Остановите войну!
for scientists:
default search action
Alberto Peinado
- > Home > Persons > Alberto Peinado
Publications
- 2019
- [j20]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - 2017
- [j19]Francisco Lozano, Andrés Ortiz, Jorge Munilla, Alberto Peinado:
Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis. Knowl. Based Syst. 123: 229-237 (2017) - [j18]Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo:
RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors 17(1): 53 (2017) - 2016
- [j17]Jorge Munilla, Mike Burmester, Alberto Peinado:
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Comput. Commun. 88: 84-88 (2016) - [j15]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Optimal modes of operation of pseudorandom sequence generators based on DLFSRs. Log. J. IGPL 24(6): 933-943 (2016) - 2015
- [j14]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Revision of J3Gen and Validity of the Attacks by Peinado et al. Sensors 15(5): 11988-11992 (2015) - 2014
- [j13]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors 14(4): 6500-6515 (2014) - [c13]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Improving the Period and Linear Span of the Sequences Generated by DLFSRs. SOCO-CISIS-ICEUTE 2014: 397-406 - [i4]Jorge Munilla, Mike Burmester, Alberto Peinado:
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments. IACR Cryptol. ePrint Arch. 2014: 968 (2014) - 2013
- [i3]Jorge Munilla, Alberto Peinado, Guomin Yang, Willy Susilo:
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model. IACR Cryptol. ePrint Arch. 2013: 187 (2013) - 2012
- [c8]Alberto Peinado, Jorge Munilla:
Lightweight Authentication Protocols based on Rotations and the LPN Problem. SENSORNETS 2012: 127-134 - 2010
- [j10]Jorge Munilla, Alberto Peinado:
Attacks on a distance bounding protocol. Comput. Commun. 33(7): 884-889 (2010) - [j9]Jorge Munilla, Alberto Peinado:
Enhanced low-cost RFID protocol to detect relay attacks. Wirel. Commun. Mob. Comput. 10(3): 361-371 (2010) - [c6]Jorge Munilla, Andrés Ortiz, Alberto Peinado:
What can RFID do for Vanets? - A Cryptographic Point of View. SECRYPT 2010: 295-298 - [c5]Jorge Munilla, Andrés Ortiz, Alberto Peinado:
Robotic vehicles to simulate RFID-based vehicular ad hoc networks. SimuTools 2010: 49 - 2009
- [j8]Jorge Munilla, Alberto Peinado:
Security flaw of Hölbl et al.'s protocol. Comput. Commun. 32(4): 736-739 (2009) - [c4]Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado:
Secure EPC Gen2 Compliant Radio Frequency Identification. ADHOC-NOW 2009: 227-240 - [c3]Andrés Ortiz, Alberto Peinado, Jorge Munilla:
A Scaled Test Bench for Vanets with RFID Signalling. CISIS 2009: 53-59 - [i2]Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado:
Secure EPC Gen2 compliant Radio Frequency Identification. IACR Cryptol. ePrint Arch. 2009: 149 (2009) - 2008
- [j7]Jorge Munilla, Alberto Peinado:
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput. 8(9): 1227-1232 (2008) - [c2]Jorge Munilla, Alberto Peinado:
Security Analysis of Tu and Piramuthu's Protocol. NTMS 2008: 1-5 - [i1]Jorge Munilla, Alberto Peinado:
Attacks on Singelee and Preneel's protocol. IACR Cryptol. ePrint Arch. 2008: 283 (2008) - 2007
- [j6]Jorge Munilla, Alberto Peinado:
HB-MP: A further step in the HB-family of lightweight authentication protocols. Comput. Networks 51(9): 2262-2267 (2007) - 2006
- [j5]Jorge Munilla, Alberto Peinado:
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. Comput. Commun. 30(1): 52-54 (2006)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint