sample of publications
-
articles
- ECG Identification Based on the Gramian Angular Field and Tested with Individuals in Resting and Activity States. SENSORS. 23. 2023
- Challenging the security of "A PUF-based hardware mutual authentication protocol". JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING. 169:199-210. 2022
- ELEKTRA: ELEKTRokardiomatrix application to biometric identification with convolutional neural networks. NEUROCOMPUTING. 506:37-49. 2022
- Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices. IEEE Systems Journal. 16:4501-4512. 2022
- ECGsound for human identification. Biomedical Signal Processing and Control. 72, part B:1-10. 2022
- RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing. Vehicular Communications. 1-14. 2021
- A true random number generator based on gait data for the Internet of You. IEEE Access. 8:71642-71651. 2020
- Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation. Future Generation Computer Systems-The International Journal of eScience. 105:346-360. 2020
- Access control for implantable medical devices. IEEE Transactions on Emerging Topics in Computing. 1-13. 2020
- Full-resilient memory-optimum multi-party non-interactive key exchange. IEEE Access. 8:8821-8833. 2020
- Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. Future Generation Computer Systems-The International Journal of eScience. 96:283-296. 2019
- LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. Future Generation Computer Systems-The International Journal of eScience. 96:410-424. 2019
- Editorial: Security and Privacy in Internet of Things. MOBILE NETWORKS & APPLICATIONS. 24:878-880. 2019
- Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. SENSORS. 19. 2019
- Enhancing PUF Based Challenge-Response Sets by Exploiting Various Background Noise Configurations.. Electronics. 8:1-14. 2019
- Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol. SENSORS. 18. 2018
- On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification. SENSORS. 18:1-30. 2018
- ECG-RNG: a random number generator based on ECG signals and suitable for securing wireless sensor networks. SENSORS. 18:1-15. 2018
- On the Entropy of Oscillator-Based True Random Number Generators under Ionizing Radiation. Entropy. 20. 2018
- Real-time electrocardiogram streams for continuous authentication. APPLIED SOFT COMPUTING. 68:784-794. 2018
- Effect of attacker characterization in ECG-based continuous authentication mechanisms for Internet of Things. Future Generation Computer Systems-The International Journal of eScience. 81:67-77. 2018
- Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals. Entropy. 20. 2018
- Encryption by Heart (EbH)-Using ECG for time-invariant symmetric key generation. Future Generation Computer Systems-The International Journal of eScience. 77:136-148. 2017
- PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. COMPUTERS & SECURITY. 69:127-141. 2017
- A lightweight implementation of the Tav-128 hash function. IEICE Electronics Express. 14:1-9. 2017
- Hardware trojans against virtual keyboards on e-banking platforms - A proof of concept. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS. 76:146-151. 2017
- A Survey of Wearable Biometric Recognition Systems.. ACM COMPUTING SURVEYS. 49. 2016
- PAgIoT - Privacy-preserving Aggregation protocol for Internet of Things. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 71:59-71. 2016
- A new TRNG based on coherent sampling with self-timed rings. IEEE Transactions on Industrial Informatics. 12:91-100. 2016
- Non-invasive multi-modal human identification system combining ECG, GSR, and airflow biosignals. Journal of Medical and Biological Engineering. 35:735-748. 2015
- Human identification using compressed ECG signals. JOURNAL OF MEDICAL SYSTEMS. 39. 2015
- Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks. 32:43-52. 2015
- Weaknesses of fingerprint-based mutual authentication protocol. Security and Communication Networks (discontinued). 8:2124-2134. 2015
- Security and privacy issues in implantable medical devices: A comprehensive survey. JOURNAL OF BIOMEDICAL INFORMATICS. 55:272-289. 2015
- DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Computer Networks. 80:66-88. 2015
- Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing. 18:137-151. 2015
- Hindering data theft with encrypted data trees. JOURNAL OF SYSTEMS AND SOFTWARE. 101:147-158. 2015
- Secure publish-subscribe protocols for heterogeneous medical wireless body area networks. SENSORS. 14:22619-22642. 2014
- Weaknesses in a new ultralightweight RFID authentication protocol with permutation-RAPP. Security and Communication Networks (discontinued). 7:945-949. 2014
- Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Communications Surveys and Tutorials. 16:961-987. 2014
- An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Transactions on Industrial Informatics. 10:1216-1225. 2014
- Randomized anagram revisited. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 41:182-196. 2014
- Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS. 259:571-577. 2014
- DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families. EXPERT SYSTEMS WITH APPLICATIONS. 41:1104-1117. 2014
- A System Architecture, Processor, and Communication Protocol for Secure Implants. ACM Transactions on Architecture and Code Optimization. 10. 2013
- Efficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols. IEEE SENSORS JOURNAL. 13:3537-3547. 2013
- On Selecting the Nonce Length in Distance-Bounding Protocols. COMPUTER JOURNAL. 56:1216-1227. 2013
- Two RFID Standard-based Security Protocols for Healthcare Environments. JOURNAL OF MEDICAL SYSTEMS. 37. 2013
- Cryptanalysis of the RNTS system. JOURNAL OF SUPERCOMPUTING. 65:949-960. 2013
- Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE COMMUNICATIONS LETTERS. 17:805-807. 2013
- RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety. Journal of Medical and Biological Engineering. 33:363-372. 2013
- Evaluation of classification algorithms for intrusion detection in MANETs. KNOWLEDGE-BASED SYSTEMS. 36:217-225. 2012
- Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management. 20:561-578. 2012
- A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. EXPERT SYSTEMS. 2012
- A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing. 16:351-365. 2012
- Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. 23:543-553. 2012
- A note on the security of PAP. COMPUTER COMMUNICATIONS. 34:2248-2249. 2011
- Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE. 24:1061-1069. 2011
- Flaws on RFID grouping-proofs. Guidelines for future sound protocols. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS. 34:833-845. 2011
- A comprehensive RFID solution to enhance inpatient medication safety. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS. 80:13-24. 2011
- Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer. Computer Networks. 54:1502-1508. 2010
- Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS. E93.D:518-527. 2010
- Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels. IEEE COMMUNICATIONS LETTERS. 14:121-123. 2010
- Practical Attacks on a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard. COMPUTER COMMUNICATIONS. 32:1185-1193. 2009
- Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard. COMPUTER STANDARDS & INTERFACES. 31:372-380. 2009
- An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. 25:33-57. 2009
- LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification. COMPUTER STANDARDS & INTERFACES. 31:88-97. 2009
- Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. 24:1485-1504. 2008
-
book chapters
- Threats to Networked RFID Systems. In: Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks. SPRINGER. 39-63. 2011
- RFID Specification Revisited. In: In The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. AUERBACH PUBLICATIONS. 127-156. 2008
-
conference contributions
- Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. 63-77. 2015
- Hardware Trojans in TRNGs 2015
- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. 496-515. 2015
- An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training. 558-565. 2014
- Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. 183-201. 2014
- Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols 2014
- Cryptanalysis of Cho et al.'s Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol 2012
- La seguridad de mañana: seguridad en IMDs 2012
- On the Key Schedule Strength of PRESENT. 253-263. 2012
- On the Security of Tan et al. Serverless RFID Authentication and Search Protocols 2012
- On the Traceability of Tags in SUAP RFID Authentication Protocols. 292-296. 2012
- Weaknesses in Another Gen2-based RFID Authentication Protocol. 80-84. 2012
- Yet Another Fallen Hash-based RFID Authentication Protocol. 29-37. 2012
- A Note on a Privacy-Preserving Distance-Bounding Protocol. 78-92. 2011
- ATOM: A Pseudorandom Number Generator Suitable for RFID Protocols 2011
- Akari-X: A Pseudorandom Number Generator for Secure Lightweight Systems. 228-233. 2011
- Studying the Pseudo Random Number Generator of a Low-cost RFID Tag. 381-385. 2011
- Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol. 56-68. 2008
- Providing Stronger Authentication at a Low-Cost to RFID Tags Operating under the EPCglobal Framework 2008
- Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard 2008
-
theses