Conferences
-
-
M. Safkhani, N. Bagheri, P. Peris-Lopez, and J. Tapiador, “Employing a secure cipher does not guarantee the security of rfid protocols,” in Iscturkey, 2014.
[Bibtex]@INPROCEEDINGS{c32saf2014, year={2014}, booktitle={ISCTURKEY}, volume={}, series={}, doi={}, title={Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols}, url={}, publisher={}, keywords={}, author={Safkhani, M. and Bagheri, N. and Peris-Lopez, P. and Tapiador, J.E.}\ref{\pageref{•}}, pages={}, }
-
-
-
J. L. Hernandez-Ardieta, D. Santos, P. Parra, J. E. Tapiador, P. Peris-Lopez, J. Lopez, and G. Fernandez Navarrete, “An intelligent and adaptive live simulator: a new concept for cybersecurity training.,” in An intelligent and adaptive live simulator: a new concept for cybersecurity training., 2014.
[Bibtex]@INPROCEEDINGS{c33ardietatpn2014, year={2014}, booktitle={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.}, volume={}, series={}, doi={}, title={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.}, url={}, publisher={}, keywords={}, author={Hernandez-Ardieta, J.L. and Santos, D. and Parra, P. and Tapiador, J.E. and Peris-Lopez, P. and Lopez, J. and Fernandez Navarrete, G. }, pages={}, }
-
-
-
G. Suarez-Tangil, J. E. Tapiador, and P. Peris-Lopez, “Stegomalware: playing hide and seek with malicious components in smartphone apps.,” in Inscrypt, 2014.
[Bibtex]@INPROCEEDINGS{c34tangiltp2014, year={2014}, booktitle={INSCRYPT}, volume={}, series={}, doi={}, title={Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. }, url={}, publisher={}, keywords={}, author={Suarez-Tangil, G. and Tapiador, J.E. and Peris-Lopez, P.}, pages={}, }
-
-
-
G. Suarez-Tangil, M. Conti, J. E. Tapiador, and P. Peris-Lopez, “Detecting targeted smartphone malware with behavior-triggering stochastic models,” in Computer security – esorics 2014, 2014, pp. 183-201.
[Bibtex]@INPROCEEDINGS{c29sctp2014, year={2014}, booktitle={Computer Security - ESORICS 2014}, volume={8712}, series={Lecture Notes in Computer Science}, doi={10.1007/978-3-319-11203-9_11}, title={Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models}, url={http://dx.doi.org/10.1007/978-3-319-11203-9_11}, publisher={Springer International Publishing}, keywords={Smartphone security; targeted malware; cloud analysis}, author={Suarez-Tangil, G. and Conti, M. and Tapiador, J. E. and Peris-Lopez, P.}, pages={183-201}, }
-
-
-
R. M. Seepers, C. Strydis, P. Peris-Lopez, I. Sourdis, and C. I. De Zeeuw, “Peak misdetection in heart-beat-based security: characterization and tolerance,” in International conference of the ieee engineering in medicine and biology society — embc’14, 2014.
[Bibtex]@INPROCEEDINGS{c30sspsz2014, year={2014}, booktitle={International Conference of the IEEE Engineering in Medicine and Biology Society -- EMBC'14}, volume={}, series={}, doi={}, title={Peak Misdetection in Heart-Beat-Based Security: Characterization and Tolerance}, url={}, publisher={}, keywords={}, author={Seepers, R. M. and Strydis, C. and Peris-Lopez, P. and Sourdis, I. and De Zeeuw, C. I.}, pages={}, }
-
-
- M. Naser, I. Aldmour, P. Peris-Lopez, and R. Budiarto, “Vulnerability analysis of a mutual authentication protocol conforming to epc class-1 generation-2 standard,” in International conference on electrical engineering, computer science and informatics — eecsi’04, 2014.
