Journals

    • [PDF] C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: a comprehensive survey.,” Journal of biomedical informatics, vol. 55, pp. 272-289, 2015.
      [Bibtex]
      @article{j37camarapt2015,
      title = "Security and privacy issues in implantable medical devices: A comprehensive survey.",
      journal = "Journal of Biomedical Informatics",
      volume = "55",
      number = "",
      pages = "272-289",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Camara, C. and Peris-Lopez, P. and Tapiador, J. E.},
      }
    • [PDF] S. Pastrana, J. E. Tapiador, A. Orfila, and P. Peris-Lopez, “Defidnet: a framework for optimal allocation of cyberdefenses in intrusion detection networks,” Computer networks., vol. 80, pp. 66-88, 2015.
      [Bibtex]
      @article{j36pastranatop2015,
      title = "DEFIDNET: A Framework For Optimal Allocation of Cyberdefenses in Intrusion Detection Networks",
      journal = "Computer Networks.",
      volume = "80",
      number = "",
      pages = "66-88",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Pastrana, S. and Tapiador, J. E. and Orfila, A. and Peris-Lopez, P.},
      }
    • [PDF] J. M. de Fuentes, P. Peris-Lopez, J. E. Tapiador, and S. Pastrana, “Probabilistic yoking proofs for large scale iot systems,” Ad hoc networks, iss. 32, pp. 43-52, 2015.
      [Bibtex]
      @article{j35fuentesptp2015,
      title = "Probabilistic Yoking Proofs for Large Scale IoT Systems",
      journal = "Ad Hoc Networks",
      volume = "",
      number = "32",
      pages = "43-52",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Fuentes, J. M. de and Peris-Lopez, P and Tapiador, J.E. and Pastrana, S.},
      }
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and S. Pastrana, “Power-aware anomaly detection in smartphones: an analysis of on-platform versus externalized operation,” Pervasive and mobile computing, vol. 18, pp. 137-151, 2015.
      [Bibtex]
      @article{j34tangiltpp2015,
      title = "Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation ",
      journal = "Pervasive and Mobile Computing ",
      volume = "18",
      number = "",
      pages = "137-151 ",
      year = "2015",
      note = "",
      issn = "1574-1192",
      doi = "10.1016/j.pmcj.2014.10.007",
      url = "http://www.sciencedirect.com/science/article/pii/S1574119214001795",
      author = "G. Suarez-Tangil and J. E. Tapiador and P. Peris-Lopez and S. Pastrana",
      }
    • [PDF] [DOI] J. Blasco, J. E. Tapiador, P. Peris-Lopez, and G. Suarez-Tangil, “Hindering data theft with encrypted data trees,” Journal of systems and software, vol. 101, pp. 147-158, 2015.
      [Bibtex]
      @article{j33blascotpt2014,
      title = "Hindering data theft with encrypted data trees ",
      journal = "Journal of Systems and Software ",
      volume = "101",
      number = "0",
      pages = "147 - 158",
      year = "2015",
      note = "",
      issn = "0164-1212",
      doi = "10.1016/j.jss.2014.11.050",
      url = "http://www.sciencedirect.com/science/article/pii/S0164121214002775",
      author = "J. Blasco and J. E. Tapiador and P. Peris-Lopez and G. Suarez-Tangil",
      }
    • [PDF] [DOI] P. Picazo-Sanchez, J. E. Tapiador, P. Peris-Lopez, and G. Suarez-Tangil, “Secure publish-subscribe protocols for heterogeneous medical wireless body area networks,” Sensors, vol. 14, iss. 12, pp. 22619-22642, 2014.
      [Bibtex]
      @article{j32picatpt2014,
      AUTHOR = {Picazo-Sanchez, P. and Tapiador, J. E. and Peris-Lopez, P. and Suarez-Tangil, G.},
      TITLE = {Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks},
      JOURNAL = {Sensors},
      VOLUME = {14},
      YEAR = {2014},
      NUMBER = {12},
      PAGES = {22619--22642},
      URL = {http://www.mdpi.com/1424-8220/14/12/22619},
      PubMedID = {25460814},
      ISSN = {1424-8220},
      DOI = {10.3390/s141222619}
      }
    • [DOI] P. Picazo-Sanchez, L. Ortiz-Martin, P. Peris-Lopez, and N. Bagheri, “Weaknesses of fingerprint-based mutual authentication protocol,” Security and communication networks, p. n/a–n/a, 2014.
      [Bibtex]
      @article {j31picalpn2014,
      author = {Picazo-Sanchez, Pablo and Ortiz-Martin, Lara and Peris-Lopez, Pedro and Bagheri, Nasour},
      title = {Weaknesses of fingerprint-based mutual authentication protocol},
      journal = {Security and Communication Networks},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.1161},
      doi = {10.1002/sec.1161},
      pages = {n/a--n/a},
      keywords = {ubiquitous computing, sensors, security, BAN logic},
      year = {2014},
      }
    • [PDF] [DOI] S. Pastrana, A. Orfila, J. E. Tapiador, and P. Peris-Lopez, “Randomized anagram revisited,” Journal of network and computer applications, vol. 41, pp. 182-196, 2014.
      [Bibtex]
      @article{j30potp2014,
      title = "Randomized Anagram revisited ",
      journal = "Journal of Network and Computer Applications ",
      volume = "41",
      number = "0",
      pages = "182 - 196",
      year = "2014",
      note = "",
      issn = "1084-8045",
      doi = "http://dx.doi.org/10.1016/j.jnca.2013.11.006",
      url = "http://www.sciencedirect.com/science/article/pii/S1084804513002841",
      author = "S. Pastrana and A. Orfila and J. E. Tapiador and P. Peris-Lopez",
      }
    • [PDF] [DOI] M. Safkhani, P. Peris-Lopez, J. C. Hernandez-Castro, and N. Bagheri, “Cryptanalysis of the cho et al. protocol: a hash-based \RFID\ tag mutual authentication protocol,” Journal of computational and applied mathematics, vol. 259, Part B, pp. 571-577, 2014.
      [Bibtex]
      @article{j28sphb2014,
      title = "Cryptanalysis of the Cho et al. protocol: A hash-based \{RFID\} tag mutual authentication protocol ",
      journal = "Journal of Computational and Applied Mathematics ",
      volume = "259, Part B",
      number = "0",
      pages = "571 - 577",
      year = "2014",
      doi = "10.1016/j.cam.2013.09.073",
      url = "http://www.sciencedirect.com/science/article/pii/S0377042713005281",
      author = "M. Safkhani and P. Peris-Lopez and J. C. Hernandez-Castro and N. Bagheri",}
    • [PDF] [DOI] H. Martin, P. Peris-Lopez, J. E. Tapiador, and E. San Millan, “An estimator for the asic footprint area of lightweight cryptographic algorithms,” Ieee transactions on industrial informatics, vol. 10, iss. 2, pp. 1216-1225, 2014.
