default search action
Alberto Peinado
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Ana M. Barbancho, Isabel Barbancho, Lorenzo J. Tardón, Alberto Peinado:
Women in Telecommunication Engineering: Case Studies. Rev. Iberoam. de Tecnol. del Aprendiz. 19: 61-70 (2024) - [c19]J. Ignacio Mateo-Trujillo, Diego Castillo-Barnes, Ignacio Rodríguez-Rodríguez, Andrés Ortiz, Alberto Peinado, Juan Luis Luque, Auxiliadora Sánchez-Gómez:
Dual-System Recommendation Architecture for Adaptive Reading Intervention Platform for Dyslexic Learners. IWINAC (2) 2024: 205-214 - 2022
- [c18]Guillermo Cotrina, Alberto Peinado, Andrés Ortiz:
Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices. CISIS-ICEUTE 2022: 95-103 - 2020
- [j23]Guillermo Cotrina, Alberto Peinado, Andrés Ortiz:
Gaussian Pseudorandom Number Generator Based on Cyclic Rotations of Linear Feedback Shift Registers. Sensors 20(7): 2103 (2020)
2010 – 2019
- 2019
- [j22]Miguel López, Alberto Peinado, Andrés Ortiz:
An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Comput. Networks 165 (2019) - [j21]Alberto Peinado:
Reconstruction of a 1940 Spanish strip cipher by means of a cyclic rotation model applied to encrypted telegrams. Cryptologia 43(1): 47-64 (2019) - [j20]Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan Capkun, Gerhard P. Hancke, Süleyman Kardas, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, Serge Vaudenay:
Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51(5): 94:1-94:33 (2019) - 2018
- [p1]Ángel Martín del Rey, Alberto Peinado:
Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis. Computer and Network Security Essentials 2018: 299-313 - 2017
- [j19]Francisco Lozano, Andrés Ortiz, Jorge Munilla, Alberto Peinado:
Automatic computation of regions of interest by robust principal component analysis. Application to automatic dementia diagnosis. Knowl. Based Syst. 123: 229-237 (2017) - [j18]Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo:
RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors 17(1): 53 (2017) - [c17]Andrés Ortiz, Francisco Lozano, Alberto Peinado, María J. García-Tarifa, J. M. Górriz, Javier Ramírez:
PET Image Classification Using HHT-Based Features Through Fractal Sampling. IWINAC (1) 2017: 314-323 - 2016
- [j17]Jorge Munilla, Mike Burmester, Alberto Peinado:
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Comput. Commun. 88: 84-88 (2016) - [j16]Alberto Peinado, Andrés Ortiz, Guillermo Cotrina:
Content-based image authentication using sparse features and SOM trajectories. Log. J. IGPL 24(1): 4-15 (2016) - [j15]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Optimal modes of operation of pseudorandom sequence generators based on DLFSRs. Log. J. IGPL 24(6): 933-943 (2016) - [c16]Alberto Peinado:
Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms. SOCO-CISIS-ICEUTE 2016: 631-637 - [c15]Miguel López, Alberto Peinado, Andrés Ortiz:
A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks. SOCO-CISIS-ICEUTE 2016: 668-677 - 2015
- [j14]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Revision of J3Gen and Validity of the Attacks by Peinado et al. Sensors 15(5): 11988-11992 (2015) - [c14]Alberto Peinado, Andrés Ortiz García:
Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion Process. CISIS-ICEUTE 2015: 447-453 - 2014
- [j13]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen. Sensors 14(4): 6500-6515 (2014) - [c13]Alberto Peinado, Jorge Munilla, Amparo Fúster-Sabater:
Improving the Period and Linear Span of the Sequences Generated by DLFSRs. SOCO-CISIS-ICEUTE 2014: 397-406 - [c12]Alberto Peinado, Andrés Ortiz:
Prediction of Sequences Generated by LFSR Using Back Propagation MLP. SOCO-CISIS-ICEUTE 2014: 407-412 - [i4]Jorge Munilla, Mike Burmester, Alberto Peinado:
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments. IACR Cryptol. ePrint Arch. 2014: 968 (2014) - 2013