[Bibtex]@INPROCEEDINGS{c31napb2014, year={2014}, booktitle={International Conference on Electrical Engineering, Computer Science and Informatics -- EECSI'04}, volume={}, series={}, doi={}, title={Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard}, url={}, publisher={}, keywords={}, author={Naser, M. and Aldmour, I. and Peris-Lopez, P. and Budiarto, R.}, pages={}, }
- M. Naser, I. Aldmour, P. Peris-Lopez, and R. Budiarto, “Vulnerability analysis of a mutual authentication protocol conforming to epc class-1 generation-2 standard,” in International conference on electrical engineering, computer science and informatics — eecsi’04, 2014.
-
- M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, and J. C. Hernandez-Castro, “Weaknesses in another Gen2-Based RFID authentication protocol,” in Ieee international conference on rfid-technology and applications — ieee rfid ta 2012, Nice, France, 2012.
[Bibtex]@INPROCEEDINGS{c28snpmh2012, author = {Safkhani, Masoumeh and Bagheri, Nasour and Peris-Lopez, Pedro and Mitrokotsa, Aikaterini and Hernandez-Castro, Julio Cesar. }, title = {Weaknesses in another {Gen2-Based} {RFID} Authentication Protocol}, booktitle = {IEEE International Conference on RFID-Technology and Applications -- IEEE RFID TA 2012}, year = {2012}, editor = {}, volume = {}, series = {IEEE Press}, pages = {}, address = {Nice, France}, month = {November}, organization = {IEEE}, publisher = {}, pdf = {}, slides = {}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
- M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, and J. C. Hernandez-Castro, “Weaknesses in another Gen2-Based RFID authentication protocol,” in Ieee international conference on rfid-technology and applications — ieee rfid ta 2012, Nice, France, 2012.
-
- M. Safkhani, P. Peris-Lopez, C. H. ulio Castro, and N. Bagheri, “Cryptanalysis of cho et al.’s protocol: a hash-based rfid tag mutual authentication protocol,” in International conference on applied and computational mathematics (icacm), 2012.
[Bibtex]@inproceedings{c27sphb2012, author = {Masoumeh Safkhani and Pedro Peris-Lopez and ulio C{\'e}sar Hern{\'a}ndez Castro and Nasour Bagheri}, title = {Cryptanalysis of Cho et al.'s Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol}, booktitle = {International Conference on Applied and Computational Mathematics (ICACM)}, year = {2012}, pages = {}, doi = {}, crossref = {}, bibsource = {} }
- M. Safkhani, P. Peris-Lopez, C. H. ulio Castro, and N. Bagheri, “Cryptanalysis of cho et al.’s protocol: a hash-based rfid tag mutual authentication protocol,” in International conference on applied and computational mathematics (icacm), 2012.
-
- M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, and J. C. H. Castro, “On the security of tan et al. serverless rfid authentication and search protocols,” in Rfidsec, 2012.
[Bibtex]@inproceedings{c26spbnh2012, author = {Masoumeh Safkhani and Pedro Peris-Lopez and Nasour Bagheri and Majid Naderi and Julio C{\'e}sar Hern{\'a}ndez Castro}, title = {On the Security of Tan et al. Serverless RFID Authentication and Search Protocols}, booktitle = {RFIDSec}, year = {2012}, pages = {}, doi = {}, crossref = {}, bibsource = {} }
- M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, and J. C. H. Castro, “On the security of tan et al. serverless rfid authentication and search protocols,” in Rfidsec, 2012.
-
-
J. C. Hernandez-Castro, P. Peris-Lopez, M. Safkhani, N. Bagheri, and M. Naderi, “Another fallen hash-based rfid authentication protocol,” in Wistp, 2012, pp. 29-37.
[Bibtex]@inproceedings{c25hpsbn2012, author = {Julio C. Hernandez-Castro and Pedro Peris-Lopez and Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Another Fallen Hash-Based RFID Authentication Protocol}, booktitle = {WISTP}, year = {2012}, volume = {7322}, series = {LNCS}, pages = {29-37}, publisher = {Springer-Verlag}, doi = {10.1007/978-3-642-30955-7_4}, crossref = {DBLP:conf/wistp/2012}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
J. C. H. Castro, P. Peris-Lopez, and J. Aumasson, “On the key schedule strength of present,” in Dpm/setop, 2011, pp. 253-263.
