. Chen and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  title        = {A Survey of Wearable Biometric Recognition Systems},\n  journal      = {{ACM} Comput. Surv.},\n  volume       = {49},\n  number       = {3},\n  pages        = {43:1--43:35},\n  year         = {2016},\n  url          = {https://doi.org/10.1145/2968215},\n  doi          = {10.1145/2968215},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/csur/BlascoCTP16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.\n \n \n \n \n\n\n \n González-Manzano, L.; de Fuentes, J. M.; Pastrana, S.; Peris-Lopez, P.; and Encinas, L. H.\n\n\n \n\n\n\n J. Netw. Comput. Appl., 71: 59–71. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"PAgIoTPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jnca/Gonzalez-Manzano16,\n  author       = {Lorena Gonz{\\'{a}}lez{-}Manzano and\n                  Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Sergio Pastrana and\n                  Pedro Peris{-}Lopez and\n                  Luis Hern{\\'{a}}ndez Encinas},\n  title        = {PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things},\n  journal      = {J. Netw. Comput. Appl.},\n  volume       = {71},\n  pages        = {59--71},\n  year         = {2016},\n  url          = {https://doi.org/10.1016/j.jnca.2016.06.001},\n  doi          = {10.1016/J.JNCA.2016.06.001},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jnca/Gonzalez-Manzano16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A New TRNG Based on Coherent Sampling With Self-Timed Rings.\n \n \n \n \n\n\n \n Martín, H.; Peris-Lopez, P.; Tapiador, J. E.; and Millán, E. S.\n\n\n \n\n\n\n IEEE Trans. Ind. Informatics, 12(1): 91–100. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tii/MartinPTM16,\n  author       = {Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador and\n                  Enrique San Mill{\\'{a}}n},\n  title        = {A New {TRNG} Based on Coherent Sampling With Self-Timed Rings},\n  journal      = {{IEEE} Trans. Ind. Informatics},\n  volume       = {12},\n  number       = {1},\n  pages        = {91--100},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/TII.2015.2502183},\n  doi          = {10.1109/TII.2015.2502183},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tii/MartinPTM16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.\n \n \n \n \n\n\n \n Pastrana, S.; Tapiador, J. E.; Suarez-Tangil, G.; and Peris-López, P.\n\n\n \n\n\n\n In Caballero, J.; Zurutuza, U.; and Rodríguez, R. J., editor(s), Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings, volume 9721, of Lecture Notes in Computer Science, pages 58–77, 2016. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AVRAND:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/dimva/PastranaTSP16,\n  author       = {Sergio Pastrana and\n                  Juan E. Tapiador and\n                  Guillermo Suarez{-}Tangil and\n                  Pedro Peris{-}L{\\'{o}}pez},\n  editor       = {Juan Caballero and\n                  Urko Zurutuza and\n                  Ricardo J. Rodr{\\'{\\i}}guez},\n  title        = {{AVRAND:} {A} Software-Based Defense Against Code Reuse Attacks for\n                  {AVR} Embedded Devices},\n  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment\n                  - 13th International Conference, {DIMVA} 2016, San Sebasti{\\'{a}}n,\n                  Spain, July 7-8, 2016, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9721},\n  pages        = {58--77},\n  publisher    = {Springer},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/978-3-319-40667-1\\_4},\n  doi          = {10.1007/978-3-319-40667-1\\_4},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/dimva/PastranaTSP16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Probabilistic yoking proofs for large scale IoT systems.\n \n \n \n \n\n\n \n de Fuentes, J. M.; Peris-Lopez, P.; Tapiador, J. E.; and Pastrana, S.\n\n\n \n\n\n\n Ad Hoc Networks, 32: 43–52. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"ProbabilisticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/adhoc/FuentesPTP15,\n  author       = {Jos{\\'{e}} Mar{\\'{\\i}}a de Fuentes and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador and\n                  Sergio Pastrana},\n  title        = {Probabilistic yoking proofs for large scale IoT systems},\n  journal      = {Ad Hoc Networks},\n  volume       = {32},\n  pages        = {43--52},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.adhoc.2015.01.003},\n  doi          = {10.1016/J.ADHOC.2015.01.003},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/adhoc/FuentesPTP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.\n \n \n \n \n\n\n \n Pastrana, S.; Tapiador, J. E.; Orfila, A.; and Peris-Lopez, P.\n\n\n \n\n\n\n Comput. Networks, 80: 66–88. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"DEFIDNET:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/PastranaTOP15,\n  author       = {Sergio Pastrana and\n                  Juan E. Tapiador and\n                  Agust{\\'{\\i}}n Orfila and\n                  Pedro Peris{-}Lopez},\n  title        = {{DEFIDNET:} {A} framework for optimal allocation of cyberdefenses\n                  in Intrusion Detection Networks},\n  journal      = {Comput. Networks},\n  volume       = {80},\n  pages        = {66--88},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.comnet.2015.01.012},\n  doi          = {10.1016/J.COMNET.2015.01.012},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/cn/PastranaTOP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security and privacy issues in implantable medical devices: A comprehensive survey.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n J. Biomed. Informatics, 55: 272–289. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jbi/CamaraPT15,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Security and privacy issues in implantable medical devices: {A} comprehensive\n                  survey},\n  journal      = {J. Biomed. Informatics},\n  volume       = {55},\n  pages        = {272--289},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.jbi.2015.04.007},\n  doi          = {10.1016/J.JBI.2015.04.007},\n  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jbi/CamaraPT15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Human Identification Using Compressed ECG Signals.\n \n \n \n \n\n\n \n Camara, C.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n J. Medical Syst., 39(11): 148:1–148:10. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"HumanPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jms/CamaraPT15,\n  author       = {Carmen Camara and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Human Identification Using Compressed {ECG} Signals},\n  journal      = {J. Medical Syst.},\n  volume       = {39},\n  number       = {11},\n  pages        = {148:1--148:10},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/s10916-015-0323-2},\n  doi          = {10.1007/S10916-015-0323-2},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jms/CamaraPT15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hindering data theft with encrypted data trees.\n \n \n \n \n\n\n \n Alís, J. B.; Tapiador, J. E.; Peris-Lopez, P.; and Suarez-Tangil, G.\n\n\n \n\n\n\n J. Syst. Softw., 101: 147–158. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"HinderingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jss/AlisTPS15,\n  author       = {Jorge Blasco Al{\\'{\\i}}s and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez and\n                  Guillermo Suarez{-}Tangil},\n  title        = {Hindering data theft with encrypted data trees},\n  journal      = {J. Syst. Softw.},\n  volume       = {101},\n  pages        = {147--158},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.jss.2014.11.050},\n  doi          = {10.1016/J.JSS.2014.11.050},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jss/AlisTPS15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Tapiador, J. E.; Peris-Lopez, P.; and Pastrana, S.\n\n\n \n\n\n\n Pervasive Mob. Comput., 18: 137–151. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Power-awarePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/percom/Suarez-TangilTP15,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez and\n                  Sergio Pastrana},\n  title        = {Power-aware anomaly detection in smartphones: An analysis of on-platform\n                  versus externalized operation},\n  journal      = {Pervasive Mob. Comput.},\n  volume       = {18},\n  pages        = {137--151},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.pmcj.2014.10.007},\n  doi          = {10.1016/J.PMCJ.2014.10.007},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/percom/Suarez-TangilTP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Weaknesses of fingerprint-based mutual authentication protocol.\n \n \n \n \n\n\n \n Picazo-Sanchez, P.; Ortiz-Martin, L.; Peris-Lopez, P.; and Bagheri, N.\n\n\n \n\n\n\n Secur. Commun. Networks, 8(12): 2124–2134. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"WeaknessesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/scn/Picazo-SanchezO15,\n  author       = {Pablo Picazo{-}Sanchez and\n                  Lara Ortiz{-}Martin and\n                  Pedro Peris{-}Lopez and\n                  Nasour Bagheri},\n  title        = {Weaknesses of fingerprint-based mutual authentication protocol},\n  journal      = {Secur. Commun. Networks},\n  volume       = {8},\n  number       = {12},\n  pages        = {2124--2134},\n  year         = {2015},\n  url          = {https://doi.org/10.1002/sec.1161},\n  doi          = {10.1002/SEC.1161},\n  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/scn/Picazo-SanchezO15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Qiu, M.; Xu, S.; Yung, M.; and Zhang, H., editor(s), Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings, volume 9408, of Lecture Notes in Computer Science, pages 63–77, 2015. Springer\n \n\n\n\n
