Suivre
Alberto Peinado
Alberto Peinado
Adresse e-mail validée de ic.uma.es
Titre
Citée par
Citée par
Année
HB-MP: A further step in the HB-family of lightweight authentication protocols
J Munilla, A Peinado
Computer Networks 51 (9), 2262-2267, 2007
2142007
Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels
J Munilla, A Peinado
Wireless communications and mobile computing 8 (9), 1227-1232, 2008
1542008
Distance bounding protocols with void-challenges for RFID
J Munilla, A Ortiz, A Peinado
Printed handout at the Workshop on RFID Security–RFIDSec 6, 2006
912006
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
572018
Secure EPC gen2 compliant radio frequency identification
M Burmester, B Medeiros, J Munilla, A Peinado
International Conference on Ad-Hoc Networks and Wireless, 227-240, 2009
402009
Privacy and authentication protocol providing anonymous channels in GSM
A Peinado
Computer Communications 27 (17), 1709-1715, 2004
402004
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback
A Peinado, A Fúster-Sabater
Mathematical and Computer Modelling 57 (11-12), 2596-2604, 2013
392013
EPCGen2 pseudorandom number generators: Analysis of J3Gen
A Peinado, J Munilla, A Fúster-Sabater
Sensors 14 (4), 6500-6515, 2014
322014
Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol
J Munilla, A Peinado
Computer Communications 30 (1), 52-54, 2006
272006
Maximal Periods of x2 + c in Fq
A Peinado, F Montoya, J Munoz, AJ Yuste
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2001
272001
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
J Munilla, M Burmester, A Peinado
Computer Communications 88, 84-88, 2016
262016
An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks
M López, A Peinado, A Ortiz
Computer Networks 165, 106945, 2019
252019
Attacks on a distance bounding protocol
J Munilla, A Peinado
Computer Communications 33 (7), 884-889, 2010
232010
Enhanced low‐cost RFID protocol to detect relay attacks
J Munilla, A Peinado
Wireless Communications and Mobile Computing 10 (3), 361-371, 2010
222010
Akelarre: a new block cipher algorithm
G Alvarez, D De la Guía, F Montoya, A Peinado
221996
Maximal period of orbits of the BBS generator.
LH Encinas, FM Vitini, JM Masqué, AP Domínguez
ICISC, 71-80, 1998
201998
Cryptanalysis of LHL-key authentication scheme
A Peinado
Applied mathematics and computation 152 (3), 721-724, 2004
182004
Improving the period and linear span of the sequences generated by DLFSRs
A Peinado, J Munilla, A Fúster-Sabater
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14, 397-406, 2014
152014
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications
AM Barbancho, A Peinado
Computer Networks 43 (6), 777-785, 2003
152003
Lightweight authentication for RFID used in VANETs
C Caballero-Gil, P Caballero-Gil, A Peinado-Domínguez, J Molina-Gil
International Conference on Computer Aided Systems Theory, 493-500, 2011
142011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20