Pedro Peris-Lopez

According to our database1, Pedro Peris-Lopez
  • authored at least 78 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 




Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Generation Comp. Syst., 2018

Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018

A lightweight implementation of the Tav-128 hash function.
IEICE Electronic Express, 2017

Encryption by Heart (EbH) - Using ECG for time-invariant symmetric key generation.
Future Generation Comp. Syst., 2017

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing.
Computers & Security, 2017

A New TRNG Based on Coherent Sampling With Self-Timed Rings.
IEEE Trans. Industrial Informatics, 2016

PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things.
J. Network and Computer Applications, 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Weaknesses of fingerprint-based mutual authentication protocol.
Security and Communication Networks, 2015

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive and Mobile Computing, 2015

Hindering data theft with encrypted data trees.
Journal of Systems and Software, 2015

Human Identification Using Compressed ECG Signals.
J. Medical Systems, 2015

Security and privacy issues in implantable medical devices: A comprehensive survey.
Journal of Biomedical Informatics, 2015

DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Computer Networks, 2015

Probabilistic yoking proofs for large scale IoT systems.
Ad Hoc Networks, 2015

Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Proceedings of the Information Security Theory and Practice, 2015

Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach.
Proceedings of the Network and System Security - 9th International Conference, 2015

An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms.
IEEE Trans. Industrial Informatics, 2014

Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Security and Communication Networks, 2014

Randomized Anagram revisited.
J. Network and Computer Applications, 2014

Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Computational Applied Mathematics, 2014

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Systems, 2014

Evolution, Detection and Analysis of Malware for Smart Devices.
IEEE Communications Surveys and Tutorials, 2014

Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models.
Proceedings of the Computer Security - ESORICS 2014, 2014

Peak misdetection in heart-beat-based security: Characterization and tolerance.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Cryptanalysis of the RNTS system.
The Journal of Supercomputing, 2013

A system architecture, processor, and communication protocol for secure implants.
TACO, 2013

Two RFID Standard-based Security Protocols for Healthcare Environments.
J. Medical Systems, 2013

Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Communications Letters, 2013

On Selecting the Nonce Length in Distance-Bounding Protocols.
Comput. J., 2013

A secure distance-based RFID identification protocol with an off-line back-end database.
Personal and Ubiquitous Computing, 2012

Evaluation of classification algorithms for intrusion detection in MANETs.
Knowl.-Based Syst., 2012

Online Randomization Strategies to Obfuscate User Behavioral Patterns.
J. Network Syst. Manage., 2012

Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012

Cryptanalysis of RAPP, an RFID Authentication Protocol.
IACR Cryptology ePrint Archive, 2012

Another Fallen Hash-Based RFID Authentication Protocol.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Weaknesses in another Gen2-based RFID authentication protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the traceability of tags in SUAP RFID authentication protocols.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Network and Computer Applications, 2011

A comprehensive RFID solution to enhance inpatient medication safety.
I. J. Medical Informatics, 2011

Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptology ePrint Archive, 2011

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. of AI, 2011

Cryptanalysis of Song's advanced smart card based password authentication protocol
CoRR, 2011

A note on the security of PAP.
Computer Communications, 2011

Studying the pseudo random number generator of a low-cost RFID tag.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

AKARI-X: A pseudorandom number generator for secure lightweight systems.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011

A Note on a Privacy-Preserving Distance-Bounding Protocol.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On the Key Schedule Strength of PRESENT.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Transactions, 2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Communications Letters, 2010

Vulnerability Analysis of PAP for RFID Tags
CoRR, 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Computer Networks, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Cryptographically secure pseudo-random bit generator for RFID tags.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Computer Standards & Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Computer Standards & Interfaces, 2009

Security Flaws in a Recent Ultralightweight RFID Protocol
CoRR, 2009

Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
CoRR, 2009

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Computer Communications, 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006