[Bibtex]@inproceedings{c24hpa2011, author = {Julio C{\'e}sar Hern{\'a}ndez Castro and Pedro Peris-Lopez and Jean-Philippe Aumasson}, title = {On the Key Schedule Strength of PRESENT}, booktitle = {DPM/SETOP}, year = {2011}, pages = {253-263}, doi = {10.1007/978-3-642-28879-1_17}, crossref = {DBLP:conf/esorics/2011-7122}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
J. Aumasson, A. Mitrokotsa, and P. Peris-Lopez, “A note on a privacy-preserving distance-bounding protocol,” in Icics, 2011, pp. 78-92.
[Bibtex]@inproceedings{c23amp2011, author = {Jean-Philippe Aumasson and Aikaterini Mitrokotsa and Pedro Peris-Lopez}, title = {A Note on a Privacy-Preserving Distance-Bounding Protocol}, booktitle = {ICICS}, year = {2011}, pages = {78-92}, doi = {10.1007/978-3-642-25243-3_7}, crossref = {DBLP:conf/icics/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
M. Merhi, J. C. H. Castro, and P. Peris-Lopez, “Studying the pseudo random number generator of a low-cost rfid tag,” in Rfid-ta, 2011, pp. 381-385.
[Bibtex]@inproceedings{c22mhp2011, author = {Mohamad Merhi and Julio C{\'e}sar Hern{\'a}ndez Castro and Pedro Peris-Lopez}, title = {Studying the pseudo random number generator of a low-cost RFID tag}, booktitle = {RFID-TA}, year = {2011}, pages = {381-385}, doi = {10.1109/RFID-TA.2011.6068666}, crossref = {DBLP:conf/rfidta/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
H. Martin, E. S. Millán, L. Entrena, J. C. H. Castro, and P. Peris-Lopez, “Akari-x: a pseudorandom number generator for secure lightweight systems,” in Iolts, 2011, pp. 228-233.
[Bibtex]@inproceedings{c21hmlhp2011, author = {Honorio Martin and Enrique San Mill{\'a}n and Luis Entrena and Julio C{\'e}sar Hern{\'a}ndez Castro and Pedro Peris-Lopez}, title = {AKARI-X: A pseudorandom number generator for secure lightweight systems}, booktitle = {IOLTS}, year = {2011}, pages = {228-233}, doi = {10.1109/IOLTS.2011.5994534}, crossref = {DBLP:conf/iolts/2011}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, E. San Millán, J. C. A. van der Lubbe, and L. A. Entrena, “Cryptographically secure pseudo-random bit generator for rfid tags,” in International conference for internet technology and secured transactions (icitst), 2010, pp. 1-6.
[Bibtex]@INPROCEEDINGS{c20pmle2010, author={Peris-Lopez, P. and San Millán, E. and van der Lubbe, J.C.A. and Entrena, L.A.}, booktitle={International Conference for Internet Technology and Secured Transactions (ICITST)}, title={Cryptographically secure pseudo-random bit generator for RFID tags}, year={2010}, month={nov.}, volume={}, number={}, pages={1 -6}, keywords={Clocks;Cryptography;Radiofrequency identification;cryptographic protocols;radiofrequency identification;random number generation;security of data;transponders;Blum-Blum-Shub pseudorandom number generator;RFID protocols;RFID tags;cryptographically secure pseudorandom bit generator;security levels;transponder;BBS;CS-PRNG;RFID;privacy;randomness;}, doi={}, note = {(Best paper award)}, ISSN={},}
-
-
-
P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiador, and T. Li, “Quasi-linear cryptanalysis of a secure rfid ultralightweight authentication protocol,” in Inscrypt, 2010, pp. 427-442.
[Bibtex]@inproceedings{c19phptl2010, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Raphael C.-W. Phan and Juan M. Est{\'e}vez-Tapiador and Tieyan Li}, title = {Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol}, booktitle = {Inscrypt}, year = {2010}, pages = {427-442}, doi = {10.1007/978-3-642-21518-6_30}, crossref = {DBLP:conf/cisc/2010}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiado, and T. Li, “Passive cryptanalysis of an ultralightweight authentication protocol of rfidsec’10 asia (poster),” in Rfidsec, 2010.