\n\n\n\n \n \n \"CompartmentationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/nss/Suarez-TangilTP15,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  editor       = {Meikang Qiu and\n                  Shouhuai Xu and\n                  Moti Yung and\n                  Haibo Zhang},\n  title        = {Compartmentation Policies for Android Apps: {A} Combinatorial Optimization\n                  Approach},\n  booktitle    = {Network and System Security - 9th International Conference, {NSS}\n                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9408},\n  pages        = {63--77},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-3-319-25645-0\\_5},\n  doi          = {10.1007/978-3-319-25645-0\\_5},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/nss/Suarez-TangilTP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.\n \n \n \n \n\n\n \n Calleja, A.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n In Akram, R. N.; and Jajodia, S., editor(s), Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings, volume 9311, of Lecture Notes in Computer Science, pages 36–51, 2015. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ElectricalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wistp/CallejaPT15,\n  author       = {Alejandro Calleja and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  editor       = {Raja Naeem Akram and\n                  Sushil Jajodia},\n  title        = {Electrical Heart Signals can be Monitored from the Moon: Security\n                  Implications for IPI-Based Protocols},\n  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International\n                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015\n                  Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {9311},\n  pages        = {36--51},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-3-319-24018-3\\_3},\n  doi          = {10.1007/978-3-319-24018-3\\_3},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/wistp/CallejaPT15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n 2015 International Workshop on Secure Internet of Things, SIoT 2015, Vienna, Austria, September 21-25, 2015.\n \n \n \n \n\n\n \n Ghinita, G.; and Peris-Lopez, P.,\n editors.\n \n\n\n \n\n\n\n IEEE Computer Society. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"2015Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@proceedings{DBLP:conf/siot/2015,\n  editor       = {Gabriel Ghinita and\n                  Pedro Peris{-}Lopez},\n  title        = {2015 International Workshop on Secure Internet of Things, SIoT 2015,\n                  Vienna, Austria, September 21-25, 2015},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://ieeexplore.ieee.org/xpl/conhome/7411453/proceeding},\n  isbn         = {978-1-4673-7769-0},\n  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/siot/2015.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (11)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Evolution, Detection and Analysis of Malware for Smart Devices.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Tapiador, J. E.; Peris-Lopez, P.; and Ribagorda, A.\n\n\n \n\n\n\n IEEE Commun. Surv. Tutorials, 16(2): 961–987. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Evolution,Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/comsur/Suarez-TangilTPR14,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez and\n                  Arturo Ribagorda},\n  title        = {Evolution, Detection and Analysis of Malware for Smart Devices},\n  journal      = {{IEEE} Commun. Surv. Tutorials},\n  volume       = {16},\n  number       = {2},\n  pages        = {961--987},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/SURV.2013.101613.00077},\n  doi          = {10.1109/SURV.2013.101613.00077},\n  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/comsur/Suarez-TangilTPR14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.\n \n \n \n \n\n\n \n Barrero, D. F.; Castro, J. C. H.; Peris-Lopez, P.; Camacho, D.; and Rodríguez-Moreno, M. D.\n\n\n \n\n\n\n Expert Syst. J. Knowl. Eng., 31(1): 9–19. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/es/BarreroCPCR14,\n  author       = {David F. Barrero and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez and\n                  David Camacho and\n                  Mar{\\'{\\i}}a Dolores Rodr{\\'{\\i}}guez{-}Moreno},\n  title        = {A genetic tango attack against the David-Prasad {RFID} ultra-lightweight\n                  authentication protocol},\n  journal      = {Expert Syst. J. Knowl. Eng.},\n  volume       = {31},\n  number       = {1},\n  pages        = {9--19},\n  year         = {2014},\n  url          = {https://doi.org/10.1111/j.1468-0394.2012.00652.x},\n  doi          = {10.1111/J.1468-0394.2012.00652.X},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/es/BarreroCPCR14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Tapiador, J. E.; Peris-Lopez, P.; and Alís, J. B.\n\n\n \n\n\n\n Expert Syst. Appl., 41(4): 1104–1117. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Dendroid:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eswa/Suarez-TangilTPA14,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez and\n                  Jorge Blasco Al{\\'{\\i}}s},\n  title        = {Dendroid: {A} text mining approach to analyzing and classifying code\n                  structures in Android malware families},\n  journal      = {Expert Syst. Appl.},\n  volume       = {41},\n  number       = {4},\n  pages        = {1104--1117},\n  year         = {2014},\n  url          = {https://doi.org/10.1016/j.eswa.2013.07.106},\n  doi          = {10.1016/J.ESWA.2013.07.106},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eswa/Suarez-TangilTPA14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.\n \n \n \n \n\n\n \n Safkhani, M.; Peris-Lopez, P.; Castro, J. C. H.; and Bagheri, N.\n\n\n \n\n\n\n J. Comput. Appl. Math., 259: 571–577. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jcam/SafkhaniPCB14,\n  author       = {Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Nasour Bagheri},\n  title        = {Cryptanalysis of the Cho et al. protocol: {A} hash-based {RFID} tag\n                  mutual authentication protocol},\n  journal      = {J. Comput. Appl. Math.},\n  volume       = {259},\n  pages        = {571--577},\n  year         = {2014},\n  url          = {https://doi.org/10.1016/j.cam.2013.09.073},\n  doi          = {10.1016/J.CAM.2013.09.073},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jcam/SafkhaniPCB14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Randomized Anagram revisited.\n \n \n \n \n\n\n \n Pastrana, S.; Orfila, A.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n J. Netw. Comput. Appl., 41: 182–196. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"RandomizedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jnca/PastranaOTP14,\n  author       = {Sergio Pastrana and\n                  Agust{\\'{\\i}}n Orfila and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  title        = {Randomized Anagram revisited},\n  journal      = {J. Netw. Comput. Appl.},\n  volume       = {41},\n  pages        = {182--196},\n  year         = {2014},\n  url          = {https://doi.org/10.1016/j.jnca.2013.11.006},\n  doi          = {10.1016/J.JNCA.2013.11.006},\n  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/jnca/PastranaOTP14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.\n \n \n \n \n\n\n \n Bagheri, N.; Safkhani, M.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n Secur. Commun. Networks, 7(6): 945–949. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"WeaknessesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/scn/BagheriSPT14,\n  author       = {Nasour Bagheri and\n                  Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Weaknesses in a new ultralightweight {RFID} authentication protocol\n                  with permutation - {RAPP}},\n  journal      = {Secur. Commun. Networks},\n  volume       = {7},\n  number       = {6},\n  pages        = {945--949},\n  year         = {2014},\n  url          = {https://doi.org/10.1002/sec.803},\n  doi          = {10.1002/SEC.803},\n  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/scn/BagheriSPT14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.\n \n \n \n \n\n\n \n Picazo-Sanchez, P.; Tapiador, J. E.; Peris-López, P.; and Suarez-Tangil, G.\n\n\n \n\n\n\n Sensors, 14(12): 22619–22642. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/Picazo-SanchezT14,\n  author       = {Pablo Picazo{-}Sanchez and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}L{\\'{o}}pez and\n                  Guillermo Suarez{-}Tangil},\n  title        = {Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless\n                  Body Area Networks},\n  journal      = {Sensors},\n  volume       = {14},\n  number       = {12},\n  pages        = {22619--22642},\n  year         = {2014},\n  url          = {https://doi.org/10.3390/s141222619},\n  doi          = {10.3390/S141222619},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sensors/Picazo-SanchezT14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms.\n \n \n \n \n\n\n \n Martín, H.; Peris-Lopez, P.; Tapiador, J. E.; and Millán, E. S.\n\n\n \n\n\n\n IEEE Trans. Ind. Informatics, 10(2): 1216–1225. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tii/MartinPTM14,\n  author       = {Honorio Mart{\\'{\\i}}n and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador and\n                  Enrique San Mill{\\'{a}}n},\n  title        = {An Estimator for the {ASIC} Footprint Area of Lightweight Cryptographic\n                  Algorithms},\n  journal      = {{IEEE} Trans. Ind. Informatics},\n  volume       = {10},\n  number       = {2},\n  pages        = {1216--1225},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/TII.2013.2288576},\n  doi          = {10.1109/TII.2013.2288576},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tii/MartinPTM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Lin, D.; Yung, M.; and Zhou, J., editor(s), Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, volume 8957, of Lecture Notes in Computer Science, pages 496–515, 2014. Springer\n \n\n\n\n
\n\n\n\n \n \n \"Stegomalware:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cisc/Suarez-TangilTP14,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  editor       = {Dongdai Lin and\n                  Moti Yung and\n                  Jianying Zhou},\n  title        = {Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone\n                  Apps},\n  booktitle    = {Information Security and Cryptology - 10th International Conference,\n                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected\n                  Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8957},\n  pages        = {496--515},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-319-16745-9\\_27},\n  doi          = {10.1007/978-3-319-16745-9\\_27},\n  timestamp    = {Fri, 09 Apr 2021 18:52:22 +0200},\n  biburl       = {https://dblp.org/rec/conf/cisc/Suarez-TangilTP14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Peak misdetection in heart-beat-based security: Characterization and tolerance.\n \n \n \n \n\n\n \n Seepers, R. M.; Strydis, C.; Peris-Lopez, P.; Sourdis, I.; and Zeeuw, C. I. D.\n\n\n \n\n\n\n In 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2014, Chicago, IL, USA, August 26-30, 2014, pages 5401–5405, 2014. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"PeakPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/embc/SeepersSPSZ14,\n  author       = {Robert M. Seepers and\n                  Christos Strydis and\n                  Pedro Peris{-}Lopez and\n                  Ioannis Sourdis and\n                  Chris I. De Zeeuw},\n  title        = {Peak misdetection in heart-beat-based security: Characterization and\n                  tolerance},\n  booktitle    = {36th Annual International Conference of the {IEEE} Engineering in\n                  Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August\n                  26-30, 2014},\n  pages        = {5401--5405},\n  publisher    = {{IEEE}},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/EMBC.2014.6944847},\n  doi          = {10.1109/EMBC.2014.6944847},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/embc/SeepersSPSZ14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.\n \n \n \n \n\n\n \n Suarez-Tangil, G.; Conti, M.; Tapiador, J. E.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Kutylowski, M.; and Vaidya, J., editor(s), Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, volume 8712, of Lecture Notes in Computer Science, pages 183–201, 2014. Springer\n \n\n\n\n
\n\n\n\n \n \n \"DetectingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/Suarez-TangilCTP14,\n  author       = {Guillermo Suarez{-}Tangil and\n                  Mauro Conti and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez},\n  editor       = {Miroslaw Kutylowski and\n                  Jaideep Vaidya},\n  title        = {Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic\n                  Models},\n  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research\n                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,\n                  Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8712},\n  pages        = {183--201},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-319-11203-9\\_11},\n  doi          = {10.1007/978-3-319-11203-9\\_11},\n  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/esorics/Suarez-TangilCTP14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On Selecting the Nonce Length in Distance-Bounding Protocols.\n \n \n \n \n\n\n \n Mitrokotsa, A.; Peris-Lopez, P.; Dimitrakakis, C.; and Vaudenay, S.\n\n\n \n\n\n\n Comput. J., 56(10): 1216–1227. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cj/MitrokotsaPDV13,\n  author       = {Aikaterini Mitrokotsa and\n                  Pedro Peris{-}Lopez and\n                  Christos Dimitrakakis and\n                  Serge Vaudenay},\n  title        = {On Selecting the Nonce Length in Distance-Bounding Protocols},\n  journal      = {Comput. J.},\n  volume       = {56},\n  number       = {10},\n  pages        = {1216--1227},\n  year         = {2013},\n  url          = {https://doi.org/10.1093/comjnl/bxt033},\n  doi          = {10.1093/COMJNL/BXT033},\n  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/cj/MitrokotsaPDV13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Comments on \"Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6\".\n \n \n \n \n\n\n \n Bagheri, N.; Safkhani, M.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n IEEE Commun. Lett., 17(4): 805–807. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"CommentsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/icl/BagheriSPT13,\n  author       = {Nasour Bagheri and\n                  Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Comments on "Security Improvement of an {RFID} Security Protocol of\n                  {ISO/IEC} {WD} 29167-6"},\n  journal      = {{IEEE} Commun. Lett.},\n  volume       = {17},\n  number       = {4},\n  pages        = {805--807},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/LCOMM.2013.021213.122837},\n  doi          = {10.1109/LCOMM.2013.021213.122837},\n  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/icl/BagheriSPT13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Two RFID Standard-based Security Protocols for Healthcare Environments.\n \n \n \n \n\n\n \n Picazo-Sanchez, P.; Bagheri, N.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n J. Medical Syst., 37(5): 9962. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"TwoPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jms/Picazo-SanchezBPT13,\n  author       = {Pablo Picazo{-}Sanchez and\n                  Nasour Bagheri and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Two {RFID} Standard-based Security Protocols for Healthcare Environments},\n  journal      = {J. Medical Syst.},\n  volume       = {37},\n  number       = {5},\n  pages        = {9962},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/s10916-013-9962-3},\n  doi          = {10.1007/S10916-013-9962-3},\n  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jms/Picazo-SanchezBPT13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A system architecture, processor, and communication protocol for secure implants.\n \n \n \n \n\n\n \n Strydis, C.; Seepers, R. M.; Peris-Lopez, P.; Siskos, D.; and Sourdis, I.\n\n\n \n\n\n\n ACM Trans. Archit. Code Optim., 10(4): 57:1–57:23. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/taco/StrydisSPSS13,\n  author       = {Christos Strydis and\n                  Robert M. Seepers and\n                  Pedro Peris{-}Lopez and\n                  Dimitrios Siskos and\n                  Ioannis Sourdis},\n  title        = {A system architecture, processor, and communication protocol for secure\n                  implants},\n  journal      = {{ACM} Trans. Archit. Code Optim.},\n  volume       = {10},\n  number       = {4},\n  pages        = {57:1--57:23},\n  year         = {2013},\n  url          = {https://doi.org/10.1145/2541228.2555313},\n  doi          = {10.1145/2541228.2555313},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/taco/StrydisSPSS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of the RNTS system.\n \n \n \n \n\n\n \n Picazo-Sanchez, P.; Ortiz-Martin, L.; Peris-Lopez, P.; and Castro, J. C. H.\n\n\n \n\n\n\n J. Supercomput., 65(2): 949–960. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tjs/Picazo-SanchezOPC13,\n  author       = {Pablo Picazo{-}Sanchez and\n                  Lara Ortiz{-}Martin and\n                  Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Cryptanalysis of the {RNTS} system},\n  journal      = {J. Supercomput.},\n  volume       = {65},\n  number       = {2},\n  pages        = {949--960},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/s11227-013-0873-3},\n  doi          = {10.1007/S11227-013-0873-3},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/tjs/Picazo-SanchezOPC13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.\n \n \n \n \n\n\n \n Castro, J. C. H.; Estévez-Tapiador, J. M.; Peris-Lopez, P.; Clark, J. A.; and Talbi, E.\n\n\n \n\n\n\n Int. J. Found. Comput. Sci., 23(2): 543–553. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"MetaheuristicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijfcs/CastroEPCT12,\n  author       = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Pedro Peris{-}Lopez and\n                  John A. Clark and\n                  El{-}Ghazali Talbi},\n  title        = {Metaheuristic Traceability Attack against SLMAP, an {RFID} Lightweight\n                  Authentication Protocol},\n  journal      = {Int. J. Found. Comput. Sci.},\n  volume       = {23},\n  number       = {2},\n  pages        = {543--553},\n  year         = {2012},\n  url          = {https://doi.org/10.1142/S0129054112400278},\n  doi          = {10.1142/S0129054112400278},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijfcs/CastroEPCT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Online Randomization Strategies to Obfuscate User Behavioral Patterns.\n \n \n \n \n\n\n \n Tapiador, J. E.; Hernandez-Castro, J. C.; and Peris-Lopez, P.\n\n\n \n\n\n\n J. Netw. Syst. Manag., 20(4): 561–578. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"OnlinePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jnsm/TapiadorHP12,\n  author       = {Juan E. Tapiador and\n                  Julio C. Hernandez{-}Castro and\n                  Pedro Peris{-}Lopez},\n  title        = {Online Randomization Strategies to Obfuscate User Behavioral Patterns},\n  journal      = {J. Netw. Syst. Manag.},\n  volume       = {20},\n  number       = {4},\n  pages        = {561--578},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/s10922-012-9246-0},\n  doi          = {10.1007/S10922-012-9246-0},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jnsm/TapiadorHP12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evaluation of classification algorithms for intrusion detection in MANETs.\n \n \n \n \n\n\n \n Pastrana, S.; Mitrokotsa, A.; Orfila, A.; and Peris-Lopez, P.\n\n\n \n\n\n\n Knowl. Based Syst., 36: 217–225. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"EvaluationPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/kbs/PastranaMOP12,\n  author       = {Sergio Pastrana and\n                  Aikaterini Mitrokotsa and\n                  Agust{\\'{\\i}}n Orfila and\n                  Pedro Peris{-}Lopez},\n  title        = {Evaluation of classification algorithms for intrusion detection in\n                  MANETs},\n  journal      = {Knowl. Based Syst.},\n  volume       = {36},\n  pages        = {217--225},\n  year         = {2012},\n  url          = {https://doi.org/10.1016/j.knosys.2012.06.016},\n  doi          = {10.1016/J.KNOSYS.2012.06.016},\n  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/kbs/PastranaMOP12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A secure distance-based RFID identification protocol with an off-line back-end database.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Orfila, A.; Palomar, E.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n Pers. Ubiquitous Comput., 16(3): 351–365. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/puc/Peris-LopezOPH12,\n  author       = {Pedro Peris{-}Lopez and\n                  Agust{\\'{\\i}}n Orfila and\n                  Esther Palomar and\n                  Julio C. Hernandez{-}Castro},\n  title        = {A secure distance-based {RFID} identification protocol with an off-line\n                  back-end database},\n  journal      = {Pers. Ubiquitous Comput.},\n  volume       = {16},\n  number       = {3},\n  pages        = {351--365},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/s00779-011-0396-y},\n  doi          = {10.1007/S00779-011-0396-Y},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/puc/Peris-LopezOPH12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.\n \n \n \n \n\n\n \n Safkhani, M.; Peris-Lopez, P.; Bagheri, N.; Naderi, M.; and Castro, J. C. H.\n\n\n \n\n\n\n In Hoepman, J.; and Verbauwhede, I., editor(s), Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers, volume 7739, of Lecture Notes in Computer Science, pages 1–19, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidsec/SafkhaniPBNC12,\n  author       = {Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Nasour Bagheri and\n                  Majid Naderi and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  editor       = {Jaap{-}Henk Hoepman and\n                  Ingrid Verbauwhede},\n  title        = {On the Security of Tan et al. Serverless {RFID} Authentication and\n                  Search Protocols},\n  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th\n                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July\n                  2-3, 2012, Revised Selected Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7739},\n  pages        = {1--19},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-36140-1\\_1},\n  doi          = {10.1007/978-3-642-36140-1\\_1},\n  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},\n  biburl       = {https://dblp.org/rec/conf/rfidsec/SafkhaniPBNC12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Weaknesses in another Gen2-based RFID authentication protocol.\n \n \n \n \n\n\n \n Safkhani, M.; Bagheri, N.; Peris-Lopez, P.; Mitrokotsa, A.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n In 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, Nice, France, November 5-7, 2012, pages 80–84, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"WeaknessesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidta/SafkhaniBPMH12,\n  author       = {Masoumeh Safkhani and\n                  Nasour Bagheri and\n                  Pedro Peris{-}Lopez and\n                  Aikaterini Mitrokotsa and\n                  Julio C. Hernandez{-}Castro},\n  title        = {Weaknesses in another Gen2-based {RFID} authentication protocol},\n  booktitle    = {2012 {IEEE} International Conference on RFID-Technologies and Applications,\n                  {RFID-TA} 2012, Nice, France, November 5-7, 2012},\n  pages        = {80--84},\n  publisher    = {{IEEE}},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/RFID-TA.2012.6404572},\n  doi          = {10.1109/RFID-TA.2012.6404572},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/rfidta/SafkhaniBPMH12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the traceability of tags in SUAP RFID authentication protocols.\n \n \n \n \n\n\n \n Safkhani, M.; Bagheri, N.; Peris-Lopez, P.; and Mitrokotsa, A.\n\n\n \n\n\n\n In 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012, Nice, France, November 5-7, 2012, pages 292–296, 2012. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidta/SafkhaniBPM12,\n  author       = {Masoumeh Safkhani and\n                  Nasour Bagheri and\n                  Pedro Peris{-}Lopez and\n                  Aikaterini Mitrokotsa},\n  title        = {On the traceability of tags in {SUAP} {RFID} authentication protocols},\n  booktitle    = {2012 {IEEE} International Conference on RFID-Technologies and Applications,\n                  {RFID-TA} 2012, Nice, France, November 5-7, 2012},\n  pages        = {292--296},\n  publisher    = {{IEEE}},\n  year         = {2012},\n  url          = {https://doi.org/10.1109/RFID-TA.2012.6404532},\n  doi          = {10.1109/RFID-TA.2012.6404532},\n  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/rfidta/SafkhaniBPM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Another Fallen Hash-Based RFID Authentication Protocol.\n \n \n \n \n\n\n \n Castro, J. C. H.; Peris-Lopez, P.; Safkhani, M.; Bagheri, N.; and Naderi, M.\n\n\n \n\n\n\n In Askoxylakis, I. G.; Pöhls, H. C.; and Posegga, J., editor(s), Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings, volume 7322, of Lecture Notes in Computer Science, pages 29–37, 2012. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AnotherPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wistp/CastroPSBN12,\n  author       = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez and\n                  Masoumeh Safkhani and\n                  Nasour Bagheri and\n                  Majid Naderi},\n  editor       = {Ioannis G. Askoxylakis and\n                  Henrich Christopher P{\\"{o}}hls and\n                  Joachim Posegga},\n  title        = {Another Fallen Hash-Based {RFID} Authentication Protocol},\n  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust\n                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}\n                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,\n                  2012. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7322},\n  pages        = {29--37},\n  publisher    = {Springer},\n  year         = {2012},\n  url          = {https://doi.org/10.1007/978-3-642-30955-7\\_4},\n  doi          = {10.1007/978-3-642-30955-7\\_4},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/wistp/CastroPSBN12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of RAPP, an RFID Authentication Protocol.