Pedro Peris-Lopez
Orcid: 0000-0001-6943-0760
According to our database1,
Pedro Peris-Lopez
authored at least 102 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
2
2
4
2
3
4
7
3
3
7
8
5
5
6
4
6
2
1
1
1
1
2
3
4
4
3
2
2
2
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Stimulated Microcontroller Dataset for New IoT Device Identification Schemes through On-Chip Sensor Monitoring.
Data, May, 2024
Exploring the power of photoplethysmogram matrix for atrial fibrillation detection with integrated explainability.
Eng. Appl. Artif. Intell., 2024
2023
ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States.
Sensors, January, 2023
Unleashing the Power of Electrocardiograms: A novel approach for Patient Identification in Healthcare Systems with ECG Signals.
CoRR, 2023
Unveiling Hidden Patterns: Harnessing the Power of Short PPG-Traces for Atrial Fibrillation Detection.
Proceedings of the 19th IEEE International Conference on Body Sensor Networks, 2023
2022
IEEE Syst. J., 2022
J. Parallel Distributed Comput., 2022
ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks.
Neurocomputing, 2022
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
2021
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing.
Veh. Commun., 2021
IEEE Trans. Emerg. Top. Comput., 2021
2020
Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation.
Future Gener. Comput. Syst., 2020
IEEE Access, 2020
IEEE Access, 2020
2019
Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks.
Sensors, 2019
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors.
Future Gener. Comput. Syst., 2019
LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT.
Future Gener. Comput. Syst., 2019
2018
ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks.
Sensors, 2018
On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification.
Sensors, 2018
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.
Sensors, 2018
Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things.
Future Gener. Comput. Syst., 2018
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals.
Entropy, 2018
On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation.
Entropy, 2018
Appl. Soft Comput., 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
2017
IEICE Electron. Express, 2017
Future Gener. Comput. Syst., 2017
Comput. Secur., 2017
2016
IEEE Trans. Ind. Informatics, 2016
J. Netw. Comput. Appl., 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
2015
Secur. Commun. Networks, 2015
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015
J. Biomed. Informatics, 2015
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks.
Comput. Networks, 2015
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols.
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
IEEE Trans. Ind. Informatics, 2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP.
Secur. Commun. Networks, 2014
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Comput. Appl. Math., 2014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Syst. J. Knowl. Eng., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
ACM Trans. Archit. Code Optim., 2013
J. Medical Syst., 2013
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6".
IEEE Commun. Lett., 2013
2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012
Knowl. Based Syst., 2012
J. Netw. Syst. Manag., 2012
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
2011
J. Netw. Comput. Appl., 2011
Int. J. Medical Informatics, 2011
Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011
CoRR, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
IEICE Trans. Inf. Syst., 2010
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Commun. Lett., 2010
Comput. Networks, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
CoRR, 2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Personal Wireless Communications, 2006