Pablo Picazo-Sanchez

Orcid: 0000-0002-0303-3858

According to our database1, Pablo Picazo-Sanchez authored at least 28 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysing the impact of ChatGPT in research.
Appl. Intell., March, 2024

Policy Parsing Panthers at Touché: Ideology and Power Identification in Parliamentary Debates.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024

FakeX: A Framework for Detecting Fake Reviews of Browser Extensions.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng., September, 2023

Gridchain: an investigation of privacy for the future local distribution grid.
Int. J. Inf. Sec., 2023

IBE.js: A Framework for Instrumenting Browser Extensions.
Proceedings of the 18th International Conference on Software Technologies, 2023

2022
Modelling cryptographic distinguishers using machine learning.
J. Cryptogr. Eng., 2022

Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies.
Inf. Sci., 2022

Are chrome extensions compliant with the spirit of least privilege?
Int. J. Inf. Sec., 2022

Clipaha: A Scheme to Perform Password Stretching on the Client.
IACR Cryptol. ePrint Arch., 2022

Heart-Based Biometric Protocols: A look back over almost two decades.
CoRR, 2022

Hardening the security analysis of browser extensions.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
A collaborative access control framework for online social networks.
J. Log. Algebraic Methods Program., 2020

After you, please: browser extensions order attacks and countermeasures.
Int. J. Inf. Sec., 2020

Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation.
Future Gener. Comput. Syst., 2020

HMAC and "Secure Preferences": Revisiting Chromium-Based Browsers Security.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018

Migrating Monitors + ABE: A Suitable Combination for Secure IoT?
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

\mathsf HIKE : Walking the Privacy Trail.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Secure Photo Sharing in Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2015
Weaknesses of fingerprint-based mutual authentication protocol.
Secur. Commun. Networks, 2015

2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014

2013
Cryptanalysis of the RNTS system.
J. Supercomput., 2013

Two RFID Standard-based Security Protocols for Healthcare Environments.
J. Medical Syst., 2013


  Loading...