Folgen
Juan Tapiador
Juan Tapiador
Bestätigte E-Mail-Adresse bei inf.uc3m.es - Startseite
Titel
Zitiert von
Zitiert von
Jahr
LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags
P Peris-Lopez, JC Hernandez-Castro, JM Estévez-Tapiador, A Ribagorda
Proc. of 2nd Workshop on RFID Security, 06, 2006
4732006
M 2 AP: A minimalist mutual-authentication protocol for low-cost RFID tags
P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda
Ubiquitous Intelligence and Computing, 912-923, 2006
4492006
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 352-361, 2006
4202006
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic
A Feldmann, O Gasser, F Lichtblau, E Pujol, I Poese, C Dietzel, D Wagner, ...
Proceedings of the Internet Measurements Conference, 1-18, 2020
3692020
Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey
C Camara, P Peris-Lopez, JE Tapiador
Journal of Biomedical Informatics 55, 272-289, 2015
3592015
Evolution, detection and analysis of malware for smart devices
G Suarez-Tangil, J Tapiador, P Peris-Lopez, A Ribagorda
IEEE Communications Surveys & Tutorials 16 (2), 961-987, 2014
3462014
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families
G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco
Expert Systems with Applications 41 (4), 1104-1117, 2014
3132014
Anomaly detection methods in wired networks: a survey and taxonomy
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
Computer Communications 27 (16), 1569-1584, 2004
2892004
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, A Ribagorda
Information Security Applications: 9th International Workshop, WISA 2008 …, 2009
2752009
RFID systems: A survey on security threats and proposed solutions
P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda
Personal Wireless Communications, 159-170, 2006
2582006
A survey of wearable biometric recognition systems
J Blasco, TM Chen, J Tapiador, P Peris-Lopez
ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016
1692016
Beyond google play: A large-scale comparative study of chinese android app markets
H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ...
Proceedings of the Internet Measurement Conference 2018, 293-307, 2018
1602018
LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
Computer Standards & Interfaces 31 (1), 88-97, 2009
1532009
An analysis of pre-installed android software
J Gamba, M Rashed, A Razaghpanah, J Tapiador, N Vallina-Rodriguez
IEEE Symposium on Security and Privacy, 2020
1252020
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda
Computer Standards & Interfaces 31 (2), 372-380, 2009
1232009
Measuring normality in HTTP traffic for anomaly-based intrusion detection
JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo
Computer Networks 45 (2), 175-193, 2004
1132004
Detection of web-based attacks through Markovian protocol parsing
JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo
10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005
1032005
A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic
A Feldmann, O Gasser, F Lichtblau, E Pujol, I Poese, C Dietzel, D Wagner, ...
Communications of the ACM 64 (7), 101-108, 2021
1002021
Stochastic protocol modeling for anomaly based network intrusion detection
JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003
972003
Steganography in games: A general methodology and its application to the game of Go
JC Hernandez-Castro, I Blasco-Lopez, JM Estevez-Tapiador, ...
computers & security 25 (1), 64-71, 2006
832006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20