Journals

    • [PDF] C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: a comprehensive survey.,” Journal of biomedical informatics, vol. 55, pp. 272-289, 2015.
      [Bibtex]
      @article{j37camarapt2015,
      title = "Security and privacy issues in implantable medical devices: A comprehensive survey.",
      journal = "Journal of Biomedical Informatics",
      volume = "55",
      number = "",
      pages = "272-289",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Camara, C. and Peris-Lopez, P. and Tapiador, J. E.},
      }
    • [PDF] S. Pastrana, J. E. Tapiador, A. Orfila, and P. Peris-Lopez, “Defidnet: a framework for optimal allocation of cyberdefenses in intrusion detection networks,” Computer networks., vol. 80, pp. 66-88, 2015.
      [Bibtex]
      @article{j36pastranatop2015,
      title = "DEFIDNET: A Framework For Optimal Allocation of Cyberdefenses in Intrusion Detection Networks",
      journal = "Computer Networks.",
      volume = "80",
      number = "",
      pages = "66-88",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Pastrana, S. and Tapiador, J. E. and Orfila, A. and Peris-Lopez, P.},
      }
    • [PDF] J. M. de Fuentes, P. Peris-Lopez, J. E. Tapiador, and S. Pastrana, “Probabilistic yoking proofs for large scale iot systems,” Ad hoc networks, iss. 32, pp. 43-52, 2015.
      [Bibtex]
      @article{j35fuentesptp2015,
      title = "Probabilistic Yoking Proofs for Large Scale IoT Systems",
      journal = "Ad Hoc Networks",
      volume = "",
      number = "32",
      pages = "43-52",
      year = "2015",
      note = "",
      issn = "",
      doi = "",
      url = "",
      author = {Fuentes, J. M. de and Peris-Lopez, P and Tapiador, J.E. and Pastrana, S.},
      }
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and S. Pastrana, “Power-aware anomaly detection in smartphones: an analysis of on-platform versus externalized operation,” Pervasive and mobile computing, vol. 18, pp. 137-151, 2015.
      [Bibtex]
      @article{j34tangiltpp2015,
      title = "Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation ",
      journal = "Pervasive and Mobile Computing ",
      volume = "18",
      number = "",
      pages = "137-151 ",
      year = "2015",
      note = "",
      issn = "1574-1192",
      doi = "10.1016/j.pmcj.2014.10.007",
      url = "http://www.sciencedirect.com/science/article/pii/S1574119214001795",
      author = "G. Suarez-Tangil and J. E. Tapiador and P. Peris-Lopez and S. Pastrana",
      }
    • [PDF] [DOI] J. Blasco, J. E. Tapiador, P. Peris-Lopez, and G. Suarez-Tangil, “Hindering data theft with encrypted data trees,” Journal of systems and software, vol. 101, pp. 147-158, 2015.
      [Bibtex]
      @article{j33blascotpt2014,
      title = "Hindering data theft with encrypted data trees ",
      journal = "Journal of Systems and Software ",
      volume = "101",
      number = "0",
      pages = "147 - 158",
      year = "2015",
      note = "",
      issn = "0164-1212",
      doi = "10.1016/j.jss.2014.11.050",
      url = "http://www.sciencedirect.com/science/article/pii/S0164121214002775",
      author = "J. Blasco and J. E. Tapiador and P. Peris-Lopez and G. Suarez-Tangil",
      }
    • [PDF] [DOI] P. Picazo-Sanchez, J. E. Tapiador, P. Peris-Lopez, and G. Suarez-Tangil, “Secure publish-subscribe protocols for heterogeneous medical wireless body area networks,” Sensors, vol. 14, iss. 12, pp. 22619-22642, 2014.
      [Bibtex]
      @article{j32picatpt2014,
      AUTHOR = {Picazo-Sanchez, P. and Tapiador, J. E. and Peris-Lopez, P. and Suarez-Tangil, G.},
      TITLE = {Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks},
      JOURNAL = {Sensors},
      VOLUME = {14},
      YEAR = {2014},
      NUMBER = {12},
      PAGES = {22619--22642},
      URL = {http://www.mdpi.com/1424-8220/14/12/22619},
      PubMedID = {25460814},
      ISSN = {1424-8220},
      DOI = {10.3390/s141222619}
      }
    • [DOI] P. Picazo-Sanchez, L. Ortiz-Martin, P. Peris-Lopez, and N. Bagheri, “Weaknesses of fingerprint-based mutual authentication protocol,” Security and communication networks, p. n/a–n/a, 2014.