- [j12]Alberto Peinado, Andrés Ortiz:
Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm. Log. J. IGPL 21(4): 671-679 (2013) - [j11]Alberto Peinado, Amparo Fúster-Sabater:
Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback. Math. Comput. Model. 57(11-12): 2596-2604 (2013) - [c11]Alberto Peinado, Andrés Ortiz, Guillermo Cotrina:
Content-Based Image Authentication Using Local Features and SOM Trajectories. SOCO-CISIS-ICEUTE 2013: 459-468 - [c10]Alberto Peinado, Andrés Ortiz, Guillermo Cotrina:
Cryptanalysis of the Improvement of an Authentication Scheme Based on the Chinese Remainder Theorem for Multicast Communications. SOCO-CISIS-ICEUTE 2013: 509-516 - [i3]Jorge Munilla, Alberto Peinado, Guomin Yang, Willy Susilo:
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model. IACR Cryptol. ePrint Arch. 2013: 187 (2013) - 2012
- [c9]Alberto Peinado, Amparo Fúster-Sabater:
Cryptographic Analysis of a Type of Sequence Generators. ICISS 2012: 265-276 - [c8]Alberto Peinado, Jorge Munilla:
Lightweight Authentication Protocols based on Rotations and the LPN Problem. SENSORNETS 2012: 127-134 - 2011
- [c7]Alberto Peinado, Andrés Ortiz:
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm. CISIS 2011: 177-182 - 2010
- [j10]Jorge Munilla, Alberto Peinado:
Attacks on a distance bounding protocol. Comput. Commun. 33(7): 884-889 (2010) - [j9]Jorge Munilla, Alberto Peinado:
Enhanced low-cost RFID protocol to detect relay attacks. Wirel. Commun. Mob. Comput. 10(3): 361-371 (2010) - [c6]Jorge Munilla, Andrés Ortiz, Alberto Peinado:
What can RFID do for Vanets? - A Cryptographic Point of View. SECRYPT 2010: 295-298 - [c5]Jorge Munilla, Andrés Ortiz, Alberto Peinado:
Robotic vehicles to simulate RFID-based vehicular ad hoc networks. SimuTools 2010: 49
2000 – 2009
- 2009
- [j8]Jorge Munilla, Alberto Peinado:
Security flaw of Hölbl et al.'s protocol. Comput. Commun. 32(4): 736-739 (2009) - [c4]Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado:
Secure EPC Gen2 Compliant Radio Frequency Identification. ADHOC-NOW 2009: 227-240 - [c3]Andrés Ortiz, Alberto Peinado, Jorge Munilla:
A Scaled Test Bench for Vanets with RFID Signalling. CISIS 2009: 53-59 - [i2]Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado:
Secure EPC Gen2 compliant Radio Frequency Identification. IACR Cryptol. ePrint Arch. 2009: 149 (2009) - 2008
- [j7]Jorge Munilla, Alberto Peinado:
Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput. 8(9): 1227-1232 (2008) - [c2]Jorge Munilla, Alberto Peinado:
Security Analysis of Tu and Piramuthu's Protocol. NTMS 2008: 1-5 - [i1]Jorge Munilla, Alberto Peinado:
Attacks on Singelee and Preneel's protocol. IACR Cryptol. ePrint Arch. 2008: 283 (2008) - 2007
- [j6]Jorge Munilla, Alberto Peinado:
HB-MP: A further step in the HB-family of lightweight authentication protocols. Comput. Networks 51(9): 2262-2267 (2007) - 2006
- [j5]Jorge Munilla, Alberto Peinado:
Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. Comput. Commun. 30(1): 52-54 (2006) - [j4]Jaime Muñoz Masqué, Alberto Peinado:
Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem. J. Inf. Sci. Eng. 22(2): 391-399 (2006) - 2004
- [j3]Alberto Peinado:
Cryptanalysis of LHL-key authentication scheme. Appl. Math. Comput. 152(3): 721-724 (2004) - [j2]Alberto Peinado:
Privacy and authentication protocol providing anonymous channels in GSM. Comput. Commun. 27(17): 1709-1715 (2004) - [c1]Isabel Barbancho, Ana M. Barbancho, Lorenzo J. Tardón, Alberto Peinado:
Multirate MC-DS-CDMA transmitter for 4G communications. VTC Fall (2) 2004: 904-908 - 2003
- [j1]Ana M. Barbancho, Alberto Peinado:
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Comput. Networks 43(6): 777-785 (2003)
Coauthor Index
aka: Andrés Ortiz García
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint