IMG_0793

Pedro Peris-Lopez 

Pedro Peris-Lopez is Associate Professor at the Department of Computer Science, Universidad Carlos III de Madrid, Spain. He has a M.Sc. in Telecommunications Engineering (2004) and Ph.D. in Computer Science (2008) from the University Carlos III of Madrid.

From October 2004 to December 2008 he hold a position as Assistant Teacher at University Carlos III of Madrid (Spain), being involved both in academic and research tasks. In January 2009, he started to work as Postdoctoral Research at Delft University of Technology (The Netherlands). In Delft he was mainly focused on research but he had the opportunity to serve as Invited Lecturer in the subject of Cryptography and Security at the Master of Computer Science and also as Field Supervisor of a PhD candidate from the Universiti Sains Malaysia (Malaysia). Moreover he enrolled in several training courses (“University Teaching Qualification”) pursuing to increase his teaching skills. In September 2011 he started to work as a Visiting Lecturer at the University Carlos III of Madrid.

Regarding international mobility, in 2016, for 4 months, he made a research stay at Aalto University (Helsinki, Finland). Previously he worked three years (January 2009 to January 2012) as Postdoctoral Researcher at the University of Delft (Delf, The Netherlands). In addition, in June 2011 he was invited for a short stay in the Ecole Federale of Lausanne (EPFL) in the programme called “Summer Research Institute” (Lausanne, Switzerland). As a consequence of his international reputation, he has been invited as speaker in Universities (e.g., Radboud University Nijmegen, K. U. Leuven, Portsmouth University, EPFL, etc) and Research Centres (e.g. I2R Singapore). Furthermore he has acted as part of the assessment panel in National and International PhD defences.

He has published many articles in International Journals with impact factor and papers in International Conferences of recognized prestige (peer- reviewed; 2-4 reviewers). His works have a high impact: the whole of his works have more than 3600 cites, his h-index is 28 (01/2019 – Google Scholar) and his RG score is 30.32 (01/2019 Research Gate). His research interest are in the field of applied cryptography, computer forensics, signal processing, and artificial intelligence. Nowadays, his research is focused on three main areas in which he has published a great number of papers in specialized journals (53) and conference proceedings (45). Some of his most relevant works in each of these fields are listed below:

Security & e-health (Biosignals and IMDs)

  • [PDF] [DOI] C. Camara, P. Peris-Lopez, L. Gonzalez-Manzano, and J. Tapiador, “Real-time electrocardiogram streams for continuous authentication,” Applied soft computing, vol. 68, pp. 784-794, 2018.
    [Bibtex]
    @article{j50camaraperis2018b,
    title = "Real-time electrocardiogram streams for continuous authentication",
    journal = "Applied Soft Computing",
    volume = "68",
    pages = "784 - 794",
    year = "2018",
    issn = "1568-4946",
    doi = "https://doi.org/10.1016/j.asoc.2017.07.032",
    url = "http://www.sciencedirect.com/science/article/pii/S156849461730443X",
    author = "C. Camara and P. Peris-Lopez and L. Gonzalez-Manzano and J. Tapiador",
    }

  • [PDF] [DOI] C. Camara, P. Peris-Lopez, H. Martín, and M. Aldalaien, “Ecg-rng: a random number generator based on ecg signals and suitable for securing wireless sensor networks,” Sensors, vol. 18, iss. 9, 2018.
    [Bibtex]
    @Article{j46camaraperis2018,
    AUTHOR = {Camara, C. and Peris-Lopez, P. and Martín, H. and Aldalaien, M.},
    TITLE = {ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks},
    JOURNAL = {Sensors},
    VOLUME = {18},
    YEAR = {2018},
    NUMBER = {9},
    ARTICLE-NUMBER = {2747},
    URL = {http://www.mdpi.com/1424-8220/18/9/2747},
    ISSN = {1424-8220},
    DOI = {10.3390/s18092747}
    }

  • [PDF] [DOI] P. Peris-Lopez, L. González-Manzano, C. Camara, and J. M. de Fuentes, “Effect of attacker characterization in ecg-based continuous authentication mechanisms for internet of things,” Future generation computer systems, vol. 81, pp. 67-77, 2018.
    [Bibtex]
    @article{j47perismanzano2018,
    title = "Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things",
    journal = "Future Generation Computer Systems",
    volume = "81",
    pages = "67 - 77",
    year = "2018",
    issn = "0167-739X",
    doi = "https://doi.org/10.1016/j.future.2017.11.037",
    url = "http://www.sciencedirect.com/science/article/pii/S0167739X17300407",
    author = "Pedro Peris-Lopez and Lorena González-Manzano and Carmen Camara and José María de Fuentes",
    keywords = "Internet of Things, ElectroCardioGram, Continuous authentication, Attacker model",
    abstract = "Wearable devices enable retrieving data from their porting user, among other applications. When combining them with the Internet of Things (IoT) paradigm, a plethora of services can be devised. Thanks to IoT, several approaches have been proposed to apply user data, and particularly ElectroCardioGram (ECG) signals, for biometric authentication. One step further is achieving Continuous Authentication (CA), i.e., ensuring that the user remains the same during a certain period. The hardness of this task varies with the attacker characterization, that is, the amount of information about the attacker that is available to the authentication system. In this vein, we explore different ECG-based CA mechanisms for known, blind-modelled and unknown attacker settings. Our results show that, under certain configuration, 99.5 % of true positive rate can be achieved for a blind-modelled attacker, 93.5 % for a known set of attackers and 91.8 % for unknown ones."
    }