\n \n \n \n \n\n\n \n Bagheri, N.; Safkhani, M.; Peris-Lopez, P.; and Tapiador, J. E.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,702. 2012.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/BagheriSPT12,\n  author       = {Nasour Bagheri and\n                  Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Juan E. Tapiador},\n  title        = {Cryptanalysis of RAPP, an {RFID} Authentication Protocol},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {702},\n  year         = {2012},\n  url          = {http://eprint.iacr.org/2012/702},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/BagheriSPT12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A note on the security of PAP.\n \n \n \n \n\n\n \n Naser, M.; Peris-Lopez, P.; Budiarto, R.; and Álvarez, B. R.\n\n\n \n\n\n\n Comput. Commun., 34(18): 2248–2249. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/comcom/NaserPBA11,\n  author       = {Mu'awya Naser and\n                  Pedro Peris{-}Lopez and\n                  Rahmat Budiarto and\n                  Benjam{\\'{\\i}}n Ramos {\\'{A}}lvarez},\n  title        = {A note on the security of {PAP}},\n  journal      = {Comput. Commun.},\n  volume       = {34},\n  number       = {18},\n  pages        = {2248--2249},\n  year         = {2011},\n  url          = {https://doi.org/10.1016/j.comcom.2011.07.002},\n  doi          = {10.1016/J.COMCOM.2011.07.002},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/comcom/NaserPBA11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Tapiador, J. E.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n Eng. Appl. Artif. Intell., 24(6): 1061–1069. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/eaai/Peris-LopezHTL11,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan E. Tapiador and\n                  Jan C. A. van der Lubbe},\n  title        = {Cryptanalysis of an {EPC} Class-1 Generation-2 standard compliant\n                  authentication protocol},\n  journal      = {Eng. Appl. Artif. Intell.},\n  volume       = {24},\n  number       = {6},\n  pages        = {1061--1069},\n  year         = {2011},\n  url          = {https://doi.org/10.1016/j.engappai.2011.04.001},\n  doi          = {10.1016/J.ENGAPPAI.2011.04.001},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/eaai/Peris-LopezHTL11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A comprehensive RFID solution to enhance inpatient medication safety.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Orfila, A.; Mitrokotsa, A.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n Int. J. Medical Informatics, 80(1): 13–24. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijmi/Peris-LopezOML11,\n  author       = {Pedro Peris{-}Lopez and\n                  Agust{\\'{\\i}}n Orfila and\n                  Aikaterini Mitrokotsa and\n                  Jan C. A. van der Lubbe},\n  title        = {A comprehensive {RFID} solution to enhance inpatient medication safety},\n  journal      = {Int. J. Medical Informatics},\n  volume       = {80},\n  number       = {1},\n  pages        = {13--24},\n  year         = {2011},\n  url          = {https://doi.org/10.1016/j.ijmedinf.2010.10.008},\n  doi          = {10.1016/J.IJMEDINF.2010.10.008},\n  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/ijmi/Peris-LopezOML11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flaws on RFID grouping-proofs. Guidelines for future sound protocols.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Orfila, A.; Hernandez-Castro, J. C.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n J. Netw. Comput. Appl., 34(3): 833–845. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"FlawsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jnca/Peris-LopezOHL11,\n  author       = {Pedro Peris{-}Lopez and\n                  Agust{\\'{\\i}}n Orfila and\n                  Julio C. Hernandez{-}Castro and\n                  Jan C. A. van der Lubbe},\n  title        = {Flaws on {RFID} grouping-proofs. Guidelines for future sound protocols},\n  journal      = {J. Netw. Comput. Appl.},\n  volume       = {34},\n  number       = {3},\n  pages        = {833--845},\n  year         = {2011},\n  url          = {https://doi.org/10.1016/j.jnca.2010.04.008},\n  doi          = {10.1016/J.JNCA.2010.04.008},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jnca/Peris-LopezOHL11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Key Schedule Strength of PRESENT.\n \n \n \n \n\n\n \n Castro, J. C. H.; Peris-Lopez, P.; and Aumasson, J.\n\n\n \n\n\n\n In García-Alfaro, J.; Navarro-Arribas, G.; Cuppens-Boulahia, N.; and di Vimercati, S. D. C., editor(s), Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, volume 7122, of Lecture Notes in Computer Science, pages 253–263, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/CastroPA11,\n  author       = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez and\n                  Jean{-}Philippe Aumasson},\n  editor       = {Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro and\n                  Guillermo Navarro{-}Arribas and\n                  Nora Cuppens{-}Boulahia and\n                  Sabrina De Capitani di Vimercati},\n  title        = {On the Key Schedule Strength of {PRESENT}},\n  booktitle    = {Data Privacy Management and Autonomous Spontaneus Security - 6th International\n                  Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,\n                  Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7122},\n  pages        = {253--263},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-28879-1\\_17},\n  doi          = {10.1007/978-3-642-28879-1\\_17},\n  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},\n  biburl       = {https://dblp.org/rec/conf/esorics/CastroPA11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Note on a Privacy-Preserving Distance-Bounding Protocol.\n \n \n \n \n\n\n \n Aumasson, J.; Mitrokotsa, A.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Qing, S.; Susilo, W.; Wang, G.; and Liu, D., editor(s), Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings, volume 7043, of Lecture Notes in Computer Science, pages 78–92, 2011. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icics/AumassonMP11,\n  author       = {Jean{-}Philippe Aumasson and\n                  Aikaterini Mitrokotsa and\n                  Pedro Peris{-}Lopez},\n  editor       = {Sihan Qing and\n                  Willy Susilo and\n                  Guilin Wang and\n                  Dongmei Liu},\n  title        = {A Note on a Privacy-Preserving Distance-Bounding Protocol},\n  booktitle    = {Information and Communications Security - 13th International Conference,\n                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {7043},\n  pages        = {78--92},\n  publisher    = {Springer},\n  year         = {2011},\n  url          = {https://doi.org/10.1007/978-3-642-25243-3\\_7},\n  doi          = {10.1007/978-3-642-25243-3\\_7},\n  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icics/AumassonMP11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AKARI-X: A pseudorandom number generator for secure lightweight systems.\n \n \n \n \n\n\n \n Martín, H.; Millán, E. S.; Entrena, L.; Castro, J. C. H.; and Peris-Lopez, P.\n\n\n \n\n\n\n In 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 13-15 July, 2011, Athens, Greece, pages 228–233, 2011. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AKARI-X:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iolts/MartinMECL11,\n  author       = {Honorio Mart{\\'{\\i}}n and\n                  Enrique San Mill{\\'{a}}n and\n                  Luis Entrena and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez},\n  title        = {{AKARI-X:} {A} pseudorandom number generator for secure lightweight\n                  systems},\n  booktitle    = {17th {IEEE} International On-Line Testing Symposium {(IOLTS} 2011),\n                  13-15 July, 2011, Athens, Greece},\n  pages        = {228--233},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/IOLTS.2011.5994534},\n  doi          = {10.1109/IOLTS.2011.5994534},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/iolts/MartinMECL11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Studying the pseudo random number generator of a low-cost RFID tag.\n \n \n \n \n\n\n \n Merhi, M.; Castro, J. C. H.; and Peris-Lopez, P.\n\n\n \n\n\n\n In 2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011, Sitges, Spain, September 15-16, 2011, pages 381–385, 2011. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"StudyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidta/MerhiCP11,\n  author       = {Mohamad Merhi and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez},\n  title        = {Studying the pseudo random number generator of a low-cost {RFID} tag},\n  booktitle    = {2011 {IEEE} International Conference on RFID-Technologies and Applications,\n                  {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011},\n  pages        = {381--385},\n  publisher    = {{IEEE}},\n  year         = {2011},\n  url          = {https://doi.org/10.1109/RFID-TA.2011.6068666},\n  doi          = {10.1109/RFID-TA.2011.6068666},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/rfidta/MerhiCP11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of Song's advanced smart card based password authentication protocol.