Follow
Jorge Toro-Pozo
Jorge Toro-Pozo
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Distance-bounding protocols: Verification without time and location
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018
662018
The EMV standard: Break, fix, verify
D Basin, R Sasse, J Toro-Pozo
2021 IEEE Symposium on Security and Privacy (SP), 1766-1781, 2021
572021
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions
D Basin, R Sasse, J Toro-Pozo
30th USENIX Security Symposium (USENIX Security 21), 179-194, 2021
292021
A class of precomputation-based distance-bounding protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 97-111, 2016
192016
Multiobjective variable mesh optimization
Y Salgueiro, JL Toro, R Bello, R Falcon
Annals of Operations Research 258, 869-893, 2017
132017
Post-collusion security and distance bounding
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
102019
Optimality results on the security of lookup-based protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017
52017
Inducing Authentication Failures to Bypass Credit Card {PINs}
D Basin, P Schaller, J Toro-Pozo
32nd USENIX Security Symposium (USENIX Security 23), 3065-3079, 2023
42023
Evaluación del desempeño de la metaheurística MOVMO en funciones de prueba con restricciones
Y Salgueiro Sicilia, JL Toro Pozo, R Bello Pérez
Revista Cubana de Ciencias Informáticas 10 (1), 182-193, 2016
32016
Noise Detection and Learning Based on Current Information
D Pascual-González, FD Vázquez Mesa, JL Toro Pozo
Computación y Sistemas 18 (1), 153-167, 2014
22014
Automated identification of desynchronisation attacks on shared secrets
S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
12018
Limpieza de ruido para clasificación basado en vecindad y cambios de concepto en el tiempo
JL Toro Pozo, D Pascual González, FD Vázquez Mesa
Revista Cubana de Ciencias Informáticas 10 (2), 1-13, 2016
12016
SealClub: Computer-aided Paper Document Authentication
M Ochoa, J Toro-Pozo, D Basin
arXiv preprint arXiv:2210.07884, 2022
2022
Computational and symbolic analysis of distance-bounding protocols
JL Toro Pozo
University of Luxembourg, Esch-sur-Alzette, Luxembourg, 2019
2019
Session I: Distance-bounding and RFID security protocols
S Mauw, J Toro-Pozo, R Trujillo-Rasua
2nd CRYPTACUS Workshop 16-18 November 2017 Radboud University, Nijmegen The …, 2017
2017
Detección de ruido y aprendizaje basado en información actual
D Pascual González, FD Vázquez Mesa, JL Toro Pozo
Computación y Sistemas 18 (1), 153-167, 2014
2014
A class of precomputation-based distance-bounding protocols
J Toro-Pozo
The system can't perform the operation now. Try again later.
Articles 1–17