Jorge Munilla
Jorge Munilla
Professor of Telecommunication Engineering, University of Malaga
Geverifieerd e-mailadres voor ic.uma.es
Titel
Geciteerd door
Geciteerd door
Jaar
HB-MP: A further step in the HB-family of lightweight authentication protocols
J Munilla, A Peinado
Computer Networks 51 (9), 2262-2267, 2007
1852007
Ensembles of deep learning architectures for the early diagnosis of the Alzheimer’s disease
A Ortiz, J Munilla, JM Gorriz, J Ramirez
International journal of neural systems 26 (07), 1650025, 2016
1672016
Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels
J Munilla, A Peinado
Wireless communications and mobile computing 8 (9), 1227-1232, 2008
1412008
Distance bounding protocols with void-challenges for RFID
J Munilla, A Ortiz, A Peinado
Printed handout at the Workshop on RFID Security–RFIDSec 6, 2006
842006
Lightweight RFID authentication with forward and backward security
M Burmester, J Munilla
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-26, 2011
562011
A flyweight RFID authentication protocol
M Burmester, J Munilla
Proceedings of the Workshop on RFID Security, Leuven, Belgium 30, 2009
432009
Exploratory graphical models of functional and structural connectivity patterns for Alzheimer's disease diagnosis
A Ortiz, J Munilla, I Álvarez-Illán, JM Górriz, J Ramírez, ...
Frontiers in computational neuroscience 9, 132, 2015
422015
Secure EPC gen2 compliant radio frequency identification
M Burmester, B De Medeiros, J Munilla, A Peinado
International Conference on Ad-Hoc Networks and Wireless, 227-240, 2009
422009
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
O Mir, J Munilla, S Kumari
Peer-to-Peer Networking and Applications 10 (1), 79-91, 2017
272017
EPCGen2 pseudorandom number generators: analysis of J3Gen
A Peinado, J Munilla, A Fúster-Sabater
Sensors 14 (4), 6500-6515, 2014
262014
Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol
J Munilla, A Peinado
Computer Communications 30 (1), 52-54, 2006
252006
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
232018
Attacks on a distance bounding protocol
J Munilla, A Peinado
Computer Communications 33 (7), 884-889, 2010
212010
Enhanced low‐cost RFID protocol to detect relay attacks
J Munilla, A Peinado
Wireless Communications and Mobile Computing 10 (3), 361-371, 2010
212010
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
J Munilla, M Burmester, A Peinado
Computer Communications 88, 84-88, 2016
192016
Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
J Munilla, F Guo, W Susilo
Wireless personal communications 72 (1), 245-258, 2013
182013
An anonymous RFID grouping-proof with missing tag identification
M Burmester, J Munilla
2016 IEEE International Conference on RFID (RFID), 1-7, 2016
152016
Learning longitudinal MRI patterns by SICE and deep learning: Assessing the Alzheimer’s disease progression
A Ortiz, J Munilla, FJ Martínez-Murcia, JM Górriz, J Ramírez, ...
Annual Conference on Medical Image Understanding and Analysis, 413-424, 2017
132017
An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels
M Burmester, J Munilla, A Ortiz, P Caballero-Gil
Sensors 17 (7), 1562, 2017
132017
Security analysis of Tu and Piramuthu's protocol
J Munilla, A Peinado
2008 New Technologies, Mobility and Security, 1-5, 2008
122008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20