Alberto Peinado
Orcid: 0000-0003-1183-736X
According to our database1,
Alberto Peinado
authored at least 47 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Rev. Iberoam. de Tecnol. del Aprendiz., 2024
Dual-System Recommendation Architecture for Adaptive Reading Intervention Platform for Dyslexic Learners.
Proceedings of the Bioinspired Systems for Translational Applications: From Robotics to Social Engineering, 2024
2022
Proceedings of the International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022), 2022
2020
Gaussian Pseudorandom Number Generator Based on Cyclic Rotations of Linear Feedback Shift Registers.
Sensors, 2020
2019
Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams.
Cryptologia, 2019
An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks.
Comput. Networks, 2019
2018
Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis.
Proceedings of the Computer and Network Security Essentials., 2018
2017
Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis.
Knowl. Based Syst., 2017
Proceedings of the Natural and Artificial Computation for Biomedicine and Neuroscience, 2017
2016
Log. J. IGPL, 2016
Log. J. IGPL, 2016
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments.
Comput. Commun., 2016
Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
2015
Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process.
Proceedings of the International Joint Conference, 2015
2014
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
2013
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback.
Math. Comput. Model., 2013
Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm.
Log. J. IGPL, 2013
IACR Cryptol. ePrint Arch., 2013
Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications.
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
2012
Lightweight Authentication Protocols based on Rotations and the LPN Problem.
Proceedings of the SENSORNETS 2012, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
Wirel. Commun. Mob. Comput., 2010
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010
What can RFID do for Vanets? - A Cryptographic Point of View.
Proceedings of the SECRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2008
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels.
Wirel. Commun. Mob. Comput., 2008
2007
Comput. Networks, 2007
2006
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol.
Comput. Commun., 2006
2004
Comput. Commun., 2004
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
2003
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications.
Comput. Networks, 2003