      [Bibtex]
      @null{j27hpts2013,
      author={Martin, H. and Peris-Lopez, P. and Tapiador, J.E. and San Millan, E.},
      journal={IEEE Transactions on Industrial Informatics},
      title={An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms},
      year={2014},
      volume={10},
      number={2},
      pages={1216-1225},
      keywords={Algorithm design and analysis;Clocks;Computer architecture;Cryptography;Hardware;Multiplexing;Registers;ASIC implementations;Footprint area;Lightweight algorithms;RFID;VHDL},
      doi={10.1109/TII.2013.2288576},
      ISSN={1551-3203},}
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: a text mining approach to analyzing and classifying code structures in android malware families,” Expert systems with applications, vol. 41, iss. 4, Part 1, pp. 1104-1117, 2014.
      [Bibtex]
      @article{j25stpb2013,
      title = "Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families ",
      journal = "Expert Systems with Applications ",
      volume = "41",
      number = "4, Part 1",
      pages = "1104 - 1117 ",
      year = "2014",
      note = "",
      issn = "0957-4174",
      doi = "10.1016/j.eswa.2013.07.106",
      url = "http://www.sciencedirect.com/science/article/pii/S0957417413006088",
      author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Jorge Blasco",
      }
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, “Evolution, detection and analysis of malware for smart devices,” Ieee communications surveys & tutorials, vol. 16, iss. 2, pp. 961-987, 2014.
      [Bibtex]
      @article{j26stpr2013,
      title = "Evolution, Detection and Analysis of Malware for Smart Devices",
      journal = "IEEE Communications Surveys \& Tutorials",
      volume = "16",
      number = "2",
      pages = "961-987",
      year = "2014",
      note = "",
      issn = "",
      doi = "10.1109/SURV.2013.101613.00077",
      url = "",
      author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Arturo Ribagorda",
      }
    • [PDF] [DOI] N. Bagheri, M. Safkhani, P. Peris-Lopez, and J. E. Tapiador, “Weaknesses in a new ultralightweight rfid authentication protocol with permutation—rapp,” Security and communication networks, vol. 7, iss. 6, pp. 945-949, 2014.
      [Bibtex]
      @article {j22bspt2013,
      author = {Bagheri, Nasour and Safkhani, Masoumeh and Peris-Lopez, Pedro and Tapiador, Juan E.},
      title = {Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP},
      journal = {Security and Communication Networks},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.803},
      doi = {10.1002/sec.803},
      volume={7},
      number={6},
      pages = {945-949},
      keywords = {RAPP, RFID security, authentication, attacks},
      year = {2014},
      }
    • [DOI] D. F. Barrero, J. C. Hernández-Castro, P. Peris-Lopez, D. Camacho, and M. D. R-Moreno, “A genetic tango attack against the david–prasad rfid ultra-lightweight authentication protocol,” Expert systems, vol. 31, iss. 1, pp. 9-19, 2014.
      [Bibtex]
      @article {j17bhpcm2012,
      author = {Barrero, David F. and Hernández-Castro, Julio César and Peris-Lopez, Pedro and Camacho, David and R-Moreno, María D.},
      title = {A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol},
      journal = {Expert Systems},
      issn = {1468-0394},
      url = {http://dx.doi.org/10.1111/j.1468-0394.2012.00652.x},
      doi = {10.1111/j.1468-0394.2012.00652.x},
      volume={31},
      number={1},
      pages = {9-19},
      keywords = {RFID, ultra-lightweight cryptography, genetic programming, security, tango attack},
      year = {2014},
      }
    • [PDF] [DOI] P. Peris-Lopez, M. Safkhani, N. Bagheri, and M. Naderi, “Rfid in ehealth: how to combat medication errors and strengthen patient safety,” Journal of medical and biological engineering, vol. 33, iss. 4, pp. 363-372, 2013.
      [Bibtex]
      @article{j24psbn2013,
      author = {Peris-Lopez, Pedro and Safkhani, Masoumeh and Bagheri, Nasour and Naderi, Majid},
      title = {RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety},
      journal = {Journal of Medical and Biological Engineering},
      volume = {33},
      number = {4},
      year = {2013},
      pages = {363-372},
      doi = {10.5405/jmbe.1276},
      }
    • [PDF] [DOI] A. Mitrokotsa, P. Peris-Lopez, C. Dimitrakakis, and S. Vaudenay, “On selecting the nonce length in distance-bounding protocols,” The computer journal, vol. 56, iss. 10, pp. 1216-1227, 2013.
      [Bibtex]
      @article{j23mpdv2013,
      author = {Mitrokotsa, Aikaterini and Peris-Lopez, Pedro and Dimitrakakis, Christos and Vaudenay, Serge},
      title = {On Selecting the Nonce Length in Distance-Bounding Protocols},
      year = {2013},
      doi = {10.1093/comjnl/bxt033},
      URL = {http://comjnl.oxfordjournals.org/content/early/2013/04/03/comjnl.bxt033.abstract},
      eprint = {http://comjnl.oxfordjournals.org/content/early/2013/04/03/comjnl.bxt033.full.pdf+html},
      journal = {The Computer Journal},
      volume={56},
      number={10},
      pages={1216-1227},
      }
    • [PDF] [DOI] C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, “A system architecture, processor, and communication protocol for secure implants,” Acm trans. archit. code optim., vol. 10, iss. 4, p. 57:1-57:23, 2013.
      [Bibtex]
      @article{j29sspss2014,
      author = {Strydis, C. and Seepers, R. M. and Peris-Lopez, P. and Siskos, D. and Sourdis, I.},
      title = {A System Architecture, Processor, and Communication Protocol for Secure Implants},
      journal = {ACM Trans. Archit. Code Optim.},
      volume = {10},
      number = {4},
      year = {2013},
      pages = {57:1-57:23},
      articleno = {57},
      numpages = {23},
      url = {http://doi.acm.org/10.1145/2555289.2555313},
      doi = {10.1145/2555289.2555313},
      acmid = {2555313},
      publisher = {ACM},
      }
    • [PDF] [DOI] H. Martin, E. San Millan, P. Peris-Lopez, and J. E. Tapiador, “Efficient asic implementation and analysis of two epc-c1g2 rfid authentication protocols,” Ieee sensors journal, vol. 13, iss. 10, pp. 3537-3547, 2013.
      [Bibtex]
      @ARTICLE{j21hnpt2013,
      author={Martin, Honorio and San Millan, Enrique and Peris-Lopez, Pedro and Tapiador, Juan E.},
