Pino Caballero-Gil
Orcid: 0000-0002-0859-5876
According to our database1,
Pino Caballero-Gil
authored at least 187 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
Proceedings of the IEEE International Conference on Communications Workshops, 2024
2023
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks.
Wirel. Networks, November, 2023
Proceedings of the Computational Science - ICCS 2023, 2023
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023
Proceedings of the 19th International Conference on the Design of Reliable Communication Networks, 2023
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
2022
J. Ambient Intell. Humaniz. Comput., 2022
CoRR, 2022
CoRR, 2022
Application of Fuzzy Logic in a Secure Beacon-Based Guidance System for Public Transportation.
Int. J. Appl. Math. Comput. Sci., 2022
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
Study and Implementation of an Interactive Simulation of Quantum Key Distribution Using the E91 Cryptographic Protocol.
Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence, 2022
2021
Softw. Pract. Exp., 2021
Remote. Sens., 2021
Log. J. IGPL, 2021
EURASIP J. Wirel. Commun. Netw., 2021
COEDU-IN Project: an inclusive co-educational project for teaching computational thinking and digital skills at early ages.
Proceedings of the 23rd International Symposium on Computers in Education, 2021
2020
J. Ambient Intell. Humaniz. Comput., 2020
Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks.
Inf. Syst., 2020
Expert Syst. J. Knowl. Eng., 2020
Proceedings of the TEEM'20: Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
2019
Proceedings of the 13th International Conference on Ubiquitous Computing and Ambient Intelligence, 2019
Proceedings of the 13th International Conference on Ubiquitous Computing and Ambient Intelligence, 2019
2018
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.
Complex., 2018
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018
Proceedings of the International Joint Conference SOCO'18-CISIS'18-ICEUTE'18, 2018
Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, 2018
Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, 2018
Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography.
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018
Proceedings of the 4th International Conference on Big Data Innovations and Applications, 2018
2017
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Sensors, 2017
Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.
Sensors, 2017
An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
Sensors, 2017
Mob. Inf. Syst., 2017
Int. J. Comput. Intell. Syst., 2017
Decentralized Authentication for Opportunistic Communications in Disaster Situations.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017
Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2017
Proceedings of the 2nd International Conference on Internet of Things, 2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
2016
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Sensors, 2016
Sensors, 2016
Mob. Inf. Syst., 2016
Log. J. IGPL, 2016
Distributed Parallel Databases, 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2016
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
2015
Peer-to-Peer Netw. Appl., 2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and Using Environmental Information, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015
Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects, 2015
Proceedings of the ICEIS 2015, 2015
Proceedings of the Euro-Par 2015: Parallel Processing Workshops, 2015
Proceedings of the Computer Aided Systems Theory - EUROCAST 2015, 2015
Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments.
Proceedings of the International Joint Conference, 2015
2014
Inf. Sci., 2014
Alternative Communication System for Emergency Situations.
Proceedings of the WEBIST 2014, 2014
Proceedings of the WEBIST 2014, 2014
Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications.
Proceedings of the WOSIS 2014, 2014
Using query frequencies in tree-based revocation for certificateless authentication in VANETs.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014
2013
Design and Implementation of an Application for Deploying Vehicular Networks with Smartphones.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, 2013
Proceedings of the Advances in Computational Intelligence, 2013
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
Proceedings of the Computer Aided Systems Theory - EUROCAST 2013, 2013
2012
Secur. Commun. Networks, 2012
2011
EURASIP J. Wirel. Commun. Netw., 2011
Appl. Soft Comput., 2011
Enhancing Cooperation in Wireless Vehicular Networks.
Proceedings of the WOSIS 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
2010
A simple linearization of the self-shrinking generator by means of cellular automata.
Neural Networks, 2010
CoRR, 2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Cooperative Approach to Self-managed VANETs.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010
On Privacy and Integrity in Vehicular Ad hoc Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
Knowledge Management using Clusters in VANETs - Description, Simulation and Analysis.
Proceedings of the KMIS 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Group Proposal to Secure Vehicular Ad-Hoc Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010
A Linear Cellular Automata-Based Model for Generating Cryptographic Sequences.
Proceedings of the 2010 International Conference on Scientific Computing, 2010
Simple Cellular Automata-Based Linear Models for a Class of Sequence Generators.
Proceedings of the 2010 International Conference on Scientific Computing, 2010
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010
Proceedings of the Cellular Automata, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers.
J. Univers. Comput. Sci., 2009
Synthesis of cryptographic interleaved sequences by means of linear cellular automata.
Appl. Math. Lett., 2009
Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks.
Proceedings of the Security in Information Systems, 2009
Deterministic Cryptanalysis of some Stream Ciphers.
Proceedings of the Security in Information Systems, 2009
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Proceedings of the Computational Science, 2009
Proceedings of the Computer Aided Systems Theory, 2009
Differentiated Services to Provide Efficient Node Authentication in VANETs.
Proceedings of the 2009 International Conference on Security & Management, 2009
Linearization of the Alternating Step Generator in Terms of Cellular Automata.
Proceedings of the 2009 International Conference on Scientific Computing, 2009
Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs).
Proceedings of the 2009 International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2009
2008
Proceedings of the Innovations in Hybrid Intelligent Systems, 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Proceedings of the Hybrid Artificial Intelligence Systems, Third International Workshop, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Cooperative Design, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
Current Topics in Security of Mobile Ad-hoc NETworks.
Proceedings of the Sixth Australasian Information Security Conference, 2008
Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations.
Proceedings of the Cellular Automata, 2008
2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computer Aided Systems Theory, 2007
Proceedings of the Computer Aided Systems Theory, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Science, 2006
Proceedings of the Cellular Automata, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators.
Proceedings of the Advances in Informatics, 2005
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography.
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computer Aided Systems Theory, 2005
Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers.
Proceedings of the Computer Aided Systems Theory, 2005
2004
Inf. Secur. J. A Glob. Perspect., 2004
Inf. Sci., 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the 4th International Conference on Computer Systems and Technologies: e-Learning, 2003
2001
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001
1998
Proceedings of the Sequences and their Applications, 1998
1995
Proceedings of the Cryptography and Coding, 1995
1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994