scispace - formally typeset
P

Pedro Peris-Lopez

Researcher at Charles III University of Madrid

Publications -  119
Citations -  4189

Pedro Peris-Lopez is an academic researcher from Charles III University of Madrid. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 29, co-authored 113 publications receiving 3726 citations. Previous affiliations of Pedro Peris-Lopez include Aalto University & University of York.

Papers
More filters
Book ChapterDOI

M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags

TL;DR: In this paper, the authors proposed a lightweight mutual authentication protocol for low-cost RFID tags that offers an adequate security level for certain applications, which could be implemented even in the most limited lowcost tags as it only needs around 300 gates.
Book ChapterDOI

EMAP: an efficient mutual-authentication protocol for low-cost RFID tags

TL;DR: This work proposes an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.
Journal ArticleDOI

Evolution, Detection and Analysis of Malware for Smart Devices

TL;DR: This article presents a detailed analysis on how malware has evolved over the last years for the most popular platforms and surveys, classify and discusses efforts made on detecting both malware and other suspicious software (grayware) between 2010 and 2013.
Journal ArticleDOI

Security and privacy issues in implantable medical devices

TL;DR: This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far, with the battery lifetime being another critical parameter in the design phase.
Journal ArticleDOI

Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

TL;DR: Dendroid, a system based on text mining and information retrieval techniques for malware analysis, is introduced, suggesting that the approach is remarkably accurate and deals efficiently with large databases of malware instances.