[Bibtex]@inproceedings{c18phpt2010, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Raphael C.-W. Phan and Juan M. Est{\'e}vez-Tapiado and Tieyan Li}, title = {Passive Cryptanalysis of an Ultralightweight Authentication Protocol of RFIDsec'10 Asia (Poster)}, booktitle = {RFIDSec}, year = {2010}, pages = {}, doi = {}, crossref = {}, bibsource = {} }
-
-
-
J. C. H. Castro, P. Peris-Lopez, R. C. -W. Phan, and J. M. Estévez-Tapiador, “Cryptanalysis of the david-prasad rfid ultralightweight authentication protocol,” in Rfidsec, 2010, pp. 22-34.
[Bibtex]@inproceedings{c17hppt2010, author = {Julio C{\'e}sar Hern{\'a}ndez Castro and Pedro Peris-Lopez and Raphael C.-W. Phan and Juan M. Est{\'e}vez-Tapiador}, title = {Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol}, booktitle = {RFIDSec}, year = {2010}, pages = {22-34}, doi = {10.1007/978-3-642-16822-2_3}, crossref = {DBLP:conf/rfidsec/2010}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, E. Palomar, and J. C. A. van der Lubbe, “Cryptographic puzzles and distance-bounding protocols: practical tools for rfid security,” in Rfid, 2010 ieee international conference on, 2010, pp. 45-52.
[Bibtex]@INPROCEEDINGS{c16phtpl2010, author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Tapiador, J.M.E. and Palomar, E. and van der Lubbe, J.C.A.}, booktitle={RFID, 2010 IEEE International Conference on}, title={Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security}, year={2010}, month={april}, volume={}, number={}, pages={45 -52}, keywords={Clothing;Computer science;Cryptographic protocols;Cryptography;Databases;Manufacturing;Privacy;Protection;Radiofrequency identification;Security;cryptographic protocols;data privacy;radiofrequency identification;telecommunication security;RFID;WSBC;cryptographic puzzles;distance bounding protocols;privacy protection;systems security;weakly secret bit commitment;RFID security;WSBC;cryptographic puzzles;distance-bounding protocols;privacy;traceability;}, doi={10.1109/RFID.2010.5467258}, ISSN={},}
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and J. C. A. van der Lubbe, “Security Flaws in a Recent Ultralightweight RFID Protocol,” in Workshop on rfid security — rfidsec asia’10, Singapore, Republic of Singapore, 2010, pp. 83-93.
[Bibtex]@INPROCEEDINGS{ch15phtl2010, author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and van der Lubbe, Jan C. A.}, title = {{Security Flaws in a Recent Ultralightweight RFID Protocol}}, booktitle = {Workshop on RFID Security -- RFIDSec Asia'10}, year = {2010}, editor = {}, volume = {4}, series = {Cryptology and Information Security}, pages = {83--93}, address = {Singapore, Republic of Singapore}, month = {February}, organization = {}, publisher = {IOS Press}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
-
-
-
P. Peris-Lopez, J. Hernandez-Castro, J. Tapiador, T. Li, and J. Lubbe, “Weaknesses in two recent lightweight rfid authentication protocols,” in Information security and cryptology, 2011, pp. 383-392.
[Bibtex]@inproceedings{c14phttl2011, year={2011}, isbn={978-3-642-16341-8}, booktitle={Information Security and Cryptology}, volume={6151}, series={Lecture Notes in Computer Science}, doi={10.1007/978-3-642-16342-5_28}, title={Weaknesses in Two Recent Lightweight RFID Authentication Protocols}, url={http://dx.doi.org/10.1007/978-3-642-16342-5_28}, publisher={Springer Berlin Heidelberg}, keywords={RFID; EPC; Cloning; Traceability; Impersonation; Cryptanalysis; BAN; Proof}, author={Peris-Lopez, Pedro and Hernandez-Castro, JulioC. and Tapiador, JuanM.E. and Li, Tieyan and Lubbe, JanC.A.}, pages={383-392} }
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estévez-Tapiador, E. S. Millán, and J. C. A. van der Lubbe, “Security flaws in an efficient pseudo-random number generator for low-power environments,” in Sewcn, 2009, pp. 25-35.