      journal={IEEE Sensors Journal},
      title={Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols},
      year={2013},
      volume={13},
      number={10},
      pages={3537-3547},
      keywords={Internet of Things;application specific integrated circuits;cryptographic protocols;radiofrequency identification;ASIC implementation;EPC Class-1 Generation-2;EPC-C1G2 RFID authentication protocols;Internet of Things;RFID tags;UHF band;lightweight protocols;ASIC;Internet of Things;RFID;security protocol},
      doi={10.1109/JSEN.2013.2270404},
      ISSN={1530-437X},}
    • [PDF] [DOI] N. Bagheri, M. Safkhani, P. Peris-Lopez, and J. E. Tapiador, “Comments on "security improvement of an rfid security protocol of iso/iec wd 29167-6",” Ieee communications letters, vol. 17, iss. 4, pp. 805-807, 2013.
      [Bibtex]
      @article{j20bspt2013,
      author = {Bagheri, Nasour and
      Safkhani, Masoumeh and
      Peris-Lopez, Pedro and
      Tapiador, Juan E.},
      title = {Comments on "Security Improvement of an RFID Security Protocol
      of ISO/IEC WD 29167-6"},
      journal = {IEEE Communications Letters},
      volume = {17},
      number = {4},
      year = {2013},
      pages = {805-807},
      doi = {10.1109/LCOMM.2013.021213.122837},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Picazo-Sanchez, N. Bagheri, P. Peris-Lopez, and J. E. Tapiador, “Two rfid standard-based security protocols for healthcare environments,” J. medical systems, vol. 37, iss. 5, 2013.
      [Bibtex]
      @article{j19pbpt2013,
      author = {Picazo-Sanchez, Pablo and
      Bagheri, Nasour and
      Peris-Lopez, Pedro and
      Tapiador, Juan E.},
      title = {Two RFID Standard-based Security Protocols for Healthcare
      Environments},
      journal = {J. Medical Systems},
      volume = {37},
      number = {5},
      year = {2013},
      doi = {10.1007/s10916-013-9962-3},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [DOI] P. Picazo-Sanchez, L. Ortiz-Martin, P. Peris-Lopez, and J. C. Hernandez-Castro, “Cryptanalysis of the rnts system,” The journal of supercomputing, vol. 65, iss. 2, pp. 949-960, 2013.
      [Bibtex]
      @article{j18poph2013,
      author = {Picazo-Sanchez, Pablo and
      Ortiz-Martin, Lara and
      Peris-Lopez, Pedro and
      Hernandez-Castro, Julio C.},
      title = {Cryptanalysis of the RNTS system},
      journal = {The Journal of Supercomputing},
      volume = {65},
      number = {2},
      year = {2013},
      pages = {949-960},
      doi = {10.1007/s11227-013-0873-3},
      }
    • [PDF] [DOI] J. C. H. Castro, J. M. Estévez-Tapiador, P. Peris-Lopez, J. A. Clark, and E. Talbi, “Metaheuristic traceability attack against slmap, an rfid lightweight authentication protocol,” Int. j. found. comput. sci., vol. 23, iss. 2, pp. 543-553, 2012.
      [Bibtex]
      @article{j16htpct2012,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Pedro Peris-Lopez and
      John A. Clark and
      El-Ghazali Talbi},
      title = {Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol},
      journal = {Int. J. Found. Comput. Sci.},
      volume = {23},
      number = {2},
      year = {2012},
      pages = {543-553},
      doi = {10.1142/S0129054112400278},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. E. Tapiador, J. C. Hernandez-Castro, and P. Peris-Lopez, “Online randomization strategies to obfuscate user behavioral patterns,” J. network syst. manage., vol. 20, iss. 4, pp. 561-578, 2012.
      [Bibtex]
      @article{j15thp2012,
      author = {Juan E. Tapiador and
      Julio C. Hernandez-Castro and
      Pedro Peris-Lopez},
      title = {Online Randomization Strategies to Obfuscate User Behavioral Patterns},
      journal = {J. Network Syst. Manage.},
      volume = {20},
      number = {4},
      year = {2012},
      pages = {561-578},
      doi = {10.1007/s10922-012-9246-0},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] S. Pastrana, A. Mitrokotsa, A. Orfila, and P. Peris-Lopez, “Evaluation of classification algorithms for intrusion detection in manets,” Knowl.-based syst., vol. 36, pp. 217-225, 2012.
      [Bibtex]
      @article{j14pmop2012,
      author = {Sergio Pastrana and
      Aikaterini Mitrokotsa and
      Agust\'{\i}n Orfila and
      Pedro Peris-Lopez},
      title = {Evaluation of classification algorithms for intrusion detection in MANETs},
      journal = {Knowl.-Based Syst.},
      volume = {36},
      year = {2012},
      pages = {217-225},
      doi = {10.1016/j.knosys.2012.06.016},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, E. Palomar, and J. C. Hernandez-Castro, “A secure distance-based rfid identification protocol with an off-line back-end database,” Personal and ubiquitous computing, vol. 16, iss. 3, pp. 351-365, 2012.
      [Bibtex]
      @article{j13poph2012,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Esther Palomar and
      Julio C. Hernandez-Castro},
      title = {A secure distance-based RFID identification protocol with an off-line back-end database},
      journal = {Personal and Ubiquitous Computing},
      volume = {16},
      number = {3},
      year = {2012},
      pages = {351-365},
      doi = {10.1007/s00779-011-0396-y},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] M. Naser, P. Peris-Lopez, R. Budiarto, and B. R. Álvarez, “A note on the security of pap,” Computer communications, vol. 34, iss. 18, pp. 2248-2249, 2011.
      [Bibtex]
      @article{j12npbr2011,
      author = {Mu'awya Naser and
      Pedro Peris-Lopez and
      Rahmat Budiarto and
      Benjam\'{\i}n Ramos {\'A}lvarez},
      title = {A note on the security of PAP},
      journal = {Computer Communications},
      volume = {34},
      number = {18},
      year = {2011},
      pages = {2248-2249},
      doi = {10.1016/j.comcom.2011.07.002},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. E. Tapiador, and J. C. A. van der Lubbe, “Cryptanalysis of an epc class-1 generation-2 standard compliant authentication protocol,” Eng. appl. of ai, vol. 24, iss. 6, pp. 1061-1069, 2011.
      [Bibtex]
      @article{j11phtl2011,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador and
      Jan C. A. van der Lubbe},
      title = {Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol},
      journal = {Eng. Appl. of AI},
