According to our database1, Jorge Munilla authored at least 50 papers between 2006 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.
Inf. Syst., 2020
Label aided deep ranking for the automatic diagnosis of Parkinsonian syndromes.
Empirical Functional PCA for 3D Image Feature Extraction Through Fractal Sampling.
Int. J. Neural Syst., 2019
Parkinson's Disease Detection Using Isosurfaces-Based Features and Convolutional Neural Networks.
Frontiers Neuroinformatics, 2019
Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019
Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis.
Proceedings of the Understanding the Brain Function and Emotions, 2019
e-Academy to support Smart Cities Operations in Palestine (eSCO) project: progress report.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems".
IEEE Trans. Information Forensics and Security, 2018
Performance Analysis of LDPC-Based RFID Group Coding.
IEEE Trans Autom. Sci. Eng., 2017
RFID Ownership Transfer with Positive Secrecy Capacity Channels.
An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer Peer Netw. Appl., 2017
Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis.
Knowl. Based Syst., 2017
Construction and Analysis of Weighted Brain Networks from SICE for the Study of Alzheimer's Disease.
Frontiers Neuroinformatics, 2017
Learning Longitudinal MRI Patterns by SICE and Deep Learning: Assessing the Alzheimer's Disease Progression.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017
Secure UAV-Based System to Detect and Filter Sea Objects Using Image Processing.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017
Ensembles of Deep Learning Architectures for the Early Diagnosis of the Alzheimer's Disease.
Int. J. Neural Syst., 2016
Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.
Log. J. IGPL, 2016
Tag Memory-Erasure Tradeoff of RFID Grouping Codes.
IEEE Communications Letters, 2016
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols.
IACR Cryptol. ePrint Arch., 2016
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments.
Comput. Commun., 2016
Resilient Grouping Proofs with Missing Tag Identification.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
An anonymous RFID grouping-proof with missing tag identification.
Proceedings of the 2016 IEEE International Conference on RFID, 2016
Resilient Metro-scale Smart Structures: Challenges & Future Directions.
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Revision of J3Gen and Validity of the Attacks by Peinado et al.
Exploratory graphical models of functional and structural connectivity patterns for Alzheimer's Disease diagnosis.
Frontiers Comput. Neurosci., 2015
Automated Diagnosis of Alzheimer's Disease by Integrating Genetic Biomarkers and Tissue Density Information.
Proceedings of the Artificial Computation in Biology and Medicine, 2015
Pre vs Post State Update: Trading Privacy for Availability in RFID.
IEEE Wirel. Commun. Lett., 2014
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen.
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
IACR Cryptol. ePrint Arch., 2014
Improving the Period and Linear Span of the Sequences Generated by DLFSRs.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Group-scanning for supply chain management.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wireless Personal Communications, 2013
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptol. ePrint Arch., 2013
Distributed Group Authentication for RFID Supply Management.
IACR Cryptol. ePrint Arch., 2013
Lightweight Authentication Protocols based on Rotations and the LPN Problem.
Proceedings of the SENSORNETS 2012, 2012
Lightweight RFID authentication with forward and backward security.
ACM Trans. Inf. Syst. Secur., 2011
Enhanced low-cost RFID protocol to detect relay attacks.
Wireless Communications and Mobile Computing, 2010
Attacks on a distance bounding protocol.
Comput. Commun., 2010
Robotic vehicles to simulate RFID-based vehicular ad hoc networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010
What can RFID do for Vanets? - A Cryptographic Point of View.
Proceedings of the SECRYPT 2010, 2010
Secure EPC Gen2 compliant Radio Frequency Identification.
IACR Cryptol. ePrint Arch., 2009
Security flaw of Hölbl et al.'s protocol.
Comput. Commun., 2009
A Scaled Test Bench for Vanets with RFID Signalling.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
Wireless Communications and Mobile Computing, 2008
Simulador de Estudio de Grabación de Audio.
Rev. Iberoam. de Tecnol. del Aprendiz., 2008
Attacks on Singelee and Preneel's protocol.
IACR Cryptol. ePrint Arch., 2008
Security Analysis of Tu and Piramuthu's Protocol.
Proceedings of the NTMS 2008, 2008
HB-MP: A further step in the HB-family of lightweight authentication protocols.
Comput. Networks, 2007
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol.
Comput. Commun., 2006