LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags P Peris-Lopez, JC Hernandez-Castro, JM Estévez-Tapiador, A Ribagorda Proc. of 2nd Workshop on RFID Security, 06, 2006 | 473 | 2006 |
M 2 AP: A minimalist mutual-authentication protocol for low-cost RFID tags P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda Ubiquitous Intelligence and Computing, 912-923, 2006 | 449 | 2006 |
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 352-361, 2006 | 420 | 2006 |
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic A Feldmann, O Gasser, F Lichtblau, E Pujol, I Poese, C Dietzel, D Wagner, ... Proceedings of the Internet Measurements Conference, 1-18, 2020 | 369 | 2020 |
Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey C Camara, P Peris-Lopez, JE Tapiador Journal of Biomedical Informatics 55, 272-289, 2015 | 357 | 2015 |
Evolution, detection and analysis of malware for smart devices G Suarez-Tangil, J Tapiador, P Peris-Lopez, A Ribagorda IEEE Communications Surveys & Tutorials 16 (2), 961-987, 2014 | 345 | 2014 |
Dendroid: A text mining approach to analyzing and classifying code structures in android malware families G Suarez-Tangil, JE Tapiador, P Peris-Lopez, J Blasco Expert Systems with Applications 41 (4), 1104-1117, 2014 | 313 | 2014 |
Anomaly detection methods in wired networks: a survey and taxonomy JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo Computer Communications 27 (16), 1569-1584, 2004 | 289 | 2004 |
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol P Peris-Lopez, JC Hernandez-Castro, JME Tapiador, A Ribagorda Information Security Applications: 9th International Workshop, WISA 2008 …, 2009 | 275 | 2009 |
RFID systems: A survey on security threats and proposed solutions P Peris-Lopez, J Hernandez-Castro, J Estevez-Tapiador, A Ribagorda Personal Wireless Communications, 159-170, 2006 | 258 | 2006 |
A survey of wearable biometric recognition systems J Blasco, TM Chen, J Tapiador, P Peris-Lopez ACM Computing Surveys (CSUR) 49 (3), 1-35, 2016 | 168 | 2016 |
Beyond google play: A large-scale comparative study of chinese android app markets H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ... Proceedings of the Internet Measurement Conference 2018, 293-307, 2018 | 159 | 2018 |
LAMED—A PRNG for EPC Class-1 Generation-2 RFID specification P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Computer Standards & Interfaces 31 (1), 88-97, 2009 | 153 | 2009 |
An analysis of pre-installed android software J Gamba, M Rashed, A Razaghpanah, J Tapiador, N Vallina-Rodriguez IEEE Symposium on Security and Privacy, 2020 | 124 | 2020 |
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard P Peris-Lopez, JC Hernandez-Castro, JM Estevez-Tapiador, A Ribagorda Computer Standards & Interfaces 31 (2), 372-380, 2009 | 123 | 2009 |
Measuring normality in HTTP traffic for anomaly-based intrusion detection JM Estévez-Tapiador, P Garcıa-Teodoro, JE Dıaz-Verdejo Computer Networks 45 (2), 175-193, 2004 | 113 | 2004 |
Detection of web-based attacks through Markovian protocol parsing JM Estevez-Tapiador, P García-Teodoro, JE Díaz-Verdejo 10th IEEE symposium on computers and communications (ISCC'05), 457-462, 2005 | 103 | 2005 |
A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic A Feldmann, O Gasser, F Lichtblau, E Pujol, I Poese, C Dietzel, D Wagner, ... Communications of the ACM 64 (7), 101-108, 2021 | 100 | 2021 |
Stochastic protocol modeling for anomaly based network intrusion detection JM Estevez-Tapiador, P Garcia-Teodoro, JE Diaz-Verdejo First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003 …, 2003 | 97 | 2003 |
Steganography in games: A general methodology and its application to the game of Go JC Hernandez-Castro, I Blasco-Lopez, JM Estevez-Tapiador, ... computers & security 25 (1), 64-71, 2006 | 83 | 2006 |