Search Results - "MUNILLA, J"
-
1
HB-MP: A further step in the HB-family of lightweight authentication protocols
Published in Computer networks (Amsterdam, Netherlands : 1999) (20-06-2007)“…A family of lightweight authentication protocols has been developed since Hopper and Blum proposed the HB protocol in 2001. In 2005, the HB + protocol was…”
Get full text
Journal Article -
2
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
Published in Computer communications (15-08-2016)“…Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1…”
Get full text
Journal Article -
3
The 16 T Dipole Development Program for FCC
Published in IEEE transactions on applied superconductivity (01-06-2017)“…A key challenge for a future circular collider (FCC) with centre-of-mass energy of 100 TeV and a circumference in the range of 100 km is the development of…”
Get full text
Journal Article -
4
Status of Nb-Ti CCT Magnet EU Programs for Hadron Therapy
Published in IEEE transactions on applied superconductivity (01-08-2024)“…The use of Canted Cosine Theta (CCT) magnets for accelerator applications has gained popularity due to their ease of manufacturing and assembly. In the context…”
Get full text
Journal Article -
5
A European Collaboration to Investigate Superconducting Magnets for Next Generation Heavy Ion Therapy
Published in IEEE transactions on applied superconductivity (01-06-2022)“…Next generation ion therapy magnets both for gantry and for accelerator (synchrotron) are under investigation in a recently launched European collaboration…”
Get full text
Journal Article -
6
Concept Design of a Novel Superconducting PTO Actuator for Wave Energy Extraction
Published in IEEE transactions on applied superconductivity (01-09-2022)“…The role of the Power Take-Off (PTO) as part of modern Wave Energy Converters is becoming more and more relevant and many efforts have been done or are ongoing…”
Get full text
Journal Article -
7
Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol
Published in Computer communications (15-12-2006)“…Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (2006) 660–667] have…”
Get full text
Journal Article -
8
Design process and series production of the intersection control rack for the European XFEL linear accelerator
Published in 2015 17th European Conference on Power Electronics and Applications (EPE'15 ECCE-Europe) (01-09-2015)“…The design and procurement of 98 Intersection Control Racks is part of the Spanish in-kind contribution to the European XFEL. This cabinet contains all the…”
Get full text
Conference Proceeding -
9
Optimal modes of operation of pseudorandom sequence generators based on DLFSRs
Published in Logic journal of the IGPL (01-12-2016)Get full text
Journal Article -
10
-
11
What can RFID do for VANETs? A cryptographic point of view
Published in 2010 International Conference on Security and Cryptography (SECRYPT) (01-07-2010)“…Vehicular ad hoc networks (VANETs) are becoming more popular as a way to increase the traffic safety and comfort. The inclusion of RFID technology in the…”
Get full text
Conference Proceeding -
12
Security Analysis of Tu and Piramuthu's Protocol
Published in 2008 New Technologies, Mobility and Security (01-11-2008)“…RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and…”
Get full text
Conference Proceeding -
13
Secure wireless data link for low-cost telemetry and telecommand applications
Published in MELECON 2006 - 2006 IEEE Mediterranean Electrotechnical Conference (2006)“…This paper introduces a secure wireless data link for telemetry and telecommand applications characterized by a low implementation cost, and consequently, a…”
Get full text
Conference Proceeding