[Bibtex]@inproceedings{c13phtsl2009, author = {Pedro Peris-Lopez and Julio C. Hernandez-Castro and Juan M. Est{\'e}vez-Tapiador and Enrique San Mill{\'a}n and Jan C. A. van der Lubbe}, title = {Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments}, booktitle = {SEWCN}, year = {2009}, pages = {25-35}, doi = {10.1007/978-3-642-11526-4_3}, crossref = {DBLP:conf/sewcn/2009}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
J. C. Hernandez-Castro, J. M. Estevez-Tapiador, P. Peris-Lopez, and J. Quisquater, “Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations,” in International workshop on coding and cryptography — wcc’09, Ullensvang, Norway, 2009.
[Bibtex]@INPROCEEDINGS{c12htpq2009, author = {Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Peris-Lopez, Pedro and Quisquater, Jean-Jacques}, title = {{Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations}}, booktitle = {International Workshop on Coding and Cryptography -- WCC'09}, year = {2009}, editor = {}, volume = {}, series = {}, pages = {}, address = {Ullensvang, Norway}, month = {May}, organization = {}, publisher = {}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
-
-
-
J. C. Hernandez-Castro, J. E. Tapiador, P. Peris-Lopez, J. A. Clark, and E. -G. Talbi, “Metaheuristic traceability attack against slmap, an rfid lightweight authentication protocol,” in Parallel distributed processing, 2009. ipdps 2009. ieee international symposium on, 2009, pp. 1-5.
[Bibtex]@INPROCEEDINGS{c11htpct2009, author={Hernandez-Castro, J.C. and Tapiador, J.E. and Peris-Lopez, P. and Clark, J.A. and Talbi, E.-G.}, booktitle={Parallel Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on}, title={Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol}, year={2009}, month={may}, volume={}, number={}, pages={1 -5}, keywords={Authentication;Computer science;Cost function;Cryptographic protocols;Cryptography;NP-hard problem;Proposals;Radiofrequency identification;Robustness;Security;cryptographic protocols;message authentication;radiofrequency identification;RFID ultra-lightweight authentication protocol;SLMAP algorithm;black-box technique;metaheuristic traceability attack;}, doi={10.1109/IPDPS.2009.5161121}, ISSN={1530-2075},}
-
-
-
P. Peris-Lopez, T. Lim, and T. Li, “Providing stronger authentication at a low cost to rfid tags operating under the epcglobal framework,” in Euc (2), 2008, pp. 159-166.
[Bibtex]@inproceedings{c10pll2008, author = {Pedro Peris-Lopez and Tong-Lee Lim and Tieyan Li}, title = {Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework}, booktitle = {EUC (2)}, year = {2008}, pages = {159-166}, doi = {10.1109/EUC.2008.82}, crossref = {DBLP:conf/euc/2008-2}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Advances in ultralightweight cryptography for low-cost rfid tags: gossamer protocol,” in Wisa, 2008, pp. 56-68.
[Bibtex]@inproceedings{c9phtr2008, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan M. Est{\'e}vez-Tapiador and Arturo Ribagorda}, title = {Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol}, booktitle = {WISA}, year = {2008}, pages = {56-68}, doi = {10.1007/978-3-642-00306-6_5}, crossref = {DBLP:conf/wisa/2008}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, T. Li, L. Tong Lee, J. C. Hernandez-Castro, and J. M. Estevez-Tapiador, “Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard,” in Workshop on rfid security — rfidsec’08, Budapest, Hungary, 2008.