  • [PDF] C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: a comprehensive survey.,” Journal of biomedical informatics, vol. 55, pp. 272-289, 2015.
    [Bibtex]
    @article{j37camarapt2015,
    title = "Security and privacy issues in implantable medical devices: A comprehensive survey.",
    journal = "Journal of Biomedical Informatics",
    volume = "55",
    number = "",
    pages = "272-289",
    year = "2015",
    note = "",
    issn = "",
    doi = "",
    url = "",
    author = {Camara, C. and Peris-Lopez, P. and Tapiador, J. E.},
    }

Security & Hardware

  • [PDF] [DOI] H. Martin, P. Martin-Holgado, P. Peris-Lopez, Y. Morilla, and L. Entrena, “On the entropy of oscillator-based true random number generators under ionizing radiation,” Entropy, vol. 20, iss. 7, 2018.
    [Bibtex]
    @Article{j48honorioperis2018,
    AUTHOR = {Martin, H. and Martin-Holgado, P. and Peris-Lopez, P. and Morilla, Y. and Entrena, L.},
    TITLE = {On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation},
    JOURNAL = {Entropy},
    VOLUME = {20},
    YEAR = {2018},
    NUMBER = {7},
    ARTICLE-NUMBER = {513},
    URL = {http://www.mdpi.com/1099-4300/20/7/513},
    ISSN = {1099-4300},
    DOI = {10.3390/e20070513}
    }

  • [PDF] [DOI] H. Martin, P. Peris-Lopez, E. San Millan, and J. E. Tapiador, “A lightweight implementation of the tav-128 hash function,” Ieice electronics express, vol. 14, iss. 11, pp. 20161255-20161255, 2017.
    [Bibtex]
    @article{j41honorioperis2017,
    title={A lightweight implementation of the Tav-128 hash function},
    author={Martin, H. and Peris-Lopez, P. and San Millan, E. and Tapiador, J. E. },
    journal={IEICE Electronics Express},
    volume={14},
    number={11},
    pages={20161255-20161255},
    year={2017},
    doi={10.1587/elex.14.20161255}
    }

  • [PDF] [DOI] C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, “A system architecture, processor, and communication protocol for secure implants,” Acm trans. archit. code optim., vol. 10, iss. 4, p. 57:1-57:23, 2013.
    [Bibtex]
    @article{j29sspss2014,
    author = {Strydis, C. and Seepers, R. M. and Peris-Lopez, P. and Siskos, D. and Sourdis, I.},
    title = {A System Architecture, Processor, and Communication Protocol for Secure Implants},
    journal = {ACM Trans. Archit. Code Optim.},
    volume = {10},
    number = {4},
    year = {2013},
    pages = {57:1-57:23},
    articleno = {57},
    numpages = {23},
    url = {http://doi.acm.org/10.1145/2555289.2555313},
    doi = {10.1145/2555289.2555313},
    acmid = {2555313},
    publisher = {ACM},
    }

Security & Smart Devices

  • [PDF] [DOI] J. Blasco and P. Peris-Lopez, “On the feasibility of low-cost wearable sensors for multi-modal biometric verification,” Sensors, vol. 18, iss. 9, 2018.
    [Bibtex]
    @Article{j45blascoperis2018,
    AUTHOR = {Blasco, J. and Peris-Lopez, P.},
    TITLE = {On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification},
    JOURNAL = {Sensors},
    VOLUME = {18},
    YEAR = {2018},
    NUMBER = {9},
    ARTICLE-NUMBER = {2782},
    URL = {http://www.mdpi.com/1424-8220/18/9/2782},
    ISSN = {1424-8220},
    DOI = {10.3390/s18092782}
    }

  • [PDF] [DOI] S. F. Aghili, H. Mala, and P. Peris-Lopez, “Securing heterogeneous wireless sensor networks: breaking and fixing a three-factor authentication protocol,” Sensors, vol. 18, iss. 11, 2018.
    [Bibtex]
    @Article{j44farhadperis2018,
    AUTHOR = {Aghili, S. F. and Mala, H. and Peris-Lopez, P.},
    TITLE = {Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol},
    JOURNAL = {Sensors},
    VOLUME = {18},
    YEAR = {2018},
    NUMBER = {11},
    ARTICLE-NUMBER = {3663},
    URL = {http://www.mdpi.com/1424-8220/18/11/3663},
    ISSN = {1424-8220},
    DOI = {10.3390/s18113663},
    }

  • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, “Evolution, detection and analysis of malware for smart devices,” Ieee communications surveys & tutorials, vol. 16, iss. 2, pp. 961-987, 2014.
    [Bibtex]
    @article{j26stpr2013,
    title = "Evolution, Detection and Analysis of Malware for Smart Devices",
    journal = "IEEE Communications Surveys \& Tutorials",
    volume = "16",
    number = "2",
    pages = "961-987",
    year = "2014",
    note = "",
    issn = "",
    doi = "10.1109/SURV.2013.101613.00077",
    url = "",
    author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Arturo Ribagorda",
    }

© Copyright Pedro Peris-Lopez – LW Cryptography 2019. All Rights Reserved