      [Bibtex]
      @article {j31picalpn2014,
      author = {Picazo-Sanchez, Pablo and Ortiz-Martin, Lara and Peris-Lopez, Pedro and Bagheri, Nasour},
      title = {Weaknesses of fingerprint-based mutual authentication protocol},
      journal = {Security and Communication Networks},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.1161},
      doi = {10.1002/sec.1161},
      pages = {n/a--n/a},
      keywords = {ubiquitous computing, sensors, security, BAN logic},
      year = {2014},
      }
    • [PDF] [DOI] S. Pastrana, A. Orfila, J. E. Tapiador, and P. Peris-Lopez, “Randomized anagram revisited,” Journal of network and computer applications, vol. 41, pp. 182-196, 2014.
      [Bibtex]
      @article{j30potp2014,
      title = "Randomized Anagram revisited ",
      journal = "Journal of Network and Computer Applications ",
      volume = "41",
      number = "0",
      pages = "182 - 196",
      year = "2014",
      note = "",
      issn = "1084-8045",
      doi = "http://dx.doi.org/10.1016/j.jnca.2013.11.006",
      url = "http://www.sciencedirect.com/science/article/pii/S1084804513002841",
      author = "S. Pastrana and A. Orfila and J. E. Tapiador and P. Peris-Lopez",
      }
    • [PDF] [DOI] M. Safkhani, P. Peris-Lopez, J. C. Hernandez-Castro, and N. Bagheri, “Cryptanalysis of the cho et al. protocol: a hash-based \RFID\ tag mutual authentication protocol,” Journal of computational and applied mathematics, vol. 259, Part B, pp. 571-577, 2014.
      [Bibtex]
      @article{j28sphb2014,
      title = "Cryptanalysis of the Cho et al. protocol: A hash-based \{RFID\} tag mutual authentication protocol ",
      journal = "Journal of Computational and Applied Mathematics ",
      volume = "259, Part B",
      number = "0",
      pages = "571 - 577",
      year = "2014",
      doi = "10.1016/j.cam.2013.09.073",
      url = "http://www.sciencedirect.com/science/article/pii/S0377042713005281",
      author = "M. Safkhani and P. Peris-Lopez and J. C. Hernandez-Castro and N. Bagheri",}
    • [PDF] [DOI] H. Martin, P. Peris-Lopez, J. E. Tapiador, and E. San Millan, “An estimator for the asic footprint area of lightweight cryptographic algorithms,” Ieee transactions on industrial informatics, vol. 10, iss. 2, pp. 1216-1225, 2014.
      [Bibtex]
      @null{j27hpts2013,
      author={Martin, H. and Peris-Lopez, P. and Tapiador, J.E. and San Millan, E.},
      journal={IEEE Transactions on Industrial Informatics},
      title={An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms},
      year={2014},
      volume={10},
      number={2},
      pages={1216-1225},
      keywords={Algorithm design and analysis;Clocks;Computer architecture;Cryptography;Hardware;Multiplexing;Registers;ASIC implementations;Footprint area;Lightweight algorithms;RFID;VHDL},
      doi={10.1109/TII.2013.2288576},
      ISSN={1551-3203},}
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, “Dendroid: a text mining approach to analyzing and classifying code structures in android malware families,” Expert systems with applications, vol. 41, iss. 4, Part 1, pp. 1104-1117, 2014.
      [Bibtex]
      @article{j25stpb2013,
      title = "Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families ",
      journal = "Expert Systems with Applications ",
      volume = "41",
      number = "4, Part 1",
      pages = "1104 - 1117 ",
      year = "2014",
      note = "",
      issn = "0957-4174",
      doi = "10.1016/j.eswa.2013.07.106",
      url = "http://www.sciencedirect.com/science/article/pii/S0957417413006088",
      author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Jorge Blasco",
      }
    • [PDF] [DOI] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, “Evolution, detection and analysis of malware for smart devices,” Ieee communications surveys & tutorials, vol. 16, iss. 2, pp. 961-987, 2014.