[Bibtex]@INPROCEEDINGS{c8ptlht2008, author = {Peris-Lopez, Pedro and Li, Tieyan and Tong Lee, Lim and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M.}, title = {{Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard}}, booktitle = {Workshop on RFID Security -- RFIDSec'08}, year = {2008}, editor = {}, volume = {}, series = {}, pages = {}, address = {Budapest, Hungary}, month = {July}, organization = {}, publisher = {}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
-
-
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “An efficient authentication protocol for rfid systems resistant to active attacks,” in Euc workshops, 2007, pp. 781-794.
[Bibtex]@inproceedings{c7phtr2006, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan M. Est{\'e}vez-Tapiador and Arturo Ribagorda}, title = {An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks}, booktitle = {EUC Workshops}, year = {2007}, pages = {781-794}, doi = {10.1007/978-3-540-77090-9_71}, crossref = {DBLP:conf/euc/2007w}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Solving the simultaneous scanning problem anonymously: clumping proofs for rfid tags,” in Security, privacy and trust in pervasive and ubiquitous computing, 2007. secperu 2007. third international workshop on, 2007, pp. 55-60.
[Bibtex]@INPROCEEDINGS{c6phtr2006, author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Estevez-Tapiador, J.M. and Ribagorda, A.}, booktitle={Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on}, title={Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags}, year={2007}, month={july}, volume={}, number={}, pages={55 -60}, keywords={Frequency;History;Privacy;Proposals;Protection;Protocols;RFID tags;Radiofrequency identification;Security;Ubiquitous computing;data privacy;radiofrequency identification;RFID security;RFID tag;clumping proofs;location privacy violation;multi-proofs session attack;privacy;replay attacks;simultaneous scanning problem anonymously;}, doi={10.1109/SECPERU.2007.12}, ISSN={},}
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard,” in Workshop on rfid security — rfidsec’07, Malaga, Spain, 2007.
[Bibtex]@INPROCEEDINGS{c5phtr2006, author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo}, title = {{Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard}}, booktitle = {Workshop on RFID Security -- RFIDSec'07}, year = {2007}, editor = {}, volume = {}, series = {}, pages = {}, address = {Malaga, Spain}, month = {July}, organization = {}, publisher = {}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
-
-
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Rfid systems: a survey on security threats and proposed solutions,” in Pwc, 2006, pp. 159-170.
[Bibtex]@inproceedings{c4phtr2006, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan M. Est{\'e}vez-Tapiador and Arturo Ribagorda}, title = {RFID Systems: A Survey on Security Threats and Proposed Solutions}, booktitle = {PWC}, year = {2006}, pages = {159-170}, doi = {10.1007/11872153_14}, crossref = {DBLP:conf/ifip6-8/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Emap: an efficient mutual-authentication protocol for low-cost rfid tags,” in Otm workshops (1), 2006, pp. 352-361.
[Bibtex]@inproceedings{c3phtr2006, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan M. Est{\'e}vez-Tapiador and Arturo Ribagorda}, title = {EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags}, booktitle = {OTM Workshops (1)}, year = {2006}, pages = {352-361}, doi = {10.1007/11915034_59}, crossref = {DBLP:conf/otm/2006-w1}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “M2ap: a minimalist mutual-authentication protocol for low-cost rfid tags,” in Uic, 2006, pp. 912-923.
[Bibtex]@inproceedings{c2phtr2006, author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and Juan M. Est{\'e}vez-Tapiador and Arturo Ribagorda}, title = {M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags}, booktitle = {UIC}, year = {2006}, pages = {912-923}, doi = {10.1007/11833529_93}, crossref = {DBLP:conf/uic/2006}, bibsource = {DBLP, http://dblp.uni-trier.de} }
-
-
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Workshop on rfid security — rfidsec’06, Graz, Austria, 2006.
[Bibtex]@INPROCEEDINGS{c1phtr2006, author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo}, title = {{LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags}}, booktitle = {Workshop on RFID Security -- RFIDSec'06}, year = {2006}, editor = {}, volume = {}, series = {}, pages = {}, month = {July}, address = {Graz, Austria}, organization = {Ecrypt}, publisher = {}, bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium}, }
-