Pedro Peris-Lopez

Orcid: 0000-0001-6943-0760

According to our database1, Pedro Peris-Lopez authored at least 100 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.
Sensors, January, 2023

Unleashing the Power of Electrocardiograms: A novel approach for Patient Identification in Healthcare Systems with ECG Signals.
CoRR, 2023

Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection.
Proceedings of the 19th IEEE International Conference on Body Sensor Networks, 2023

2022
Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices.
IEEE Syst. J., 2022

Challenging the security of "A PUF-based hardware mutual authentication protocol".
J. Parallel Distributed Comput., 2022

ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks.
Neurocomputing, 2022

ECGsound for human identification.
Biomed. Signal Process. Control., 2022

Generation and Classification of Illicit Bitcoin Transactions.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

2021
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing.
Veh. Commun., 2021

Access Control for Implantable Medical Devices.
IEEE Trans. Emerg. Top. Comput., 2021

2020
Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation.
Future Gener. Comput. Syst., 2020

Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange.
IEEE Access, 2020

A True Random Number Generator Based on Gait Data for the Internet of You.
IEEE Access, 2020

2019
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks.
Sensors, 2019

Editorial: Security and Privacy in Internet of Things.
Mob. Networks Appl., 2019

Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019

LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT.
Future Gener. Comput. Syst., 2019

2018
ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks.
Sensors, 2018

On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification.
Sensors, 2018

Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.
Sensors, 2018

Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Gener. Comput. Syst., 2018

Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018

On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation.
Entropy, 2018

Real-time electrocardiogram streams for continuous authentication.
Appl. Soft Comput., 2018

Forensics Analysis of an On-line Game over Steam Platform.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

2017
A lightweight implementation of the Tav-128 hash function.
IEICE Electron. Express, 2017

Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Gener. Comput. Syst., 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Comput. Secur., 2017

2016
A New TRNG Based on Coherent Sampling With Self-Timed Rings.
IEEE Trans. Ind. Informatics, 2016

PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Netw. Comput. Appl., 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Weaknesses of fingerprint-based mutual authentication protocol.
Secur. Commun. Networks, 2015

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015

Hindering data theft with encrypted data trees.
J. Syst. Softw., 2015

Human Identification Using Compressed ECG Signals.
J. Medical Syst., 2015

Security and privacy issues in implantable medical devices: A comprehensive survey.
J. Biomed. Informatics, 2015

DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Proceedings of the Information Security Theory and Practice, 2015

Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms.
IEEE Trans. Ind. Informatics, 2014

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Secur. Commun. Networks, 2014

Randomized Anagram revisited.
J. Netw. Comput. Appl., 2014

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Comput. Appl. Math., 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Syst. J. Knowl. Eng., 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Commun. Surv. Tutorials, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Peak misdetection in heart-beat-based security: Characterization and tolerance.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Cryptanalysis of the RNTS system.
J. Supercomput., 2013

A system architecture, processor, and communication protocol for secure implants.
ACM Trans. Archit. Code Optim., 2013

Two RFID Standard-based Security Protocols for Healthcare Environments.
J. Medical Syst., 2013

Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Commun. Lett., 2013

On Selecting the Nonce Length in Distance-Bounding Protocols.
Comput. J., 2013

2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012

Evaluation of classification algorithms for intrusion detection in MANETs.
Knowl. Based Syst., 2012

Online Randomization Strategies to Obfuscate User Behavioral Patterns.
J. Netw. Syst. Manag., 2012

Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012

Cryptanalysis of RAPP, an RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2012

Another Fallen Hash-Based RFID Authentication Protocol.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Weaknesses in another Gen2-based RFID authentication protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the traceability of tags in SUAP RFID authentication protocols.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

2011
Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Netw. Comput. Appl., 2011

A comprehensive RFID solution to enhance inpatient medication safety.
Int. J. Medical Informatics, 2011

Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011

Cryptanalysis of Song's advanced smart card based password authentication protocol
CoRR, 2011

A note on the security of PAP.
Comput. Commun., 2011

Studying the pseudo random number generator of a low-cost RFID tag.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

AKARI-X: A pseudorandom number generator for secure lightweight systems.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011

A Note on a Privacy-Preserving Distance-Bounding Protocol.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On the Key Schedule Strength of PRESENT.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Trans. Inf. Syst., 2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Commun. Lett., 2010

Vulnerability Analysis of PAP for RFID Tags
CoRR, 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Comput. Networks, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Cryptographically secure pseudo-random bit generator for RFID tags.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Comput. Stand. Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Comput. Stand. Interfaces, 2009

Security Flaws in a Recent Ultralightweight RFID Protocol
CoRR, 2009

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
CoRR, 2009

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
M<sup>2</sup>AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006


  Loading...