Pablo Picazo-Sanchez

Orcid: 0000-0002-0303-3858

According to our database1, Pablo Picazo-Sanchez authored at least 30 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Breaking the silence: the rise of hate speech in Spanish politics.
J. Comput. Soc. Sci., August, 2025

Snort Meets Transformers: Accelerating Transformer-Based Network Traffic Classification for Real-Time Performance.
Proceedings of the 18th European Workshop on Systems Security, 2025

2024
Analysing the impact of ChatGPT in research.
Appl. Intell., March, 2024

Policy Parsing Panthers at Touché: Ideology and Power Identification in Parliamentary Debates.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024

FakeX: A Framework for Detecting Fake Reviews of Browser Extensions.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng., September, 2023

Gridchain: an investigation of privacy for the future local distribution grid.
Int. J. Inf. Sec., 2023

IBE.js: A Framework for Instrumenting Browser Extensions.
Proceedings of the 18th International Conference on Software Technologies, 2023

Clipaha: A Scheme to Perform Password Stretching on the Client.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Modelling cryptographic distinguishers using machine learning.
J. Cryptogr. Eng., 2022

Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci., 2022

Are chrome extensions compliant with the spirit of least privilege?
Int. J. Inf. Sec., 2022

Heart-Based Biometric Protocols: A look back over almost two decades.
CoRR, 2022

Hardening the security analysis of browser extensions.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
A collaborative access control framework for online social networks.
J. Log. Algebraic Methods Program., 2020

After you, please: browser extensions order attacks and countermeasures.
Int. J. Inf. Sec., 2020

Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation.
Future Gener. Comput. Syst., 2020

HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018

Migrating Monitors + ABE: A Suitable Combination for Secure IoT?
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

\mathsf HIKE : Walking the Privacy Trail.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Secure Photo Sharing in Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2015
Weaknesses of fingerprint-based mutual authentication protocol.
Secur. Commun. Networks, 2015

2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

2013
Cryptanalysis of the RNTS system.
J. Supercomput., 2013

Two RFID Standard-based Security Protocols for Healthcare Environments.
J. Medical Syst., 2013


  Loading...