      [Bibtex]
      @article{j26stpr2013,
      title = "Evolution, Detection and Analysis of Malware for Smart Devices",
      journal = "IEEE Communications Surveys \& Tutorials",
      volume = "16",
      number = "2",
      pages = "961-987",
      year = "2014",
      note = "",
      issn = "",
      doi = "10.1109/SURV.2013.101613.00077",
      url = "",
      author = "Guillermo Suarez-Tangil and Juan E. Tapiador and Pedro Peris-Lopez and Arturo Ribagorda",
      }
    • [PDF] [DOI] N. Bagheri, M. Safkhani, P. Peris-Lopez, and J. E. Tapiador, “Weaknesses in a new ultralightweight rfid authentication protocol with permutation—rapp,” Security and communication networks, vol. 7, iss. 6, pp. 945-949, 2014.
      [Bibtex]
      @article {j22bspt2013,
      author = {Bagheri, Nasour and Safkhani, Masoumeh and Peris-Lopez, Pedro and Tapiador, Juan E.},
      title = {Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP},
      journal = {Security and Communication Networks},
      issn = {1939-0122},
      url = {http://dx.doi.org/10.1002/sec.803},
      doi = {10.1002/sec.803},
      volume={7},
      number={6},
      pages = {945-949},
      keywords = {RAPP, RFID security, authentication, attacks},
      year = {2014},
      }
    • [DOI] D. F. Barrero, J. C. Hernández-Castro, P. Peris-Lopez, D. Camacho, and M. D. R-Moreno, “A genetic tango attack against the david–prasad rfid ultra-lightweight authentication protocol,” Expert systems, vol. 31, iss. 1, pp. 9-19, 2014.
      [Bibtex]
      @article {j17bhpcm2012,
      author = {Barrero, David F. and Hernández-Castro, Julio César and Peris-Lopez, Pedro and Camacho, David and R-Moreno, María D.},
      title = {A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol},
      journal = {Expert Systems},
      issn = {1468-0394},
      url = {http://dx.doi.org/10.1111/j.1468-0394.2012.00652.x},
      doi = {10.1111/j.1468-0394.2012.00652.x},
      volume={31},
      number={1},
      pages = {9-19},
      keywords = {RFID, ultra-lightweight cryptography, genetic programming, security, tango attack},
      year = {2014},
      }
    • [PDF] [DOI] P. Peris-Lopez, M. Safkhani, N. Bagheri, and M. Naderi, “Rfid in ehealth: how to combat medication errors and strengthen patient safety,” Journal of medical and biological engineering, vol. 33, iss. 4, pp. 363-372, 2013.
      [Bibtex]
      @article{j24psbn2013,
      author = {Peris-Lopez, Pedro and Safkhani, Masoumeh and Bagheri, Nasour and Naderi, Majid},
      title = {RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety},
      journal = {Journal of Medical and Biological Engineering},
      volume = {33},
      number = {4},
      year = {2013},
      pages = {363-372},
      doi = {10.5405/jmbe.1276},
      }
    • [PDF] [DOI] A. Mitrokotsa, P. Peris-Lopez, C. Dimitrakakis, and S. Vaudenay, “On selecting the nonce length in distance-bounding protocols,” The computer journal, vol. 56, iss. 10, pp. 1216-1227, 2013.
      [Bibtex]
      @article{j23mpdv2013,
      author = {Mitrokotsa, Aikaterini and Peris-Lopez, Pedro and Dimitrakakis, Christos and Vaudenay, Serge},
      title = {On Selecting the Nonce Length in Distance-Bounding Protocols},
      year = {2013},
      doi = {10.1093/comjnl/bxt033},
      URL = {http://comjnl.oxfordjournals.org/content/early/2013/04/03/comjnl.bxt033.abstract},
      eprint = {http://comjnl.oxfordjournals.org/content/early/2013/04/03/comjnl.bxt033.full.pdf+html},
      journal = {The Computer Journal},
      volume={56},
      number={10},
      pages={1216-1227},
      }
    • [PDF] [DOI] C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, “A system architecture, processor, and communication protocol for secure implants,” Acm trans. archit. code optim., vol. 10, iss. 4, p. 57:1-57:23, 2013.
      [Bibtex]
      @article{j29sspss2014,
      author = {Strydis, C. and Seepers, R. M. and Peris-Lopez, P. and Siskos, D. and Sourdis, I.},
      title = {A System Architecture, Processor, and Communication Protocol for Secure Implants},
      journal = {ACM Trans. Archit. Code Optim.},
      volume = {10},
      number = {4},
      year = {2013},
      pages = {57:1-57:23},
      articleno = {57},
      numpages = {23},
      url = {http://doi.acm.org/10.1145/2555289.2555313},
      doi = {10.1145/2555289.2555313},
      acmid = {2555313},
      publisher = {ACM},
      }
    • [PDF] [DOI] H. Martin, E. San Millan, P. Peris-Lopez, and J. E. Tapiador, “Efficient asic implementation and analysis of two epc-c1g2 rfid authentication protocols,” Ieee sensors journal, vol. 13, iss. 10, pp. 3537-3547, 2013.