      volume = {24},
      number = {6},
      year = {2011},
      pages = {1061-1069},
      doi = {10.1016/j.engappai.2011.04.001},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, A. Mitrokotsa, and J. C. A. van der Lubbe, “A comprehensive rfid solution to enhance inpatient medication safety,” I. j. medical informatics, vol. 80, iss. 1, pp. 13-24, 2011.
      [Bibtex]
      @article{j10poml2011,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Aikaterini Mitrokotsa and
      Jan C. A. van der Lubbe},
      title = {A comprehensive RFID solution to enhance inpatient medication safety},
      journal = {I. J. Medical Informatics},
      volume = {80},
      number = {1},
      year = {2011},
      pages = {13-24},
      doi = {10.1016/j.ijmedinf.2010.10.008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, and J. C. A. van der Lubbe, “Flaws on rfid grouping-proofs. guidelines for future sound protocols,” J. network and computer applications, vol. 34, iss. 3, pp. 833-845, 2011.
      [Bibtex]
      @article{j9pohl2011,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Julio C. Hernandez-Castro and
      Jan C. A. van der Lubbe},
      title = {Flaws on RFID grouping-proofs. Guidelines for future sound protocols},
      journal = {J. Network and Computer Applications},
      volume = {34},
      number = {3},
      year = {2011},
      pages = {833-845},
      doi = {10.1016/j.jnca.2010.04.008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. E. Tapiador, T. Li, and Y. Li, “Vulnerability analysis of rfid protocols for tag ownership transfer,” Computer networks, vol. 54, iss. 9, pp. 1502-1508, 2010.
      [Bibtex]
      @article{j8phttl2010,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador and
      Tieyan Li and
      Yingjiu Li},
      title = {Vulnerability analysis of RFID protocols for tag ownership transfer},
      journal = {Computer Networks},
      volume = {54},
      number = {9},
      year = {2010},
      pages = {1502-1508},
      doi = {10.1016/j.comnet.2009.11.007},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, and J. C. H. Castro, “Reid et al.’s distance bounding protocol and mafia fraud attacks over noisy channels,” Ieee communications letters, vol. 14, iss. 2, pp. 121-123, 2010.
      [Bibtex]
      @article{j7ndph2010,
      author = {Aikaterini Mitrokotsa and
      Christos Dimitrakakis and
      Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro},
      title = {Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels},
      journal = {IEEE Communications Letters},
      volume = {14},
      number = {2},
      year = {2010},
      pages = {121-123},
      doi = {10.1109/LCOMM.2010.02.091946},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, T. Li, and J. C. Hernandez-Castro, “Lightweight props on the weak security of epc class-1 generation-2 standard,” Ieice transactions, vol. 93-D, iss. 3, pp. 518-527, 2010.
      [Bibtex]
      @article{j6pth2010,
      author = {Pedro Peris-Lopez and Tieyan Li and Julio C. Hernandez-Castro},
      title = {Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard},
      journal = {IEICE Transactions},
      volume = {93-D},
      number = {3},
      year = {2010},
      pages = {518-527},
      url = {http://search.ieice.org/bin/summary.php?id=e93-d_3_518},
      doi = {10.1587/transinf.E93.D.518},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, T. Li, J. C. Hernandez-Castro, and J. E. Tapiador, “Practical attacks on a mutual authentication scheme under the epc class-1 generation-2 standard,” Computer communications, vol. 32, iss. 7-10, pp. 1185-1193, 2009.
      [Bibtex]
      @article{j5phtr2009,
      author = {Pedro Peris-Lopez and
      Tieyan Li and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador},
      title = {Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard},
      journal = {Computer Communications},
      volume = {32},
      number = {7-10},
      year = {2009},
      pages = {1185-1193},
      doi = {10.1016/j.comcom.2009.03.010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Lamed – a prng for epc class-1 generation-2 rfid specification,” Computer standards & interfaces, vol. 31, iss. 1, pp. 88-97, 2009.
      [Bibtex]
      @article{j4phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification},
      journal = {Computer Standards {\&} Interfaces},
      volume = {31},
      number = {1},
      year = {2009},
      pages = {88-97},
      doi = {10.1016/j.csi.2007.11.013},
      bibsource = {DBLP, http://dblp.uni-trier.de},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Cryptanalysis of a novel authentication protocol conforming to epc-c1g2 standard,” Computer standards & interfaces, vol. 31, iss. 2, pp. 372-380, 2009.
      [Bibtex]
      @article{j2phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard},
      journal = {Computer Standards {\&} Interfaces},
      volume = {31},
      number = {2},
      year = {2009},
      pages = {372-380},
      doi = {10.1016/j.csi.2008.05.012},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “An ultra light authentication protocol resistant to passive attacks under the gen-2 specification,” J. inf. sci. eng., vol. 25, iss. 1, pp. 33-57, 2009.
      [Bibtex]
      @article{j3phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification},
      journal = {J. Inf. Sci. Eng.},
      volume = {25},
      number = {1},
      year = {2009},
      pages = {33-57},
      url = {http://www.iis.sinica.edu.tw/page/jise/2009/200901_03.html},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] J. M. Estévez-Tapiador, J. C. H. Castro, P. Peris-Lopez, and A. Ribagorda, “Automated design of cryptographic hash schemes by evolving highly-nonlinear functions,” J. inf. sci. eng., vol. 24, iss. 5, pp. 1485-1504, 2008.
      [Bibtex]
      @article{j1thpr2008,
      author = {Juan M. Est{\'e}vez-Tapiador and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Arturo Ribagorda},
      title = {Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions},
      journal = {J. Inf. Sci. Eng.},
      volume = {24},
      number = {5},
      year = {2008},
      pages = {1485-1504},
      url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809_13.html},
      bibsource = {DBLP, http://dblp.uni-trier.de},
      }