\n \n \n \n \n\n\n \n Tapiador, J. E.; Hernandez-Castro, J. C.; Peris-Lopez, P.; and Clark, J. A.\n\n\n \n\n\n\n CoRR, abs/1111.2744. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1111-2744,\n  author       = {Juan E. Tapiador and\n                  Julio C. Hernandez{-}Castro and\n                  Pedro Peris{-}Lopez and\n                  John A. Clark},\n  title        = {Cryptanalysis of Song's advanced smart card based password authentication\n                  protocol},\n  journal      = {CoRR},\n  volume       = {abs/1111.2744},\n  year         = {2011},\n  url          = {http://arxiv.org/abs/1111.2744},\n  eprinttype    = {arXiv},\n  eprint       = {1111.2744},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-2744.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of Cho \\emphet al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.\n \n \n \n \n\n\n \n Safkhani, M.; Peris-Lopez, P.; Castro, J. C. H.; Bagheri, N.; and Naderi, M.\n\n\n \n\n\n\n IACR Cryptol. ePrint Arch.,331. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/SafkhaniPCBN11,\n  author       = {Masoumeh Safkhani and\n                  Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Nasour Bagheri and\n                  Majid Naderi},\n  title        = {Cryptanalysis of Cho \\emph{et al.}'s Protocol, {A} Hash-Based Mutual\n                  Authentication Protocol for {RFID} Systems},\n  journal      = {{IACR} Cryptol. ePrint Arch.},\n  pages        = {331},\n  year         = {2011},\n  url          = {http://eprint.iacr.org/2011/331},\n  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniPCBN11.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Vulnerability analysis of RFID protocols for tag ownership transfer.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Tapiador, J. E.; Li, T.; and Li, Y.\n\n\n \n\n\n\n Comput. Networks, 54(9): 1502–1508. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"VulnerabilityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/cn/Peris-LopezHTLL10,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan E. Tapiador and\n                  Tieyan Li and\n                  Yingjiu Li},\n  title        = {Vulnerability analysis of {RFID} protocols for tag ownership transfer},\n  journal      = {Comput. Networks},\n  volume       = {54},\n  number       = {9},\n  pages        = {1502--1508},\n  year         = {2010},\n  url          = {https://doi.org/10.1016/j.comnet.2009.11.007},\n  doi          = {10.1016/J.COMNET.2009.11.007},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/cn/Peris-LopezHTLL10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.\n \n \n \n \n\n\n \n Mitrokotsa, A.; Dimitrakakis, C.; Peris-Lopez, P.; and Castro, J. C. H.\n\n\n \n\n\n\n IEEE Commun. Lett., 14(2): 121–123. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"ReidPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/icl/MitrokotsaDPC10,\n  author       = {Aikaterini Mitrokotsa and\n                  Christos Dimitrakakis and\n                  Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n  title        = {Reid et al.'s distance bounding protocol and mafia fraud attacks over\n                  noisy channels},\n  journal      = {{IEEE} Commun. Lett.},\n  volume       = {14},\n  number       = {2},\n  pages        = {121--123},\n  year         = {2010},\n  url          = {https://doi.org/10.1109/LCOMM.2010.02.091946},\n  doi          = {10.1109/LCOMM.2010.02.091946},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/icl/MitrokotsaDPC10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Li, T.; and Hernandez-Castro, J. C.\n\n\n \n\n\n\n IEICE Trans. Inf. Syst., 93-D(3): 518–527. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"LightweightPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ieicet/Peris-LopezLH10,\n  author       = {Pedro Peris{-}Lopez and\n                  Tieyan Li and\n                  Julio C. Hernandez{-}Castro},\n  title        = {Lightweight Props on the Weak Security of {EPC} Class-1 Generation-2\n                  Standard},\n  journal      = {{IEICE} Trans. Inf. Syst.},\n  volume       = {93-D},\n  number       = {3},\n  pages        = {518--527},\n  year         = {2010},\n  url          = {https://doi.org/10.1587/transinf.E93.D.518},\n  doi          = {10.1587/TRANSINF.E93.D.518},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ieicet/Peris-LopezLH10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Phan, R. C.; Estévez-Tapiador, J. M.; and Li, T.\n\n\n \n\n\n\n In Lai, X.; Yung, M.; and Lin, D., editor(s), Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, volume 6584, of Lecture Notes in Computer Science, pages 427–442, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"Quasi-LinearPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Raphael C.{-}W. Phan and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Tieyan Li},\n  editor       = {Xuejia Lai and\n                  Moti Yung and\n                  Dongdai Lin},\n  title        = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication\n                  Protocol},\n  booktitle    = {Information Security and Cryptology - 6th International Conference,\n                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected\n                  Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6584},\n  pages        = {427--442},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-21518-6\\_30},\n  doi          = {10.1007/978-3-642-21518-6\\_30},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cisc/Peris-LopezCPEL10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptographically secure pseudo-random bit generator for RFID tags.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Millán, E. S.; van der Lubbe, J. C. A.; and Entrena, L.\n\n\n \n\n\n\n In 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pages 1–6, 2010. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"CryptographicallyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icitst/Peris-LopezMLE10,\n  author       = {Pedro Peris{-}Lopez and\n                  Enrique San Mill{\\'{a}}n and\n                  Jan C. A. van der Lubbe and\n                  Luis Entrena},\n  title        = {Cryptographically secure pseudo-random bit generator for {RFID} tags},\n  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,\n                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},\n  pages        = {1--6},\n  publisher    = {{IEEE}},\n  year         = {2010},\n  url          = {https://ieeexplore.ieee.org/document/5678035/},\n  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icitst/Peris-LopezMLE10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.\n \n \n \n \n\n\n \n Castro, J. C. H.; Peris-Lopez, P.; Phan, R. C.; and Estévez-Tapiador, J. M.\n\n\n \n\n\n\n In Yalçin, S. B. Ö., editor(s), Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers, volume 6370, of Lecture Notes in Computer Science, pages 22–34, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidsec/CastroPPE10,\n  author       = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez and\n                  Raphael C.{-}W. Phan and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador},\n  editor       = {Siddika Berna {\\"{O}}rs Yal{\\c{c}}in},\n  title        = {Cryptanalysis of the David-Prasad {RFID} Ultralightweight Authentication\n                  Protocol},\n  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th\n                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,\n                  2010, Revised Selected Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6370},\n  pages        = {22--34},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-16822-2\\_3},\n  doi          = {10.1007/978-3-642-16822-2\\_3},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/rfidsec/CastroPPE10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Vulnerability Analysis of PAP for RFID Tags.\n \n \n \n \n\n\n \n Naser, M.; Peris-Lopez, P.; Rafie, M.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n CoRR, abs/1008.3625. 2010.\n \n\n\n\n