      [Bibtex]
      @ARTICLE{j21hnpt2013,
      author={Martin, Honorio and San Millan, Enrique and Peris-Lopez, Pedro and Tapiador, Juan E.},
      journal={IEEE Sensors Journal},
      title={Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols},
      year={2013},
      volume={13},
      number={10},
      pages={3537-3547},
      keywords={Internet of Things;application specific integrated circuits;cryptographic protocols;radiofrequency identification;ASIC implementation;EPC Class-1 Generation-2;EPC-C1G2 RFID authentication protocols;Internet of Things;RFID tags;UHF band;lightweight protocols;ASIC;Internet of Things;RFID;security protocol},
      doi={10.1109/JSEN.2013.2270404},
      ISSN={1530-437X},}
    • [PDF] [DOI] N. Bagheri, M. Safkhani, P. Peris-Lopez, and J. E. Tapiador, “Comments on "security improvement of an rfid security protocol of iso/iec wd 29167-6",” Ieee communications letters, vol. 17, iss. 4, pp. 805-807, 2013.
      [Bibtex]
      @article{j20bspt2013,
      author = {Bagheri, Nasour and
      Safkhani, Masoumeh and
      Peris-Lopez, Pedro and
      Tapiador, Juan E.},
      title = {Comments on "Security Improvement of an RFID Security Protocol
      of ISO/IEC WD 29167-6"},
      journal = {IEEE Communications Letters},
      volume = {17},
      number = {4},
      year = {2013},
      pages = {805-807},
      doi = {10.1109/LCOMM.2013.021213.122837},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Picazo-Sanchez, N. Bagheri, P. Peris-Lopez, and J. E. Tapiador, “Two rfid standard-based security protocols for healthcare environments,” J. medical systems, vol. 37, iss. 5, 2013.
      [Bibtex]
      @article{j19pbpt2013,
      author = {Picazo-Sanchez, Pablo and
      Bagheri, Nasour and
      Peris-Lopez, Pedro and
      Tapiador, Juan E.},
      title = {Two RFID Standard-based Security Protocols for Healthcare
      Environments},
      journal = {J. Medical Systems},
      volume = {37},
      number = {5},
      year = {2013},
      doi = {10.1007/s10916-013-9962-3},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [DOI] P. Picazo-Sanchez, L. Ortiz-Martin, P. Peris-Lopez, and J. C. Hernandez-Castro, “Cryptanalysis of the rnts system,” The journal of supercomputing, vol. 65, iss. 2, pp. 949-960, 2013.
      [Bibtex]
      @article{j18poph2013,
      author = {Picazo-Sanchez, Pablo and
      Ortiz-Martin, Lara and
      Peris-Lopez, Pedro and
      Hernandez-Castro, Julio C.},
      title = {Cryptanalysis of the RNTS system},
      journal = {The Journal of Supercomputing},
      volume = {65},
      number = {2},
      year = {2013},
      pages = {949-960},
      doi = {10.1007/s11227-013-0873-3},
      }
    • [PDF] [DOI] J. C. H. Castro, J. M. Estévez-Tapiador, P. Peris-Lopez, J. A. Clark, and E. Talbi, “Metaheuristic traceability attack against slmap, an rfid lightweight authentication protocol,” Int. j. found. comput. sci., vol. 23, iss. 2, pp. 543-553, 2012.
      [Bibtex]
      @article{j16htpct2012,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Pedro Peris-Lopez and
      John A. Clark and
      El-Ghazali Talbi},
      title = {Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol},
      journal = {Int. J. Found. Comput. Sci.},
      volume = {23},
      number = {2},
      year = {2012},
      pages = {543-553},
      doi = {10.1142/S0129054112400278},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. E. Tapiador, J. C. Hernandez-Castro, and P. Peris-Lopez, “Online randomization strategies to obfuscate user behavioral patterns,” J. network syst. manage., vol. 20, iss. 4, pp. 561-578, 2012.
