P
Pedro Peris-Lopez
Researcher at Charles III University of Madrid
Publications - 119
Citations - 4189
Pedro Peris-Lopez is an academic researcher from Charles III University of Madrid. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 29, co-authored 113 publications receiving 3726 citations. Previous affiliations of Pedro Peris-Lopez include Aalto University & University of York.
Papers
More filters
Book ChapterDOI
M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags
TL;DR: In this paper, the authors proposed a lightweight mutual authentication protocol for low-cost RFID tags that offers an adequate security level for certain applications, which could be implemented even in the most limited lowcost tags as it only needs around 300 gates.
Book ChapterDOI
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
TL;DR: This work proposes an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.
Journal ArticleDOI
Evolution, Detection and Analysis of Malware for Smart Devices
TL;DR: This article presents a detailed analysis on how malware has evolved over the last years for the most popular platforms and surveys, classify and discusses efforts made on detecting both malware and other suspicious software (grayware) between 2010 and 2013.
Journal ArticleDOI
Security and privacy issues in implantable medical devices
TL;DR: This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far, with the battery lifetime being another critical parameter in the design phase.
Journal ArticleDOI
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families
TL;DR: Dendroid, a system based on text mining and information retrieval techniques for malware analysis, is introduced, suggesting that the approach is remarkably accurate and deals efficiently with large databases of malware instances.