\n\n\n\n \n \n \"VulnerabilityPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1008-3625,\n  author       = {Mu'awya Naser and\n                  Pedro Peris{-}Lopez and\n                  Mohammd Rafie and\n                  Jan C. A. van der Lubbe},\n  title        = {Vulnerability Analysis of {PAP} for {RFID} Tags},\n  journal      = {CoRR},\n  volume       = {abs/1008.3625},\n  year         = {2010},\n  url          = {http://arxiv.org/abs/1008.3625},\n  eprinttype    = {arXiv},\n  eprint       = {1008.3625},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-3625.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Li, T.; Hernandez-Castro, J. C.; and Tapiador, J. E.\n\n\n \n\n\n\n Comput. Commun., 32(7-10): 1185–1193. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"PracticalPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/comcom/Peris-LopezLHT09,\n  author       = {Pedro Peris{-}Lopez and\n                  Tieyan Li and\n                  Julio C. Hernandez{-}Castro and\n                  Juan E. Tapiador},\n  title        = {Practical attacks on a mutual authentication scheme under the {EPC}\n                  Class-1 Generation-2 standard},\n  journal      = {Comput. Commun.},\n  volume       = {32},\n  number       = {7-10},\n  pages        = {1185--1193},\n  year         = {2009},\n  url          = {https://doi.org/10.1016/j.comcom.2009.03.010},\n  doi          = {10.1016/J.COMCOM.2009.03.010},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/comcom/Peris-LopezLHT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n Comput. Stand. Interfaces, 31(1): 88–97. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"LAMEDPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/csi/Peris-LopezHER09,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  title        = {{LAMED} - {A} {PRNG} for {EPC} Class-1 Generation-2 {RFID} specification},\n  journal      = {Comput. Stand. Interfaces},\n  volume       = {31},\n  number       = {1},\n  pages        = {88--97},\n  year         = {2009},\n  url          = {https://doi.org/10.1016/j.csi.2007.11.013},\n  doi          = {10.1016/J.CSI.2007.11.013},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/csi/Peris-LopezHER09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n Comput. Stand. Interfaces, 31(2): 372–380. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/csi/Peris-LopezCTR09,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  title        = {Cryptanalysis of a novel authentication protocol conforming to {EPC-C1G2}\n                  standard},\n  journal      = {Comput. Stand. Interfaces},\n  volume       = {31},\n  number       = {2},\n  pages        = {372--380},\n  year         = {2009},\n  url          = {https://doi.org/10.1016/j.csi.2008.05.012},\n  doi          = {10.1016/J.CSI.2008.05.012},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/csi/Peris-LopezCTR09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n J. Inf. Sci. Eng., 25(1): 33–57. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jise/Peris-LopezCER09,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  title        = {An Ultra Light Authentication Protocol Resistant to Passive Attacks\n                  under the Gen-2 Specification},\n  journal      = {J. Inf. Sci. Eng.},\n  volume       = {25},\n  number       = {1},\n  pages        = {33--57},\n  year         = {2009},\n  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\\_03.html},\n  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jise/Peris-LopezCER09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Weaknesses in Two Recent Lightweight RFID Authentication Protocols.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Tapiador, J. E.; Li, T.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n In Bao, F.; Yung, M.; Lin, D.; and Jing, J., editor(s), Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers, volume 6151, of Lecture Notes in Computer Science, pages 383–392, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"WeaknessesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cisc/Peris-LopezHTLL09,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan E. Tapiador and\n                  Tieyan Li and\n                  Jan C. A. van der Lubbe},\n  editor       = {Feng Bao and\n                  Moti Yung and\n                  Dongdai Lin and\n                  Jiwu Jing},\n  title        = {Weaknesses in Two Recent Lightweight {RFID} Authentication Protocols},\n  booktitle    = {Information Security and Cryptology - 5th International Conference,\n                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected\n                  Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6151},\n  pages        = {383--392},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-16342-5\\_28},\n  doi          = {10.1007/978-3-642-16342-5\\_28},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cisc/Peris-LopezHTLL09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol.\n \n \n \n \n\n\n \n Hernandez-Castro, J. C.; Tapiador, J. E.; Peris-Lopez, P.; Clark, J. A.; and Talbi, E.\n\n\n \n\n\n\n In 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pages 1–5, 2009. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"MetaheuristicPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ipps/Hernandez-CastroTPCT09,\n  author       = {Julio C. Hernandez{-}Castro and\n                  Juan E. Tapiador and\n                  Pedro Peris{-}Lopez and\n                  John A. Clark and\n                  El{-}Ghazali Talbi},\n  title        = {Metaheuristic traceability attack against SLMAP, an {RFID} lightweight\n                  authentication protocol},\n  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,\n                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},\n  pages        = {1--5},\n  publisher    = {{IEEE}},\n  year         = {2009},\n  url          = {https://doi.org/10.1109/IPDPS.2009.5161121},\n  doi          = {10.1109/IPDPS.2009.5161121},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/ipps/Hernandez-CastroTPCT09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Estévez-Tapiador, J. M.; Millán, E. S.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n In Gu, Q.; Zang, W.; and Yu, M., editor(s), Security in Emerging Wireless Communication and Networking Systems - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers, volume 42, of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 25–35, 2009. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sewcn/Peris-LopezHEML09,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Enrique San Mill{\\'{a}}n and\n                  Jan C. A. van der Lubbe},\n  editor       = {Qijun Gu and\n                  Wanyu Zang and\n                  Meng Yu},\n  title        = {Security Flaws in an Efficient Pseudo-Random Number Generator for\n                  Low-Power Environments},\n  booktitle    = {Security in Emerging Wireless Communication and Networking Systems\n                  - First International {ICST} Workshop, {SEWCN} 2009, Athens, Greece,\n                  September 14, 2009, Revised Selected Papers},\n  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics\n                  and Telecommunications Engineering},\n  volume       = {42},\n  pages        = {25--35},\n  publisher    = {Springer},\n  year         = {2009},\n  url          = {https://doi.org/10.1007/978-3-642-11526-4\\_3},\n  doi          = {10.1007/978-3-642-11526-4\\_3},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sewcn/Peris-LopezHEML09.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n CoRR, abs/0906.4618. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"SheddingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-0906-4618,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Jan C. A. van der Lubbe},\n  title        = {Shedding Some Light on {RFID} Distance Bounding Protocols and Terrorist\n                  Attacks},\n  journal      = {CoRR},\n  volume       = {abs/0906.4618},\n  year         = {2009},\n  url          = {http://arxiv.org/abs/0906.4618},\n  eprinttype    = {arXiv},\n  eprint       = {0906.4618},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-0906-4618.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Security Flaws in a Recent Ultralightweight RFID Protocol.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Estévez-Tapiador, J. M.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n CoRR, abs/0910.2115. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"SecurityPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-0910-2115,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Jan C. A. van der Lubbe},\n  title        = {Security Flaws in a Recent Ultralightweight {RFID} Protocol},\n  journal      = {CoRR},\n  volume       = {abs/0910.2115},\n  year         = {2009},\n  url          = {http://arxiv.org/abs/0910.2115},\n  eprinttype    = {arXiv},\n  eprint       = {0910.2115},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-2115.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.\n \n \n \n \n\n\n \n Estévez-Tapiador, J. M.; Castro, J. C. H.; Peris-Lopez, P.; and Ribagorda, A.\n\n\n \n\n\n\n J. Inf. Sci. Eng., 24(5): 1485–1504. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"AutomatedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jise/Estevez-TapiadorCPR08,\n  author       = {Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Pedro Peris{-}Lopez and\n                  Arturo Ribagorda},\n  title        = {Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear\n                  Functions},\n  journal      = {J. Inf. Sci. Eng.},\n  volume       = {24},\n  number       = {5},\n  pages        = {1485--1504},\n  year         = {2008},\n  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\\_13.html},\n  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/jise/Estevez-TapiadorCPR08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Lim, T.; and Li, T.\n\n\n \n\n\n\n In Xu, C.; and Guo, M., editor(s), 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pages 159–166, 2008. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ProvidingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/euc/Peris-LopezLL08,\n  author       = {Pedro Peris{-}Lopez and\n                  Tong{-}Lee Lim and\n                  Tieyan Li},\n  editor       = {Cheng{-}Zhong Xu and\n                  Minyi Guo},\n  title        = {Providing Stronger Authentication at a Low Cost to {RFID} Tags Operating\n                  under the EPCglobal Framework},\n  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous\n                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume\n                  {II:} Workshops},\n  pages        = {159--166},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2008},\n  url          = {https://doi.org/10.1109/EUC.2008.82},\n  doi          = {10.1109/EUC.2008.82},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/euc/Peris-LopezLL08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Chung, K.; Sohn, K.; and Yung, M., editor(s), Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, volume 5379, of Lecture Notes in Computer Science, pages 56–68, 2008. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AdvancesPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wisa/Peris-LopezCER08,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Kyo{-}Il Chung and\n                  Kiwook Sohn and\n                  Moti Yung},\n  title        = {Advances in Ultralightweight Cryptography for Low-Cost {RFID} Tags:\n                  Gossamer Protocol},\n  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}\n                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected\n                  Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {5379},\n  pages        = {56--68},\n  publisher    = {Springer},\n  year         = {2008},\n  url          = {https://doi.org/10.1007/978-3-642-00306-6\\_5},\n  doi          = {10.1007/978-3-642-00306-6\\_5},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/wisa/Peris-LopezCER08.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations.\n \n \n \n \n\n\n \n Castro, J. C. H.; Estévez-Tapiador, J. M.; Peris-Lopez, P.; and Quisquater, J.\n\n\n \n\n\n\n CoRR, abs/0811.4257. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"CryptanalysisPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-0811-4257,\n  author       = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Pedro Peris{-}Lopez and\n                  Jean{-}Jacques Quisquater},\n  title        = {Cryptanalysis of the {SASI} Ultralightweight {RFID} Authentication\n                  Protocol with Modular Rotations},\n  journal      = {CoRR},\n  volume       = {abs/0811.4257},\n  year         = {2008},\n  url          = {http://arxiv.org/abs/0811.4257},\n  eprinttype    = {arXiv},\n  eprint       = {0811.4257},\n  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-0811-4257.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Denko, M. K.; Shih, C.; Li, K.; Tsao, S.; Zeng, Q.; Park, S.; Ko, Y.; Hung, S.; and Park, J. H., editor(s), Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, volume 4809, of Lecture Notes in Computer Science, pages 781–794, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/euc/Peris-LopezCER07,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Mieso K. Denko and\n                  Chi{-}Sheng Shih and\n                  Kuan{-}Ching Li and\n                  Shiao{-}Li Tsao and\n                  Qing{-}An Zeng and\n                  Soo{-}Hyun Park and\n                  Young{-}Bae Ko and\n                  Shih{-}Hao Hung and\n                  Jong Hyuk Park},\n  title        = {An Efficient Authentication Protocol for {RFID} Systems Resistant\n                  to Active Attacks},\n  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007\n                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,\n                  Taiwan, December 17-20, 2007, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4809},\n  pages        = {781--794},\n  publisher    = {Springer},\n  year         = {2007},\n  url          = {https://doi.org/10.1007/978-3-540-77090-9\\_71},\n  doi          = {10.1007/978-3-540-77090-9\\_71},\n  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},\n  biburl       = {https://dblp.org/rec/conf/euc/Peris-LopezCER07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Georgiadis, P.; López, J.; Gritzalis, S.; and Marias, G. F., editor(s), Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007, pages 55–60, 2007. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SolvingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/secperu/Peris-LopezHER07,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C. Hernandez{-}Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Panagiotis Georgiadis and\n                  Javier L{\\'{o}}pez and\n                  Stefanos Gritzalis and\n                  Giannis F. Marias},\n  title        = {Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs\n                  for {RFID} Tags},\n  booktitle    = {Third International Workshop on Security, Privacy and Trust in Pervasive\n                  and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19,\n                  2007},\n  pages        = {55--60},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2007},\n  url          = {https://doi.org/10.1109/SECPERU.2007.12},\n  doi          = {10.1109/SECPERU.2007.12},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/secperu/Peris-LopezHER07.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n RFID Systems: A Survey on Security Threats and Proposed Solutions.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Cuenca, P.; and Orozco-Barbosa, L., editor(s), Personal Wireless Communications, IFIP TC6 11th International Conference, PWC 2006, Albacete, Spain, September 20-22, 2006, Proceedings, volume 4217, of Lecture Notes in Computer Science, pages 159–170, 2006. Springer\n \n\n\n\n
\n\n\n\n \n \n \"RFIDPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ifip6-8/Peris-LopezHER06,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Pedro Cuenca and\n                  Luis Orozco{-}Barbosa},\n  title        = {{RFID} Systems: {A} Survey on Security Threats and Proposed Solutions},\n  booktitle    = {Personal Wireless Communications, {IFIP} {TC6} 11th International\n                  Conference, {PWC} 2006, Albacete, Spain, September 20-22, 2006, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4217},\n  pages        = {159--170},\n  publisher    = {Springer},\n  year         = {2006},\n  url          = {https://doi.org/10.1007/11872153\\_14},\n  doi          = {10.1007/11872153\\_14},\n  timestamp    = {Fri, 14 May 2021 08:28:27 +0200},\n  biburl       = {https://dblp.org/rec/conf/ifip6-8/Peris-LopezHER06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Meersman, R.; Tari, Z.; and Herrero, P., editor(s), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, volume 4277, of Lecture Notes in Computer Science, pages 352–361, 2006. Springer\n \n\n\n\n
\n\n\n\n \n \n \"EMAP:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/otm/Peris-LopezCTR06,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Robert Meersman and\n                  Zahir Tari and\n                  Pilar Herrero},\n  title        = {{EMAP:} An Efficient Mutual-Authentication Protocol for Low-Cost {RFID}\n                  Tags},\n  booktitle    = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops,\n                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,\n                  COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM}\n                  Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier,\n                  France, October 29 - November 3, 2006. Proceedings, Part {I}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4277},\n  pages        = {352--361},\n  publisher    = {Springer},\n  year         = {2006},\n  url          = {https://doi.org/10.1007/11915034\\_59},\n  doi          = {10.1007/11915034\\_59},\n  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},\n  biburl       = {https://dblp.org/rec/conf/otm/Peris-LopezCTR06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n M\\(^\\mbox2\\)AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Castro, J. C. H.; Estévez-Tapiador, J. M.; and Ribagorda, A.\n\n\n \n\n\n\n In Ma, J.; Jin, H.; Yang, L. T.; and Tsai, J. J. P., editor(s), Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, volume 4159, of Lecture Notes in Computer Science, pages 912–923, 2006. Springer\n \n\n\n\n
\n\n\n\n \n \n \"M\\(^\\mbox2\\)AP:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/uic/Peris-LopezCER06,\n  author       = {Pedro Peris{-}Lopez and\n                  Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n                  Juan M. Est{\\'{e}}vez{-}Tapiador and\n                  Arturo Ribagorda},\n  editor       = {Jianhua Ma and\n                  Hai Jin and\n                  Laurence Tianruo Yang and\n                  Jeffrey J. P. Tsai},\n  title        = {M\\({}^{\\mbox{2}}\\)AP: {A} Minimalist Mutual-Authentication Protocol\n                  for Low-Cost {RFID} Tags},\n  booktitle    = {Ubiquitous Intelligence and Computing, Third International Conference,\n                  {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {4159},\n  pages        = {912--923},\n  publisher    = {Springer},\n  year         = {2006},\n  url          = {https://doi.org/10.1007/11833529\\_93},\n  doi          = {10.1007/11833529\\_93},\n  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},\n  biburl       = {https://dblp.org/rec/conf/uic/Peris-LopezCER06.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);