      [Bibtex]
      @article{j15thp2012,
      author = {Juan E. Tapiador and
      Julio C. Hernandez-Castro and
      Pedro Peris-Lopez},
      title = {Online Randomization Strategies to Obfuscate User Behavioral Patterns},
      journal = {J. Network Syst. Manage.},
      volume = {20},
      number = {4},
      year = {2012},
      pages = {561-578},
      doi = {10.1007/s10922-012-9246-0},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] S. Pastrana, A. Mitrokotsa, A. Orfila, and P. Peris-Lopez, “Evaluation of classification algorithms for intrusion detection in manets,” Knowl.-based syst., vol. 36, pp. 217-225, 2012.
      [Bibtex]
      @article{j14pmop2012,
      author = {Sergio Pastrana and
      Aikaterini Mitrokotsa and
      Agust\'{\i}n Orfila and
      Pedro Peris-Lopez},
      title = {Evaluation of classification algorithms for intrusion detection in MANETs},
      journal = {Knowl.-Based Syst.},
      volume = {36},
      year = {2012},
      pages = {217-225},
      doi = {10.1016/j.knosys.2012.06.016},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, E. Palomar, and J. C. Hernandez-Castro, “A secure distance-based rfid identification protocol with an off-line back-end database,” Personal and ubiquitous computing, vol. 16, iss. 3, pp. 351-365, 2012.
      [Bibtex]
      @article{j13poph2012,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Esther Palomar and
      Julio C. Hernandez-Castro},
      title = {A secure distance-based RFID identification protocol with an off-line back-end database},
      journal = {Personal and Ubiquitous Computing},
      volume = {16},
      number = {3},
      year = {2012},
      pages = {351-365},
      doi = {10.1007/s00779-011-0396-y},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] M. Naser, P. Peris-Lopez, R. Budiarto, and B. R. Álvarez, “A note on the security of pap,” Computer communications, vol. 34, iss. 18, pp. 2248-2249, 2011.
      [Bibtex]
      @article{j12npbr2011,
      author = {Mu'awya Naser and
      Pedro Peris-Lopez and
      Rahmat Budiarto and
      Benjam\'{\i}n Ramos {\'A}lvarez},
      title = {A note on the security of PAP},
      journal = {Computer Communications},
      volume = {34},
      number = {18},
      year = {2011},
      pages = {2248-2249},
      doi = {10.1016/j.comcom.2011.07.002},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. E. Tapiador, and J. C. A. van der Lubbe, “Cryptanalysis of an epc class-1 generation-2 standard compliant authentication protocol,” Eng. appl. of ai, vol. 24, iss. 6, pp. 1061-1069, 2011.
      [Bibtex]
      @article{j11phtl2011,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador and
      Jan C. A. van der Lubbe},
      title = {Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol},
      journal = {Eng. Appl. of AI},
      volume = {24},
      number = {6},
      year = {2011},
      pages = {1061-1069},
      doi = {10.1016/j.engappai.2011.04.001},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, A. Mitrokotsa, and J. C. A. van der Lubbe, “A comprehensive rfid solution to enhance inpatient medication safety,” I. j. medical informatics, vol. 80, iss. 1, pp. 13-24, 2011.
      [Bibtex]
      @article{j10poml2011,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Aikaterini Mitrokotsa and
      Jan C. A. van der Lubbe},
      title = {A comprehensive RFID solution to enhance inpatient medication safety},
      journal = {I. J. Medical Informatics},
      volume = {80},
      number = {1},
      year = {2011},
      pages = {13-24},
      doi = {10.1016/j.ijmedinf.2010.10.008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, and J. C. A. van der Lubbe, “Flaws on rfid grouping-proofs. guidelines for future sound protocols,” J. network and computer applications, vol. 34, iss. 3, pp. 833-845, 2011.
      [Bibtex]
      @article{j9pohl2011,
      author = {Pedro Peris-Lopez and
      Agust\'{\i}n Orfila and
      Julio C. Hernandez-Castro and
      Jan C. A. van der Lubbe},
      title = {Flaws on RFID grouping-proofs. Guidelines for future sound protocols},
      journal = {J. Network and Computer Applications},
      volume = {34},
      number = {3},
      year = {2011},
      pages = {833-845},
      doi = {10.1016/j.jnca.2010.04.008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. E. Tapiador, T. Li, and Y. Li, “Vulnerability analysis of rfid protocols for tag ownership transfer,” Computer networks, vol. 54, iss. 9, pp. 1502-1508, 2010.