Conferences

    • [PDF] M. Safkhani, N. Bagheri, P. Peris-Lopez, and J. Tapiador, “Employing a secure cipher does not guarantee the security of rfid protocols,” in Iscturkey, 2014.
      [Bibtex]
      @INPROCEEDINGS{c32saf2014,
      year={2014},
      booktitle={ISCTURKEY},
      volume={},
      series={},
      doi={},
      title={Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols},
      url={},
      publisher={},
      keywords={},
      author={Safkhani, M. and Bagheri, N. and Peris-Lopez, P. and Tapiador, J.E.}\ref{\pageref{•}},
      pages={},
      }
    • [PDF] J. L. Hernandez-Ardieta, D. Santos, P. Parra, J. E. Tapiador, P. Peris-Lopez, J. Lopez, and G. Fernandez Navarrete, “An intelligent and adaptive live simulator: a new concept for cybersecurity training.,” in An intelligent and adaptive live simulator: a new concept for cybersecurity training., 2014.
      [Bibtex]
      @INPROCEEDINGS{c33ardietatpn2014,
      year={2014},
      booktitle={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.},
      volume={},
      series={},
      doi={},
      title={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.},
      url={},
      publisher={},
      keywords={},
      author={Hernandez-Ardieta, J.L. and Santos, D. and Parra, P. and Tapiador, J.E. and Peris-Lopez, P. and Lopez, J. and Fernandez Navarrete, G. },
      pages={},
      }
    • [PDF] G. Suarez-Tangil, J. E. Tapiador, and P. Peris-Lopez, “Stegomalware: playing hide and seek with malicious components in smartphone apps.,” in Inscrypt, 2014.
      [Bibtex]
      @INPROCEEDINGS{c34tangiltp2014,
      year={2014},
      booktitle={INSCRYPT},
      volume={},
      series={},
      doi={},
      title={Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. },
      url={},
      publisher={},
      keywords={},
      author={Suarez-Tangil, G. and Tapiador, J.E. and Peris-Lopez, P.},
      pages={},
      }
    • [PDF] [DOI] G. Suarez-Tangil, M. Conti, J. E. Tapiador, and P. Peris-Lopez, “Detecting targeted smartphone malware with behavior-triggering stochastic models,” in Computer security – esorics 2014, 2014, pp. 183-201.
      [Bibtex]
      @INPROCEEDINGS{c29sctp2014,
      year={2014},
      booktitle={Computer Security - ESORICS 2014},
      volume={8712},
      series={Lecture Notes in Computer Science},
      doi={10.1007/978-3-319-11203-9_11},
      title={Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models},
      url={http://dx.doi.org/10.1007/978-3-319-11203-9_11},
      publisher={Springer International Publishing},
      keywords={Smartphone security; targeted malware; cloud analysis},
      author={Suarez-Tangil, G. and Conti, M. and Tapiador, J. E. and Peris-Lopez, P.},
      pages={183-201},
      }
    • [PDF] R. M. Seepers, C. Strydis, P. Peris-Lopez, I. Sourdis, and C. I. De Zeeuw, “Peak misdetection in heart-beat-based security: characterization and tolerance,” in International conference of the ieee engineering in medicine and biology society — embc’14, 2014.
      [Bibtex]
      @INPROCEEDINGS{c30sspsz2014,
      year={2014},
      booktitle={International Conference of the IEEE Engineering in Medicine and Biology Society -- EMBC'14},
      volume={},
      series={},
      doi={},
      title={Peak Misdetection in Heart-Beat-Based Security: Characterization and Tolerance},
      url={},
      publisher={},
      keywords={},
      author={Seepers, R. M. and Strydis, C. and Peris-Lopez, P. and Sourdis, I. and De Zeeuw, C. I.},
      pages={},
      }
    • M. Naser, I. Aldmour, P. Peris-Lopez, and R. Budiarto, “Vulnerability analysis of a mutual authentication protocol conforming to epc class-1 generation-2 standard,” in International conference on electrical engineering, computer science and informatics — eecsi’04, 2014.
      [Bibtex]
      @INPROCEEDINGS{c31napb2014,
      year={2014},
      booktitle={International Conference on Electrical Engineering, Computer Science and Informatics -- EECSI'04},
      volume={},
      series={},
      doi={},
      title={Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard},
      url={},
      publisher={},
      keywords={},
      author={Naser, M. and Aldmour, I. and Peris-Lopez, P. and Budiarto, R.},
      pages={},
      }
    • M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, and J. C. Hernandez-Castro, “Weaknesses in another Gen2-Based RFID authentication protocol,” in Ieee international conference on rfid-technology and applications — ieee rfid ta 2012, Nice, France, 2012.
      [Bibtex]
      @INPROCEEDINGS{c28snpmh2012,
      author = {Safkhani, Masoumeh and Bagheri, Nasour and Peris-Lopez, Pedro and Mitrokotsa, Aikaterini and Hernandez-Castro, Julio Cesar. },
      title = {Weaknesses in another {Gen2-Based} {RFID} Authentication Protocol},
      booktitle = {IEEE International Conference on RFID-Technology and Applications -- IEEE RFID TA 2012},
      year = {2012},
      editor = {},
      volume = {},
      series = {IEEE Press},
      pages = {},
      address = {Nice, France},
      month = {November},
      organization = {IEEE},
      publisher = {},
      pdf = {},
      slides = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • M. Safkhani, P. Peris-Lopez, C. H. ulio Castro, and N. Bagheri, “Cryptanalysis of cho et al.’s protocol: a hash-based rfid tag mutual authentication protocol,” in International conference on applied and computational mathematics (icacm), 2012.
      [Bibtex]
      @inproceedings{c27sphb2012,
      author = {Masoumeh Safkhani and Pedro Peris-Lopez and ulio C{\'e}sar Hern{\'a}ndez Castro and Nasour Bagheri},
      title = {Cryptanalysis of Cho et al.'s Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol},
      booktitle = {International Conference on Applied and Computational Mathematics (ICACM)},
      year = {2012},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, and J. C. H. Castro, “On the security of tan et al. serverless rfid authentication and search protocols,” in Rfidsec, 2012.
      [Bibtex]
      @inproceedings{c26spbnh2012,
      author = {Masoumeh Safkhani and Pedro Peris-Lopez and Nasour Bagheri and Majid Naderi and Julio C{\'e}sar Hern{\'a}ndez Castro},
      title = {On the Security of Tan et al. Serverless RFID Authentication and Search Protocols},
      booktitle = {RFIDSec},
      year = {2012},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • [PDF] [DOI] J. C. Hernandez-Castro, P. Peris-Lopez, M. Safkhani, N. Bagheri, and M. Naderi, “Another fallen hash-based rfid authentication protocol,” in Wistp, 2012, pp. 29-37.
      [Bibtex]
      @inproceedings{c25hpsbn2012,
      author = {Julio C. Hernandez-Castro and
      Pedro Peris-Lopez and
      Masoumeh Safkhani and
      Nasour Bagheri and
      Majid Naderi},
      title = {Another Fallen Hash-Based RFID Authentication Protocol},
      booktitle = {WISTP},
      year = {2012},
      volume = {7322},
      series = {LNCS},
      pages = {29-37},
      publisher = {Springer-Verlag},
      doi = {10.1007/978-3-642-30955-7_4},
      crossref = {DBLP:conf/wistp/2012},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. C. H. Castro, P. Peris-Lopez, and J. Aumasson, “On the key schedule strength of present,” in Dpm/setop, 2011, pp. 253-263.
      [Bibtex]
      @inproceedings{c24hpa2011,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Jean-Philippe Aumasson},
      title = {On the Key Schedule Strength of PRESENT},
      booktitle = {DPM/SETOP},
      year = {2011},
      pages = {253-263},
      doi = {10.1007/978-3-642-28879-1_17},
      crossref = {DBLP:conf/esorics/2011-7122},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. Aumasson, A. Mitrokotsa, and P. Peris-Lopez, “A note on a privacy-preserving distance-bounding protocol,” in Icics, 2011, pp. 78-92.
      [Bibtex]
      @inproceedings{c23amp2011,
      author = {Jean-Philippe Aumasson and
      Aikaterini Mitrokotsa and
      Pedro Peris-Lopez},
      title = {A Note on a Privacy-Preserving Distance-Bounding Protocol},
      booktitle = {ICICS},
      year = {2011},
      pages = {78-92},
      doi = {10.1007/978-3-642-25243-3_7},
      crossref = {DBLP:conf/icics/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] M. Merhi, J. C. H. Castro, and P. Peris-Lopez, “Studying the pseudo random number generator of a low-cost rfid tag,” in Rfid-ta, 2011, pp. 381-385.
      [Bibtex]
      @inproceedings{c22mhp2011,
      author = {Mohamad Merhi and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez},
      title = {Studying the pseudo random number generator of a low-cost
      RFID tag},
      booktitle = {RFID-TA},
      year = {2011},
      pages = {381-385},
      doi = {10.1109/RFID-TA.2011.6068666},
      crossref = {DBLP:conf/rfidta/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] H. Martin, E. S. Millán, L. Entrena, J. C. H. Castro, and P. Peris-Lopez, “Akari-x: a pseudorandom number generator for secure lightweight systems,” in Iolts, 2011, pp. 228-233.
      [Bibtex]
      @inproceedings{c21hmlhp2011,
      author = {Honorio Martin and
      Enrique San Mill{\'a}n and
      Luis Entrena and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez},
      title = {AKARI-X: A pseudorandom number generator for secure lightweight systems},
      booktitle = {IOLTS},
      year = {2011},
      pages = {228-233},
      doi = {10.1109/IOLTS.2011.5994534},
      crossref = {DBLP:conf/iolts/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, E. San Millán, J. C. A. van der Lubbe, and L. A. Entrena, “Cryptographically secure pseudo-random bit generator for rfid tags,” in International conference for internet technology and secured transactions (icitst), 2010, pp. 1-6.
      [Bibtex]
      @INPROCEEDINGS{c20pmle2010,
      author={Peris-Lopez, P. and San Millán, E. and van der Lubbe, J.C.A. and Entrena, L.A.},
      booktitle={International Conference for Internet Technology and Secured Transactions (ICITST)},
      title={Cryptographically secure pseudo-random bit generator for RFID tags},
      year={2010},
      month={nov.},
      volume={},
      number={},
      pages={1 -6},
      keywords={Clocks;Cryptography;Radiofrequency identification;cryptographic protocols;radiofrequency identification;random number generation;security of data;transponders;Blum-Blum-Shub pseudorandom number generator;RFID protocols;RFID tags;cryptographically secure pseudorandom bit generator;security levels;transponder;BBS;CS-PRNG;RFID;privacy;randomness;},
      doi={},
      note = {(Best paper award)},
      ISSN={},}
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiador, and T. Li, “Quasi-linear cryptanalysis of a secure rfid ultralightweight authentication protocol,” in Inscrypt, 2010, pp. 427-442.
      [Bibtex]
      @inproceedings{c19phptl2010,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiador and
      Tieyan Li},
      title = {Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol},
      booktitle = {Inscrypt},
      year = {2010},
      pages = {427-442},
      doi = {10.1007/978-3-642-21518-6_30},
      crossref = {DBLP:conf/cisc/2010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiado, and T. Li, “Passive cryptanalysis of an ultralightweight authentication protocol of rfidsec’10 asia (poster),” in Rfidsec, 2010.
      [Bibtex]
      @inproceedings{c18phpt2010,
      author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiado and Tieyan Li},
      title = {Passive Cryptanalysis of an Ultralightweight Authentication Protocol of RFIDsec'10 Asia (Poster)},
      booktitle = {RFIDSec},
      year = {2010},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • [PDF] [DOI] J. C. H. Castro, P. Peris-Lopez, R. C. -W. Phan, and J. M. Estévez-Tapiador, “Cryptanalysis of the david-prasad rfid ultralightweight authentication protocol,” in Rfidsec, 2010, pp. 22-34.
      [Bibtex]
      @inproceedings{c17hppt2010,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiador},
      title = {Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol},
      booktitle = {RFIDSec},
      year = {2010},
      pages = {22-34},
      doi = {10.1007/978-3-642-16822-2_3},
      crossref = {DBLP:conf/rfidsec/2010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, E. Palomar, and J. C. A. van der Lubbe, “Cryptographic puzzles and distance-bounding protocols: practical tools for rfid security,” in Rfid, 2010 ieee international conference on, 2010, pp. 45-52.
      [Bibtex]
      @INPROCEEDINGS{c16phtpl2010,
      author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Tapiador, J.M.E. and Palomar, E. and van der Lubbe, J.C.A.},
      booktitle={RFID, 2010 IEEE International Conference on},
      title={Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security},
      year={2010},
      month={april},
      volume={},
      number={},
      pages={45 -52},
      keywords={Clothing;Computer science;Cryptographic protocols;Cryptography;Databases;Manufacturing;Privacy;Protection;Radiofrequency identification;Security;cryptographic protocols;data privacy;radiofrequency identification;telecommunication security;RFID;WSBC;cryptographic puzzles;distance bounding protocols;privacy protection;systems security;weakly secret bit commitment;RFID security;WSBC;cryptographic puzzles;distance-bounding protocols;privacy;traceability;},
      doi={10.1109/RFID.2010.5467258},
      ISSN={},}
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and J. C. A. van der Lubbe, “Security Flaws in a Recent Ultralightweight RFID Protocol,” in Workshop on rfid security — rfidsec asia’10, Singapore, Republic of Singapore, 2010, pp. 83-93.
      [Bibtex]
      @INPROCEEDINGS{ch15phtl2010,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and van der Lubbe, Jan C. A.},
      title = {{Security Flaws in a Recent Ultralightweight RFID Protocol}},
      booktitle = {Workshop on RFID Security -- RFIDSec Asia'10},
      year = {2010},
      editor = {},
      volume = {4},
      series = {Cryptology and Information Security},
      pages = {83--93},
      address = {Singapore, Republic of Singapore},
      month = {February},
      organization = {},
      publisher = {IOS Press},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. Hernandez-Castro, J. Tapiador, T. Li, and J. Lubbe, “Weaknesses in two recent lightweight rfid authentication protocols,” in Information security and cryptology, 2011, pp. 383-392.
      [Bibtex]
      @inproceedings{c14phttl2011,
      year={2011},
      isbn={978-3-642-16341-8},
      booktitle={Information Security and Cryptology},
      volume={6151},
      series={Lecture Notes in Computer Science},
      doi={10.1007/978-3-642-16342-5_28},
      title={Weaknesses in Two Recent Lightweight RFID Authentication Protocols},
      url={http://dx.doi.org/10.1007/978-3-642-16342-5_28},
      publisher={Springer Berlin Heidelberg},
      keywords={RFID; EPC; Cloning; Traceability; Impersonation; Cryptanalysis; BAN; Proof},
      author={Peris-Lopez, Pedro and Hernandez-Castro, JulioC. and Tapiador, JuanM.E. and Li, Tieyan and Lubbe, JanC.A.},
      pages={383-392}
      }
    • [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estévez-Tapiador, E. S. Millán, and J. C. A. van der Lubbe, “Security flaws in an efficient pseudo-random number generator for low-power environments,” in Sewcn, 2009, pp. 25-35.
      [Bibtex]
