Secure publish-subscribe protocols for heterogeneous medical wireless body area networks P Picazo-Sanchez, JE Tapiador, P Peris-Lopez, G Suarez-Tangil Sensors 14 (12), 22619-22642, 2014 | 58 | 2014 |
STARS4ALL night sky brightness photometer J Zamorano, C García, R González, C Tapia, AS de Miguel, S Pascual, ... The International Journal of Sustainable Lighting 35 (1), 7, 2016 | 45 | 2016 |
MEGARA, the new intermediate-resolution optical IFU and MOS for GTC: getting ready for the telescope AG de Paz, E Carrasco, J Gallego, J Iglesias-Páramo, R Cedazo, ... Ground-based and Airborne Instrumentation for Astronomy VI 9908, 420-439, 2016 | 32 | 2016 |
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals L Ortiz-Martin, P Picazo-Sanchez, P Peris-Lopez, J Tapiador Entropy 20 (2), 2018 | 27 | 2018 |
Two RFID Standard-based Security protocols for healthcare environments P Picazo-Sanchez, N Bagheri, P Peris-Lopez, JE Tapiador Journal of medical systems 37, 1-12, 2013 | 27 | 2013 |
LATEX GLOVES: Protecting Browser Extensions from Probing and Revelation Attacks A Sjösten, S Van Acker, P Picazo-Sanchez, A Sabelfeld NDSS Symposium 2019, 57, 2019 | 18 | 2019 |
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors L Ortiz-Martin, P Picazo-Sanchez, P Peris-Lopez, J Tapiador, G Schneider Future Generation Computer Systems 96, 283-296, 2019 | 11 | 2019 |
After you, please: browser extensions order attacks and countermeasures P Picazo-Sanchez, J Tapiador, G Schneider International Journal of Information Security 19, 623-638, 2020 | 10 | 2020 |
Secure Photo Sharing in Social Networks P Picazo-Sanchez, R Pardo, G Schneider ICT Systems Security and Privacy Protection: 32nd IFIP TC 12 International …, 2017 | 8 | 2017 |
Are the interpulse intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation L Ortiz-Martin, P Picazo-Sanchez, P Peris-Lopez Future Generation Computer Systems 105, 346-360, 2020 | 7 | 2020 |
Weaknesses of fingerprint‐based mutual authentication protocol P Picazo‐Sanchez, L Ortiz‐Martin, P Peris‐Lopez, N Bagheri Security and Communication Networks 8 (12), 2124-2134, 2015 | 7 | 2015 |
: Walking the Privacy Trail E Pagnin, C Brunetta, P Picazo-Sanchez Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018 | 6* | 2018 |
A runtime monitoring system to secure browser extensions R Pardo, P Picazo-Sanchez, G Schneider, J Tapiador Security Principles and Trust Hotspot 2017, 2017 | 5 | 2017 |
Security of epc class-1 P Picazo-Sanchez, L Ortiz-Martin, P Peris-Lopez, JC Hernandez-Castro Security and trends in wireless identification and sensing platform tags …, 2013 | 4 | 2013 |
Hardening the Security Analysis of Browser Extensions B Eriksson, P Picazo-Sanchez, A Sabelfeld In Proceedings of ACM SAC Conference (SAC’22), 2022 | 3 | 2022 |
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication P Picazo-Sanchez, M Algehed, A Sabelfeld In Proceedings of the 8th International Conference on Information Systems …, 2022 | 3 | 2022 |
A collaborative access control framework for online social networks H Alshareef, R Pardo, G Schneider, P Picazo-Sanchez Journal of Logical and Algebraic Methods in Programming 114, 100562, 2020 | 3 | 2020 |
Migrating Monitors+ ABE: A Suitable Combination for Secure IoT? GJ Pace, P Picazo-Sanchez, G Schneider Leveraging Applications of Formal Methods, Verification and Validation …, 2018 | 3 | 2018 |
Are chrome extensions compliant with the spirit of least privilege? P Picazo-Sanchez, L Ortiz-Martin, G Schneider, A Sabelfeld International Journal of Information Security 21 (6), 1283-1297, 2022 | 2 | 2022 |
Semantic Attribute-Based Encryption: A framework for combining ABE schemes with semantic technologies H Arshad, C Johansen, O Owe, P Picazo-Sanchez, G Schneider Information Sciences 616, 558-576, 2022 | 2 | 2022 |