      [Bibtex]
      @article{j8phttl2010,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador and
      Tieyan Li and
      Yingjiu Li},
      title = {Vulnerability analysis of RFID protocols for tag ownership transfer},
      journal = {Computer Networks},
      volume = {54},
      number = {9},
      year = {2010},
      pages = {1502-1508},
      doi = {10.1016/j.comnet.2009.11.007},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, and J. C. H. Castro, “Reid et al.’s distance bounding protocol and mafia fraud attacks over noisy channels,” Ieee communications letters, vol. 14, iss. 2, pp. 121-123, 2010.
      [Bibtex]
      @article{j7ndph2010,
      author = {Aikaterini Mitrokotsa and
      Christos Dimitrakakis and
      Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro},
      title = {Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels},
      journal = {IEEE Communications Letters},
      volume = {14},
      number = {2},
      year = {2010},
      pages = {121-123},
      doi = {10.1109/LCOMM.2010.02.091946},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, T. Li, and J. C. Hernandez-Castro, “Lightweight props on the weak security of epc class-1 generation-2 standard,” Ieice transactions, vol. 93-D, iss. 3, pp. 518-527, 2010.
      [Bibtex]
      @article{j6pth2010,
      author = {Pedro Peris-Lopez and Tieyan Li and Julio C. Hernandez-Castro},
      title = {Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard},
      journal = {IEICE Transactions},
      volume = {93-D},
      number = {3},
      year = {2010},
      pages = {518-527},
      url = {http://search.ieice.org/bin/summary.php?id=e93-d_3_518},
      doi = {10.1587/transinf.E93.D.518},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, T. Li, J. C. Hernandez-Castro, and J. E. Tapiador, “Practical attacks on a mutual authentication scheme under the epc class-1 generation-2 standard,” Computer communications, vol. 32, iss. 7-10, pp. 1185-1193, 2009.
      [Bibtex]
      @article{j5phtr2009,
      author = {Pedro Peris-Lopez and
      Tieyan Li and
      Julio C. Hernandez-Castro and
      Juan E. Tapiador},
      title = {Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard},
      journal = {Computer Communications},
      volume = {32},
      number = {7-10},
      year = {2009},
      pages = {1185-1193},
      doi = {10.1016/j.comcom.2009.03.010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Lamed – a prng for epc class-1 generation-2 rfid specification,” Computer standards & interfaces, vol. 31, iss. 1, pp. 88-97, 2009.
      [Bibtex]
      @article{j4phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification},
      journal = {Computer Standards {\&} Interfaces},
      volume = {31},
      number = {1},
      year = {2009},
      pages = {88-97},
      doi = {10.1016/j.csi.2007.11.013},
      bibsource = {DBLP, http://dblp.uni-trier.de},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Cryptanalysis of a novel authentication protocol conforming to epc-c1g2 standard,” Computer standards & interfaces, vol. 31, iss. 2, pp. 372-380, 2009.
      [Bibtex]
      @article{j2phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard},
      journal = {Computer Standards {\&} Interfaces},
      volume = {31},
      number = {2},
      year = {2009},
      pages = {372-380},
      doi = {10.1016/j.csi.2008.05.012},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “An ultra light authentication protocol resistant to passive attacks under the gen-2 specification,” J. inf. sci. eng., vol. 25, iss. 1, pp. 33-57, 2009.
      [Bibtex]
      @article{j3phtr2009,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification},
      journal = {J. Inf. Sci. Eng.},
      volume = {25},
      number = {1},
      year = {2009},
      pages = {33-57},
      url = {http://www.iis.sinica.edu.tw/page/jise/2009/200901_03.html},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] J. M. Estévez-Tapiador, J. C. H. Castro, P. Peris-Lopez, and A. Ribagorda, “Automated design of cryptographic hash schemes by evolving highly-nonlinear functions,” J. inf. sci. eng., vol. 24, iss. 5, pp. 1485-1504, 2008.
      [Bibtex]
      @article{j1thpr2008,
      author = {Juan M. Est{\'e}vez-Tapiador and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Arturo Ribagorda},
      title = {Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions},
      journal = {J. Inf. Sci. Eng.},
      volume = {24},
      number = {5},
      year = {2008},
      pages = {1485-1504},
      url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809_13.html},
      bibsource = {DBLP, http://dblp.uni-trier.de},
      }

© Copyright Pedro Peris-Lopez – LW Cryptography 2017. All Rights Reserved