2009 | ||
---|---|---|
8 | EE | Jorge Munilla, Alberto Peinado: Security flaw of Hölbl et al.'s protocol. Computer Communications 32(4): 736-739 (2009) |
2008 | ||
7 | EE | Jorge Munilla, Alberto Peinado: Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing 8(9): 1227-1232 (2008) |
2007 | ||
6 | EE | Jorge Munilla, Alberto Peinado: HB-MP: A further step in the HB-family of lightweight authentication protocols. Computer Networks 51(9): 2262-2267 (2007) |
2006 | ||
5 | EE | Jorge Munilla, Alberto Peinado: Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. Computer Communications 30(1): 52-54 (2006) |
4 | EE | Jaime Muñoz Masqué, Alberto Peinado: Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem. J. Inf. Sci. Eng. 22(2): 391-399 (2006) |
2004 | ||
3 | EE | Isabel Barbancho, Ana M. Barbancho, Lorenzo J. Tardón, Alberto Peinado: Multirate MC-DS-CDMA transmitter for 4G communications. VTC Fall (2) 2004: 904-908 |
2 | EE | Alberto Peinado: Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications 27(17): 1709-1715 (2004) |
2003 | ||
1 | EE | Ana M. Barbancho, Alberto Peinado: Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks 43(6): 777-785 (2003) |
1 | Ana M. Barbancho | [1] [3] |
2 | Isabel Barbancho | [3] |
3 | Jaime Muñoz Masqué | [4] |
4 | Jorge Munilla | [5] [6] [7] [8] |
5 | Lorenzo J. Tardón | [3] |