Alberto Peinado

Orcid: 0000-0003-1183-736X

According to our database1, Alberto Peinado authored at least 47 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Women in Telecommunication Engineering: Case Studies.
Rev. Iberoam. de Tecnol. del Aprendiz., 2024

Dual-System Recommendation Architecture for Adaptive Reading Intervention Platform for Dyslexic Learners.
Proceedings of the Bioinspired Systems for Translational Applications: From Robotics to Social Engineering, 2024

2022
Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices.
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022

2020
Gaussian Pseudorandom Number Generator Based on Cyclic Rotations of Linear Feedback Shift Registers.
Sensors, 2020

2019
Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams.
Cryptologia, 2019

An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks.
Comput. Networks, 2019

2018
Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis.
Proceedings of the Computer and Network Security Essentials., 2018

2017
RFID Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017

Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis.
Knowl. Based Syst., 2017

PET Image Classification Using HHT-Based Features Through Fractal Sampling.
Proceedings of the Natural and Artificial Computation for Biomedicine and Neuroscience, 2017

2016
Content-based image authentication using sparse features and SOM trajectories.
Log. J. IGPL, 2016

Optimal modes of operation of pseudorandom sequence generators based on DLFSRs.
Log. J. IGPL, 2016

Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments.
Comput. Commun., 2016

Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

2015
Revision of J3Gen and Validity of the Attacks by Peinado et al.
Sensors, 2015

Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process.
Proceedings of the International Joint Conference, 2015

2014
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen.
Sensors, 2014

Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
IACR Cryptol. ePrint Arch., 2014

Prediction of Sequences Generated by LFSR Using Back Propagation MLP.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Improving the Period and Linear Span of the Sequences Generated by DLFSRs.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback.
Math. Comput. Model., 2013

Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm.
Log. J. IGPL, 2013

Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

Content-Based Image Authentication Using Local Features and SOM Trajectories.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013

2012
Lightweight Authentication Protocols based on Rotations and the LPN Problem.
Proceedings of the SENSORNETS 2012, 2012

Cryptographic Analysis of a Type of Sequence Generators.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

2010
Enhanced low-cost RFID protocol to detect relay attacks.
Wirel. Commun. Mob. Comput., 2010

Attacks on a distance bounding protocol.
Comput. Commun., 2010

Robotic vehicles to simulate RFID-based vehicular ad hoc networks.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

What can RFID do for Vanets? - A Cryptographic Point of View.
Proceedings of the SECRYPT 2010, 2010

2009
Secure EPC Gen2 compliant Radio Frequency Identification.
IACR Cryptol. ePrint Arch., 2009

Security flaw of Hölbl et al.'s protocol.
Comput. Commun., 2009

A Scaled Test Bench for Vanets with RFID Signalling.
Proceedings of the Computational Intelligence in Security for Information Systems, 2009

2008
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
Wirel. Commun. Mob. Comput., 2008

Attacks on Singelee and Preneel's protocol.
IACR Cryptol. ePrint Arch., 2008

Security Analysis of Tu and Piramuthu's Protocol.
Proceedings of the NTMS 2008, 2008

2007
HB-MP: A further step in the HB-family of lightweight authentication protocols.
Comput. Networks, 2007

2006
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem.
J. Inf. Sci. Eng., 2006

Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol.
Comput. Commun., 2006

2004
Privacy and authentication protocol providing anonymous channels in GSM.
Comput. Commun., 2004

Cryptanalysis of LHL-key authentication scheme.
Appl. Math. Comput., 2004

Multirate MC-DS-CDMA transmitter for 4G communications.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

2003
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
Comput. Networks, 2003


  Loading...