      @inproceedings{c13phtsl2009,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Enrique San Mill{\'a}n and
      Jan C. A. van der Lubbe},
      title = {Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments},
      booktitle = {SEWCN},
      year = {2009},
      pages = {25-35},
      doi = {10.1007/978-3-642-11526-4_3},
      crossref = {DBLP:conf/sewcn/2009},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] J. C. Hernandez-Castro, J. M. Estevez-Tapiador, P. Peris-Lopez, and J. Quisquater, “Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations,” in International workshop on coding and cryptography — wcc’09, Ullensvang, Norway, 2009.
      [Bibtex]
      @INPROCEEDINGS{c12htpq2009,
      author = {Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Peris-Lopez, Pedro and Quisquater, Jean-Jacques},
      title = {{Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations}},
      booktitle = {International Workshop on Coding and Cryptography -- WCC'09},
      year = {2009},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Ullensvang, Norway},
      month = {May},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] J. C. Hernandez-Castro, J. E. Tapiador, P. Peris-Lopez, J. A. Clark, and E. -G. Talbi, “Metaheuristic traceability attack against slmap, an rfid lightweight authentication protocol,” in Parallel distributed processing, 2009. ipdps 2009. ieee international symposium on, 2009, pp. 1-5.
      [Bibtex]
      @INPROCEEDINGS{c11htpct2009,
      author={Hernandez-Castro, J.C. and Tapiador, J.E. and Peris-Lopez, P. and Clark, J.A. and Talbi, E.-G.},
      booktitle={Parallel Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on}, title={Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol},
      year={2009},
      month={may},
      volume={},
      number={},
      pages={1 -5},
      keywords={Authentication;Computer science;Cost function;Cryptographic protocols;Cryptography;NP-hard problem;Proposals;Radiofrequency identification;Robustness;Security;cryptographic protocols;message authentication;radiofrequency identification;RFID ultra-lightweight authentication protocol;SLMAP algorithm;black-box technique;metaheuristic traceability attack;},
      doi={10.1109/IPDPS.2009.5161121},
      ISSN={1530-2075},}
    • [PDF] [DOI] P. Peris-Lopez, T. Lim, and T. Li, “Providing stronger authentication at a low cost to rfid tags operating under the epcglobal framework,” in Euc (2), 2008, pp. 159-166.
      [Bibtex]
      @inproceedings{c10pll2008,
      author = {Pedro Peris-Lopez and
      Tong-Lee Lim and
      Tieyan Li},
      title = {Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework},
      booktitle = {EUC (2)},
      year = {2008},
      pages = {159-166},
      doi = {10.1109/EUC.2008.82},
      crossref = {DBLP:conf/euc/2008-2},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Advances in ultralightweight cryptography for low-cost rfid tags: gossamer protocol,” in Wisa, 2008, pp. 56-68.
      [Bibtex]
      @inproceedings{c9phtr2008,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol},
      booktitle = {WISA},
      year = {2008},
      pages = {56-68},
      doi = {10.1007/978-3-642-00306-6_5},
      crossref = {DBLP:conf/wisa/2008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, T. Li, L. Tong Lee, J. C. Hernandez-Castro, and J. M. Estevez-Tapiador, “Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard,” in Workshop on rfid security — rfidsec’08, Budapest, Hungary, 2008.
      [Bibtex]
      @INPROCEEDINGS{c8ptlht2008,
      author = {Peris-Lopez, Pedro and Li, Tieyan and Tong Lee, Lim and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M.},
      title = {{Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard}},
      booktitle = {Workshop on RFID Security -- RFIDSec'08},
      year = {2008},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Budapest, Hungary},
      month = {July},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “An efficient authentication protocol for rfid systems resistant to active attacks,” in Euc workshops, 2007, pp. 781-794.
      [Bibtex]
      @inproceedings{c7phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks},
      booktitle = {EUC Workshops},
      year = {2007},
      pages = {781-794},
      doi = {10.1007/978-3-540-77090-9_71},
      crossref = {DBLP:conf/euc/2007w},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Solving the simultaneous scanning problem anonymously: clumping proofs for rfid tags,” in Security, privacy and trust in pervasive and ubiquitous computing, 2007. secperu 2007. third international workshop on, 2007, pp. 55-60.
      [Bibtex]
      @INPROCEEDINGS{c6phtr2006,
      author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Estevez-Tapiador, J.M. and Ribagorda, A.},
      booktitle={Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on}, title={Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags},
      year={2007},
      month={july},
      volume={},
      number={},
      pages={55 -60},
      keywords={Frequency;History;Privacy;Proposals;Protection;Protocols;RFID tags;Radiofrequency identification;Security;Ubiquitous computing;data privacy;radiofrequency identification;RFID security;RFID tag;clumping proofs;location privacy violation;multi-proofs session attack;privacy;replay attacks;simultaneous scanning problem anonymously;},
      doi={10.1109/SECPERU.2007.12},
      ISSN={},}
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard,” in Workshop on rfid security — rfidsec’07, Malaga, Spain, 2007.
      [Bibtex]
      @INPROCEEDINGS{c5phtr2006,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      title = {{Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard}},
      booktitle = {Workshop on RFID Security -- RFIDSec'07},
      year = {2007},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Malaga, Spain},
      month = {July},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Rfid systems: a survey on security threats and proposed solutions,” in Pwc, 2006, pp. 159-170.
      [Bibtex]
      @inproceedings{c4phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {RFID Systems: A Survey on Security Threats and Proposed Solutions},
      booktitle = {PWC},
      year = {2006},
      pages = {159-170},
      doi = {10.1007/11872153_14},
      crossref = {DBLP:conf/ifip6-8/2006},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Emap: an efficient mutual-authentication protocol for low-cost rfid tags,” in Otm workshops (1), 2006, pp. 352-361.
      [Bibtex]
      @inproceedings{c3phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags},
      booktitle = {OTM Workshops (1)},
      year = {2006},
      pages = {352-361},
      doi = {10.1007/11915034_59},
      crossref = {DBLP:conf/otm/2006-w1},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “M2ap: a minimalist mutual-authentication protocol for low-cost rfid tags,” in Uic, 2006, pp. 912-923.
      [Bibtex]
      @inproceedings{c2phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags},
      booktitle = {UIC},
      year = {2006},
      pages = {912-923},
      doi = {10.1007/11833529_93},
      crossref = {DBLP:conf/uic/2006},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Workshop on rfid security — rfidsec’06, Graz, Austria, 2006.
      [Bibtex]
      @INPROCEEDINGS{c1phtr2006,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      title = {{LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags}},
      booktitle = {Workshop on RFID Security -- RFIDSec'06},
      year = {2006},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      month = {July},
      address = {Graz, Austria},
      organization = {Ecrypt},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }

Books

    • P. Peris-Lopez, Lightweight cryptography in radio frequency identification systems: analysis and design of protocols and cryptographic primitives, VDM Verlag Dr. Müller, 2010.
      [Bibtex]
      @book{b2peris,
      url={http://www.amazon.com/Lightweight-Cryptography-Frequency-Identification-Systems/dp/3639108973},
      author={Pedro Peris-Lopez},
      title={Lightweight Cryptography in Radio Frequency Identification Systems: Analysis and Design of Protocols and Cryptographic Primitives},
      publisher={VDM Verlag Dr. Müller},
      year={2010},
      isbn={3639108973},
      editor={},
      url={http://www.amazon.com/Lightweight-Cryptography-Frequency-Identification-Systems/dp/3639108973},
      pages={},
      }

Chapters

    • P. Picazo-Sanchez, L. Ortiz-Martin, P. Peris-Lopez, and J. C. Hernandez-Castro, “Security of epc class-1,” in Security and trends in wireless identification and sensing platform tags: advancements in rfid, Information Science Reference, 2012, pp. 34-63.
      [Bibtex]
      @incollection{b6plph2012,
      year={2012},
      isbn={},
      booktitle={ Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID},
      editor={},
      doi={},
      title={Security of EPC Class-1},
      url={http://www.igi-global.com/chapter/security-epc-class/68739},
      publisher={Information Science Reference},
      author={Picazo-Sanchez, Pablo and Ortiz-Martin, Lara and Peris-Lopez, Pedro and Hernandez-Castro, Julio Cesar},
      pages={34-63},
      }
    • [PDF] [DOI] A. Mitrokotsa, M. Beye, and P. Peris-Lopez, “Threats to networked rfid systems,” in Unique radio innovation for the 21st century, D. C. Ranasinghe, Q. Z. Sheng, and S. Zeadally, Eds., Springer Berlin Heidelberg, 2010, pp. 39-63.
      [Bibtex]
      @incollection{b1mbp2010,
      year={2010},
      isbn={978-3-642-03461-9},
      booktitle={Unique Radio Innovation for the 21st Century},
      editor={Ranasinghe, Damith C. and Sheng, Quan Z. and Zeadally, Sherali},
      doi={10.1007/978-3-642-03462-6_3},
      title={Threats to Networked RFID Systems},
      url={http://dx.doi.org/10.1007/978-3-642-03462-6_3},
      publisher={Springer Berlin Heidelberg},
      author={Mitrokotsa, Aikaterini and Beye, Michael and Peris-Lopez, Pedro},
      pages={39-63},
      }
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Attacking r fid systems,” in Security in rfid and sensor networks., Auerbach Publications,Taylor & Francis Group, 2009, pp. 29-48.
      [Bibtex]
      @incollection{b3phtr2009,
      year={2009},
      isbn={},
      booktitle={Security in RFID and Sensor Networks.},
      editor={},
      doi={},
      title={Attacking R FID Systems},
      url={http://books.google.es/books?id=lPEwic6W1RgC&lpg=PR5&dq=Attacking%20RFID%20Systems%20peris&pg=PA29},
      publisher={Auerbach Publications,Taylor \& Francis Group},
      author={Peris-Lopez, Pedro and Hernandez-Castro, Julio Cesar and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      pages={29-48},
      }
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Lightweight cryptography for low-cost rfid tags,” in Security in rfid and sensor networks., Auerbach Publications,Taylor & Francis Group, 2009, p. 121–150.
      [Bibtex]
      @incollection{b4phtr2009,
      year={2009},
      isbn={},
      booktitle={Security in RFID and Sensor Networks.},
      editor={},
      doi={},
      title={Lightweight Cryptography for Low-Cost RFID Tags},
      url={http://books.google.es/books?id=lPEwic6W1RgC&lpg=PA121&dq=Lightweight%20Cryptography%20for%20Low-Cost%20RFID%20Tags&pg=PA121},
      publisher={Auerbach Publications,Taylor \& Francis Group},
      author={Peris-Lopez, Pedro and Hernandez-Castro, Julio Cesar and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      pages={121–150},
      }
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Rfid specification revisited,” in The internet of things: from rfid to the next-generation pervasive networked systems, Auerbach Publications,Taylor & Francis Group, 2008, p. 127–156.
      [Bibtex]
      @incollection{b5phtr2008,
      year={2008},
      isbn={},
      booktitle={The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems},
      editor={},
      doi={},
      title={RFID Specification Revisited},
      url={http://books.google.es/books?id=_ZS_g_IHhD0C&lpg=PR5&dq=RFID%20Specification%20Revisited&pg=PA127},
      publisher={Auerbach Publications,Taylor \& Francis Group},
      author={Peris-Lopez, Pedro and Hernandez-Castro, Julio Cesar and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      pages={127–156},
      }

Journals  (Spanish)

  1. La Seguridad en los Dispositivos de Identificación de Radiofrecuencia. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda. En Seguritecnia vol. 328, pp. 134–138, (2007).

  2. Estudio y Análisis de la Distribución de Contenidos Falsos enu na Red P2P. Esther Palomar, Jose L. Cadiz, P. Peris-Lopez and A. Ribagorda. En ALI Base Informática vol. 42, pp. 37–41, (2006).

Published Scientific Papers (Spanish)

  1. La seguridad de mañana: Estado del Arte sobre la Seguridad en Dispositivos Médicos Implantables. Carmen Cámara, Pedro Peris-Lopez y Benjamín Ramos. En XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012). pdf
  2. Seudónimos en RFID: Utilización de un Protocolo Criptográfico Ligero como Mecanismo de Protección contra la Privacidad y la Trazabilidad. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagordo. En Primeras Jornadas Científicas sobre RFID. Ciudad Real (Spain), Noviembre, 2007.

  3. Protocolo de Marcado de Caminos Mediante Dispositivos RFID. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda. En Reunión Española sobre Criptología y Seguridad de la Información “RECSI’06”. Barcelona (Spain), September, 2006.

  4. Kerberos – Creación Dinámica de Tickets Proxy. Pedro Peris-Lopez, Jesús Carretero Pérez y Arturo Ribagorda. En I Simposio sobre seguridad Informática (SSI’05) . Thomson, Granada (Spain), Septiembre, 2005.

Vulgarization Papers (Spanish)

  1. La seguridad en los ficheros informáticos. Pedro Peris-Lopez y Maria José Romero Santiago. En @rroba vol 142, pp 20-24, 2009.

  2. Contraseñas seguras. Pedro Peris-Lopez. En @rroba vol 133, pp 78-81, 2008.

  3. Criptografía clásica. Pedro Peris-Lopez. En @rroba vol 132, pp 78-81, 2008.

  4. Números aleatorios. Pedro Peris-Lopez. En @rroba vol 132, pp 33-37, 2008.

  5. Cifrador TEA y sus variantes. Pedro Peris-Lopez. En @rroba vol 130, pp 78-81, 2008.

  6. Virus en las etiquetas RFID (Parte II) ¿Realidad o ficción? Pedro Peris-Lopez. En @rroba vol 128, pp 43-45, 2008.

  7. Virus y RFID ¿Podrían utilizarse las etiquetas RFID como medio de propagación de un virus? Pedro Peris-Lopez. En @rroba vol 126, pp 32-37, 2008.

  8. Human Protocols. Ana Luz Cortés Vara y Pedro Peris-Lopez. En @rroba vol. 124, pp. 44-88, 2008.

  9. Pasaportes electrónicos: mecanismos de seguridad avanzada. Pedro Peris-Lopez. En @rroba vol. 123, pp. 82-88, 2007.

  10. Pasaportes electrónicos. Pedro Peris-Lopez. En @rroba vol. 120, pp. 44-50, 2007.

  11. RFID Riesgos y Amenazas. Pedro Peris-Lopez. En @rroba vol. 119, pp. 78–82, 2007.


© Copyright Pedro Peris-Lopez – LW Cryptography 2017. All Rights Reserved