J
Jorge Munilla
Researcher at University of Málaga
Publications - 70
Citations - 1302
Jorge Munilla is an academic researcher from University of Málaga. The author has contributed to research in topics: Radio-frequency identification & Computer science. The author has an hindex of 16, co-authored 63 publications receiving 1079 citations.
Papers
More filters
Proceedings Article
Lightweight authentication protocols based on rotations and the lpn problem
Alberto Peinado,Jorge Munilla +1 more
TL;DR: This paper presents a general analysis of the HB- MP related protocols, including the cryptanalysis of HB-MP++, define design guidelines and propose a new protocol following the model.
Posted Content
Secure EPC Gen2 compliant Radio Frequency Identification.
TL;DR: In this paper, the authors proposed an EPCGen2 compliant RFID protocol that uses the numbers drawn from synchronized pseudorandom number generators (RNG) to provide secure tag identification and session unlinkability.
Proceedings ArticleDOI
Graph signal processing to identify biomarkers in brain networks in dementia
Amirhessam Tahmassebi,K. Mueller,Uwe Meyer-Baese,Jorge Munilla,Alejandra Rocio Rodríguez Ortiz,Anke Meyer-Baese +5 more
TL;DR: It is shown that high oscillations derived from the graph Fourier decomposition can provide important discriminatory information and explain how AD is associated with low frequency and localized averaging confirmed by clinical results.
Posted Content
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments.
TL;DR: It is shown that for lightweight RFID applications strong privacy remains an open problem, and a novel ownership transfer protocol that provides individual-owner privacy and prevents tracking attacks falls short of its security objectives.
Book ChapterDOI
Lightweight Stream Authentication for Mobile Objects
Mike Burmester,Jorge Munilla +1 more
TL;DR: This paper proposes a lightweight stream authentication scheme for mobile objects that approximates continuous authentication, which only requires the user and object to share a loosely synchronized pseudo-random number generator, and is provably secure.