Skip to main content

Showing 1–7 of 7 results for author: Peris-Lopez, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.06529  [pdf, other

    cs.LG

    Unleashing the Power of Electrocardiograms: A novel approach for Patient Identification in Healthcare Systems with ECG Signals

    Authors: Caterina Fuster-Barceló, Carmen Cámara, Pedro Peris-López

    Abstract: Over the course of the past two decades, a substantial body of research has substantiated the viability of utilising cardiac signals as a biometric modality. This paper presents a novel approach for patient identification in healthcare systems using electrocardiogram signals. A convolutional neural network is used to classify users based on images extracted from ECG signals. The proposed identific… ▽ More

    Submitted 6 July, 2023; v1 submitted 13 February, 2023; originally announced February 2023.

  2. arXiv:2103.06170  [pdf, other

    cs.CR

    Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

    Authors: Majid Salimi, Hamid Mala, Honorio Martin, Pedro Peris-Lopez

    Abstract: Multi-Party Non-Interactive Key Exchange (MP-NIKE) is a fundamental cryptographic primitive in which users register into a key generation centre and receive a public/private key pair each. After that, any subset of these users can compute a shared key without any interaction. Nowadays, IoT devices suffer from a high number and large size of messages exchanged in the Key Management Protocol (KMP).… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

    Comments: 14 pages, 3 figures

    ACM Class: E.3

  3. arXiv:1111.2744  [pdf, ps, other

    cs.CR

    Cryptanalysis of Song's advanced smart card based password authentication protocol

    Authors: Juan E. Tapiador, Julio C. Hernandez-Castro, P. Peris-Lopez, John A. Clark

    Abstract: Song \cite{Song10} proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng \cite{XZF09}. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

    Submitted 11 November, 2011; originally announced November 2011.

    Comments: 7 pages

  4. arXiv:1008.3625  [pdf, ps, other

    cs.CR

    Vulnerability Analysis of PAP for RFID Tags

    Authors: Mu'awya Naser, Pedro Peris-Lopez, Mohammd Rafie, Jan van der Lubbe

    Abstract: In this paper, we analyze the security of an RFID authentication protocol proposed by Liu and Bailey [1], called Privacy and Authentication Protocol (PAP), and show its vulnerabilities and faulty assumptions. PAP is a privacy and authentication protocol designed for passive tags. The authors claim that the protocol, being resistant to commonly assumed attacks, requires little computation and provi… ▽ More

    Submitted 21 August, 2010; originally announced August 2010.

    Comments: 18 pages, 4 figures

  5. arXiv:0910.2115  [pdf, ps, other

    cs.CR

    Security Flaws in a Recent Ultralightweight RFID Protocol

    Authors: Pedro Peris-Lopez, Julio C. Hernandez-Castro, J. M. E. Tapiador, Jan C. A. van der Lubbe

    Abstract: In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND, and addition. This combination of operations was revealed later to be insufficient for security. Then, Chien et al. proposed the SASI protocol [4] with the aim of offering bet… ▽ More

    Submitted 12 October, 2009; originally announced October 2009.

    Comments: 14 pages, 2 figures and 1 table

  6. arXiv:0906.4618  [pdf, other

    cs.CR

    Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

    Authors: Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador

    Abstract: The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance f… ▽ More

    Submitted 20 June, 2010; v1 submitted 25 June, 2009; originally announced June 2009.

    Comments: 31 pages, 10 figures, 1 table

  7. arXiv:0811.4257  [pdf, ps, other

    cs.CR

    Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations

    Authors: Julio C. Hernandez-Castro, Juan M. E. Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater

    Abstract: In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret $ID$ of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering $\lfloor log_2(96) \rfloor=6$ bits of the secret value $ID$, a result that by itself allows to mount tr… ▽ More

    Submitted 26 November, 2008; originally announced November 2008.