Pino Caballero-Gil

Orcid: 0000-0002-0859-5876

According to our database1, Pino Caballero-Gil authored at least 183 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks.
Wirel. Networks, November, 2023

Qubit: The Game. Teaching Quantum Computing through a Game-Based Approach.
Proceedings of the Computational Science - ICCS 2023, 2023

McEliece Cryptosystem: Reducing the Key Size with QC-LDPC codes.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

Theoretical Analysis and Software Implementation of a Quantum Encryption Proposal.
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023

QuantumSolver Composer: Automatic Quantum Transformation of Classical Circuits.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

2022
Secure ambient intelligence prototype for airports.
J. Ambient Intell. Humaniz. Comput., 2022

Ethereum-based decentralized car rental system.
Log. J. IGPL, 2022

Drowsiness detection in drivers with a smartwatch.
CoRR, 2022

Study and security analysis of the Spanish identity card.
CoRR, 2022

QuantumSolver: A quantum tool-set for developers.
CoRR, 2022

Revocation management in vehicular ad-hoc networks.
CoRR, 2022

Analysis of the new standard hash function.
CoRR, 2022

Analysis of lightweight cryptographic solutions for authentication in IoT.
CoRR, 2022

RFID authentication protocol based on a novel EPC Gen2 PRNG.
CoRR, 2022

Secure Implementation of a Vehicular Application for the Symbian Platform.
CoRR, 2022

Application of Fuzzy Logic in a Secure Beacon-Based Guidance System for Public Transportation.
Int. J. Appl. Math. Comput. Sci., 2022

Detection of Anomalies in the Call Flow of an Emergency Management Center.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

BLE Beacon System for Smartphone Secure Tracking.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

Study and Implementation of an Interactive Simulation of Quantum Key Distribution Using the E91 Cryptographic Protocol.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022

2021
Using blockchain in the follow-up of emergency situations related to events.
Softw. Pract. Exp., 2021

Decision Support System Based on Indoor Location for Personnel Management.
Remote. Sens., 2021

Detection of forest fires outbreaks by dynamic fuzzy logic controller.
Log. J. IGPL, 2021

A secure approach to monitoring emergency health resources.
EURASIP J. Wirel. Commun. Netw., 2021

COEDU-IN Project: an inclusive co-educational project for teaching computational thinking and digital skills at early ages.
Proceedings of the 23rd International Symposium on Computers in Education, 2021

2020
Secure system based on UAV and BLE for improving SAR missions.
J. Ambient Intell. Humaniz. Comput., 2020

Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.
Inf. Syst., 2020

A secure mHealth application for attention deficit and hyperactivity disorder.
Expert Syst. J. Knowl. Eng., 2020

Bridging the diversity gap: actions and experiences fostering diversity in STEM.
Proceedings of the TEEM'20: Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality, 2020

Building an Ethereum-Based Decentralized Vehicle Rental System.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2019
Secure UAV-Based System to Detect Small Boats Using Neural Networks.
Complex., 2019

Priority and collision avoidance system for traffic lights.
Ad Hoc Networks, 2019

Blockchain-Based Ubiquitous Transport and Logistics Monitoring System.
Proceedings of the 13th International Conference on Ubiquitous Computing and Ambient Intelligence, 2019

Harassment Detection Using Machine Learning and Fuzzy Logic Techniques.
Proceedings of the 13th International Conference on Ubiquitous Computing and Ambient Intelligence, 2019

2018
Ambient Assisted Living and Ambient Intelligence for Health.
Mob. Inf. Syst., 2018

Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.
Complex., 2018

Beacon-Based Fuzzy Indoor Tracking at Airports.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

Monitoring Environmental Conditions in Airports with Wireless Sensor Networks.
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018

Fuzzy-Based Forest Fire Prevention and Detection by Wireless Sensor Networks.
Proceedings of the International Joint Conference SOCO'18-CISIS'18-ICEUTE'18, 2018

Ubiquitous Collision Avoidance System for Red Light Running.
Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, 2018

Ubiquitous System to Monitor Transport and Logistics.
Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, 2018

Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography.
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018

Secure Indoor Location for Airport Environments.
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018

Fuzzy Logic System for Identity Theft Detection in Social Networks.
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018

2017
Implementation and Analysis of Real-Time Streaming Protocols.
Sensors, 2017

Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017

Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.
Sensors, 2017

An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

A Luggage Control System Based on NFC and Homomorphic Cryptography.
Mob. Inf. Syst., 2017

Fuzzy-Logic-Based Application to Combat Gender Violence.
Int. J. Comput. Intell. Syst., 2017

Decentralized Authentication for Opportunistic Communications in Disaster Situations.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

Improving Tourist Experience Through an IoT Application Based on FatBeacons.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017

IBSC System for Victims Management in Emergency Scenarios.
Proceedings of the 2nd International Conference on Internet of Things, 2017

Video surveillance robot powered by raspberry pi.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Collaborative SQL-injections detection system with machine learning.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Mobile application for elderly assistance in public transport.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Smart contracts based on blockchain for logistics management.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Sensors, 2016

Cellular Automata-Based Application for Driver Assistance in Indoor Parking Areas.
Sensors, 2016

Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks.
Mob. Inf. Syst., 2016

Software implementation of the SNOW 3G Generator on iOS and Android platforms.
Log. J. IGPL, 2016

Merging sub-networks in self-managed vehicular ad-hoc networks.
Distributed Parallel Databases, 2016

An EXperimental Hybrid wIrelesS platform for vehicular networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

RoboCAM: Robot-Based Video Surveillance Application.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

Real-Time Streaming: A Comparative Study Between RTSP and WebRTC.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

Patients' Data Management System Through Identity Based Encryption.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

UAV-Based Rescue System for Emergency Situations.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

Development of an Android Application to Combat Domestic Violence.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016

A Secure Mobile Platform for Intelligent Transportation Systems.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Distributed Communication System for Emergencies.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

VANET Event Verification Based on User Trust.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

2015
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols.
Peer-to-Peer Netw. Appl., 2015

Self-Organized Clustering Architecture for Vehicular Ad Hoc Networks.
Int. J. Distributed Sens. Networks, 2015

Detection and Report of Traffic Lights Violation Using Sensors and Smartphones.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015

Low-Cost Service to Predict and Manage Indoor Parking Spaces.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015

Revocation Management in Vehicular Ad-hoc Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Poster: Indoor Location System for Vehicles.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Poster: Revocation in VANETs Based on k-ary Huffman Trees.
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015

Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography.
Proceedings of the ICEIS 2015, 2015

A Trustworthy Distributed Social Carpool Method.
Proceedings of the Euro-Par 2015: Parallel Processing Workshops, 2015

Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015

Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments.
Proceedings of the International Joint Conference, 2015

2014
Aggregation and probabilistic verification for data authentication in VANETs.
Inf. Sci., 2014

Mutual authentication in self-organized VANETs.
Comput. Stand. Interfaces, 2014

Alternative Communication System for Emergency Situations.
Proceedings of the WEBIST 2014, 2014

FastTriaje: A Mobile System for Victim Classification in Emergency Situations.
Proceedings of the WEBIST 2014, 2014

Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications.
Proceedings of the WOSIS 2014, 2014

Using query frequencies in tree-based revocation for certificateless authentication in VANETs.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Weak Equivalents for Nonlinear Filtering Functions.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

Tree-based revocation for authentication in vehicular ad-hoc networks.
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014

2013
How to build vehicular ad-hoc networks on smartphones.
J. Syst. Archit., 2013

Design and Implementation of an Application for Deploying Vehicular Networks with Smartphones.
Int. J. Distributed Sens. Networks, 2013

Using Identity-Based Cryptography in Mobile Applications.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Version of the New SHA Standard Applied to Manage Certificate Revocation in VANETs.
Proceedings of the Advances in Computational Intelligence, 2013

Strong authentication on smart wireless devices.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

Analysis of the New Standard Hash Function.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

Analysis of Lightweight Cryptographic Solutions for Authentication in IoT.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

IoT Application in the Supply Chain Logistics.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013

2012
Self-organizing life cycle management of mobile ad hoc networks.
Secur. Commun. Networks, 2012

Countermeasures to Prevent Misbehaviour in VANETs.
J. Univers. Comput. Sci., 2012

2011
Efficient Public Key Certificate Management for Mobile Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Analysis of the generalized self-shrinking generator.
Comput. Math. Appl., 2011

Chaotic modelling of the generalized self-shrinking generator.
Appl. Soft Comput., 2011

Enhancing Cooperation in Wireless Vehicular Networks.
Proceedings of the WOSIS 2011, 2011

Pseudorandom Generator to Strengthen Cooperation in VANETs.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Extending OLSR Functionalities to PKI Management.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Lightweight Authentication for RFID Used in VANETs.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Reputation lists and groups to promote cooperation.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

Introducing secure and self-organized vehicular ad-hoc networks.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

Data Aggregation Based on Fuzzy Logic for VANETs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
A simple linearization of the self-shrinking generator by means of cellular automata.
Neural Networks, 2010

Flexible Authentication in Vehicular Ad hoc Networks
CoRR, 2010

Stimulating Cooperation in Self-Organized Vehicular Networks
CoRR, 2010

On the Use of Cellular Automata in Symmetric Cryptography
CoRR, 2010

Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
CoRR, 2010

Linear solutions for cryptographic nonlinear sequence generators
CoRR, 2010

On the Design of Cryptographic Primitives
CoRR, 2010

Secret Sharing Based on a Hard-on-Average Problem
CoRR, 2010

Global Linear Complexity Analysis of Filter Keystream Generators
CoRR, 2010

A vision of cooperation tools for VANETs.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Cooperative Approach to Self-managed VANETs.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

On Privacy and Integrity in Vehicular Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Knowledge Management using Clusters in VANETs - Description, Simulation and Analysis.
Proceedings of the KMIS 2010, 2010

Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Group Proposal to Secure Vehicular Ad-Hoc Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Linear Cellular Automata-Based Model for Generating Cryptographic Sequences.
Proceedings of the 2010 International Conference on Scientific Computing, 2010

Simple Cellular Automata-Based Linear Models for a Class of Sequence Generators.
Proceedings of the 2010 International Conference on Scientific Computing, 2010

Enhancing Collaboration in Vehicular Networks.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010

Group Formation through Cooperating Node in VANETs.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010

Chaotic Cellular Automata with Cryptographic Application.
Proceedings of the Cellular Automata, 2010

Data aggregation for information authentication in VANETs.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers.
J. Univers. Comput. Sci., 2009

Self-organized authentication in mobile ad-hoc networks.
J. Commun. Networks, 2009

A simple attack on some clock-controlled generators.
Comput. Math. Appl., 2009

Synthesis of cryptographic interleaved sequences by means of linear cellular automata.
Appl. Math. Lett., 2009

New Attack Strategy for the Shrinking Generator.
J. Res. Pract. Inf. Technol., 2009

Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2009

Deterministic Cryptanalysis of some Stream Ciphers.
Proceedings of the Security in Information Systems, 2009

Designing communication-oriented node authentication for VANETs.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Proceedings of the Computational Science, 2009

Cooperation Enforcement Schemes in Vehicular Ad-Hoc Networks.
Proceedings of the Computer Aided Systems Theory, 2009

Differentiated Services to Provide Efficient Node Authentication in VANETs.
Proceedings of the 2009 International Conference on Security & Management, 2009

Linearization of the Alternating Step Generator in Terms of Cellular Automata.
Proceedings of the 2009 International Conference on Scientific Computing, 2009

Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs).
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009

2008
Solving Linear Difference Equations by Means of Cellular Automata.
Proceedings of the Innovations in Hybrid Intelligent Systems, 2008

Strategic attack on the shrinking generator.
Theor. Comput. Sci., 2008

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
J. Res. Pract. Inf. Technol., 2008

Self-organized authentication architecture for Mobile Ad-hoc Networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences.
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008

Using New Tools for Certificate Repositories Generation in MANETs.
Proceedings of the Data and Applications Security XXII, 2008

Cooperative Security Schemes for Mobile Ad-Hoc Networks.
Proceedings of the Cooperative Design, 2008

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Current Topics in Security of Mobile Ad-hoc NETworks.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations.
Proceedings of the Cellular Automata, 2008

2007
A rational approach to cryptographic protocols.
Math. Comput. Model., 2007

A Global Authentication Scheme for Mobile Ad-Hoc Networks.
Proceedings of the Advances in Information and Computer Security, 2007

Linearization of Stream Ciphers by Means of Concatenated Automata.
Proceedings of the Computational Science and Its Applications, 2007

Application of Linear Hybrid Cellular Automata to Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2007

A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks.
Proceedings of the Computer Aided Systems Theory, 2007

2006
Zero-Knowledge Hierarchical Authentication in MANETs.
IEICE Trans. Inf. Syst., 2006

Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Modelling of Complex Cryptographic Systems in Terms of Simple Cellular Automata .
Proceedings of the Computational Science and Its Applications, 2006

Practical Attack on the Shrinking Generator.
Proceedings of the Computational Science and Its Applications, 2006

Efficient Application of Hybrid 150/90 Cellular Automata to Symmetric Cryptography.
Proceedings of the Computational Science, 2006

Concatenated Automata in Cryptanalysis of Stream Ciphers.
Proceedings of the Cellular Automata, 2006

2005
Zero-Knowledge Proof for the Independent Set Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Strong Identification Based on a Hard-on-Average Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators.
Proceedings of the Advances in Informatics, 2005

A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography.
Proceedings of the Computational Science and Its Applications, 2005

Algorithm for Proving the Knowledge of an Independent Vertex Set.
Proceedings of the Computer Aided Systems Theory, 2005

Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2005

2004
A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols.
Inf. Secur. J. A Glob. Perspect., 2004

A wide family of nonlinear filter functions with a large linear span.
Inf. Sci., 2004

A Game-Theoretic Model for Two-Party Cryptographic Protocols.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
A Zero-Knowledge Identification Scheme.
Proceedings of the Computer Network Security, 2003

A Secret Sharing Scheme Using Matrices.
Proceedings of the Computational Science and Its Applications, 2003

The teaching of cryptologic mathematics.
Proceedings of the 4th International Conference on Computer Systems and Technologies: e-Learning, 2003

2001
Strong Solutions to the Identification Problem.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001

1998
Regular Cosets and Upper Bounds on the Linear Complexity of Certain Sequences.
Proceedings of the Sequences and their Applications, 1998

1995
Linear Span Analysis of a Set of Periodic Sequence Generators.
Proceedings of the Cryptography and Coding, 1995

1994
On the Linear Complexity of Nonlinear Filtered PN-sequences.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...