LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags P Peris-Lopez, JC Hernandez-Castro, JM Estévez-Tapiador, A Ribagorda Proc. of 2nd Workshop on RFID Security 6, 2006 | 474 | 2006 |
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Ubiquitous Intelligence and Computing: Third International Conference, UIC …, 2006 | 449 | 2006 |
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops: OTM …, 2006 | 421 | 2006 |
Evolution, detection and analysis of malware for smart devices G Suarez-Tangil, JE Tapiador, P Peris-Lopez, A Ribagorda IEEE communications surveys & tutorials 16 (2), 961-987, 2013 | 348 | 2013 |
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, A Ribagorda Information Security Applications: 9th International Workshop, WISA 2008 …, 2009 | 277 | 2009 |
RFID systems: A survey on security threats and proposed solutions P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Personal Wireless Communications: IFIP TC6 11th International Conference …, 2006 | 258 | 2006 |
Overview of security issues in vehicular ad-hoc networks JM De Fuentes, AI González-Tablas, A Ribagorda Handbook of research on mobility and computing: Evolving technologies and …, 2011 | 239 | 2011 |
Anonymous authentication for privacy-preserving IoT target-driven applications A Alcaide, E Palomar, J Montero-Castillo, A Ribagorda computers & security 37, 111-123, 2013 | 164 | 2013 |
LAMED—a PRNG for EPC class-1 generation-2 RFID specification P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Computer Standards & Interfaces 31 (1), 88-97, 2009 | 154 | 2009 |
The strict avalanche criterion randomness test JCH Castro, JM Sierra, A Seznec, A Izquierdo, A Ribagorda Mathematics and Computers in Simulation 68 (1), 1-7, 2005 | 130 | 2005 |
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Computer Standards & Interfaces 31 (2), 372-380, 2009 | 125 | 2009 |
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study CJ Hernandez-Castro, A Ribagorda computers & security 29 (1), 141-157, 2010 | 84 | 2010 |
Steganography in games: A general methodology and its application to the game of Go JC Hernandez-Castro, I Blasco-Lopez, JM Estevez-Tapiador, ... computers & security 25 (1), 64-71, 2006 | 83 | 2006 |
Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007 | 77 | 2007 |
Leveraging user-related internet of things for continuous authentication: A survey L Gonzalez-Manzano, JMD Fuentes, A Ribagorda ACM Computing Surveys (CSUR) 52 (3), 1-38, 2019 | 63 | 2019 |
Providing SIEM systems with self-adaptation G Suarez-Tangil, E Palomar, A Ribagorda, I Sanz Information Fusion 21, 145-158, 2015 | 50 | 2015 |
Key-recovery attacks on KIDS, a keyed anomaly detection system JE Tapiador, A Orfila, A Ribagorda, B Ramos IEEE Transactions on Dependable and Secure Computing 12 (3), 312-325, 2013 | 44 | 2013 |
Autonomous decision on intrusion detection with trained BDI agents A Orfila, J Carbó, A Ribagorda Computer Communications 31 (9), 1803-1813, 2008 | 39 | 2008 |
An efficient authentication protocol for RFID systems resistant to active attacks P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007 | 36 | 2007 |
Wheedham: An automatically designed block cipher by means of genetic programming JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda-Garnacho, ... 2006 IEEE International Conference on Evolutionary Computation, 192-199, 2006 | 31 | 2006 |