Jorge Munilla

According to our database1, Jorge Munilla authored at least 50 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.
Inf. Syst., 2020

2019
Label aided deep ranking for the automatic diagnosis of Parkinsonian syndromes.
Neurocomputing, 2019

Empirical Functional PCA for 3D Image Feature Extraction Through Fractal Sampling.
Int. J. Neural Syst., 2019

Parkinson's Disease Detection Using Isosurfaces-Based Features and Convolutional Neural Networks.
Frontiers Neuroinformatics, 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Isosurface Modelling of DatSCAN Images for Parkinson Disease Diagnosis.
Proceedings of the Understanding the Brain Function and Emotions, 2019

e-Academy to support Smart Cities Operations in Palestine (eSCO) project: progress report.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

2018
Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems".
IEEE Trans. Information Forensics and Security, 2018

2017
Performance Analysis of LDPC-Based RFID Group Coding.
IEEE Trans Autom. Sci. Eng., 2017

RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer Peer Netw. Appl., 2017

Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis.
Knowl. Based Syst., 2017

Construction and Analysis of Weighted Brain Networks from SICE for the Study of Alzheimer's Disease.
Frontiers Neuroinformatics, 2017

Learning Longitudinal MRI Patterns by SICE and Deep Learning: Assessing the Alzheimer's Disease Progression.
Proceedings of the Medical Image Understanding and Analysis - 21st Annual Conference, 2017

Secure UAV-Based System to Detect and Filter Sea Objects Using Image Processing.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2017, 2017

2016
Ensembles of Deep Learning Architectures for the Early Diagnosis of the Alzheimer's Disease.
Int. J. Neural Syst., 2016

Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.
Log. J. IGPL, 2016

Tag Memory-Erasure Tradeoff of RFID Grouping Codes.
IEEE Communications Letters, 2016

KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols.
IACR Cryptol. ePrint Arch., 2016

Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments.
Comput. Commun., 2016

Resilient Grouping Proofs with Missing Tag Identification.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

An anonymous RFID grouping-proof with missing tag identification.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

Resilient Metro-scale Smart Structures: Challenges & Future Directions.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
Revision of J3Gen and Validity of the Attacks by Peinado et al.
Sensors, 2015

Exploratory graphical models of functional and structural connectivity patterns for Alzheimer's Disease diagnosis.
Frontiers Comput. Neurosci., 2015

Automated Diagnosis of Alzheimer's Disease by Integrating Genetic Biomarkers and Tissue Density Information.
Proceedings of the Artificial Computation in Biology and Medicine, 2015

2014
Pre vs Post State Update: Trading Privacy for Availability in RFID.
IEEE Wirel. Commun. Lett., 2014

EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen.
Sensors, 2014

Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
IACR Cryptol. ePrint Arch., 2014

Improving the Period and Linear Span of the Sequences Generated by DLFSRs.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Group-scanning for supply chain management.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

2013
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme.
Wireless Personal Communications, 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptol. ePrint Arch., 2013

Distributed Group Authentication for RFID Supply Management.
IACR Cryptol. ePrint Arch., 2013

2012
Lightweight Authentication Protocols based on Rotations and the LPN Problem.
Proceedings of the SENSORNETS 2012, 2012

2011
Lightweight RFID authentication with forward and backward security.
ACM Trans. Inf. Syst. Secur., 2011

2010
Enhanced low-cost RFID protocol to detect relay attacks.
Wireless Communications and Mobile Computing, 2010

Attacks on a distance bounding protocol.
Comput. Commun., 2010

Robotic vehicles to simulate RFID-based vehicular ad hoc networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

What can RFID do for Vanets? - A Cryptographic Point of View.
Proceedings of the SECRYPT 2010, 2010

2009
Secure EPC Gen2 compliant Radio Frequency Identification.
IACR Cryptol. ePrint Arch., 2009

Security flaw of Hölbl et al.'s protocol.
Comput. Commun., 2009

A Scaled Test Bench for Vanets with RFID Signalling.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
Wireless Communications and Mobile Computing, 2008

Simulador de Estudio de Grabación de Audio.
Rev. Iberoam. de Tecnol. del Aprendiz., 2008

Attacks on Singelee and Preneel's protocol.
IACR Cryptol. ePrint Arch., 2008

Security Analysis of Tu and Piramuthu's Protocol.
Proceedings of the NTMS 2008, 2008

2007
HB-MP: A further step in the HB-family of lightweight authentication protocols.
Comput. Networks, 2007

2006
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol.
Comput. Commun., 2006


  Loading...