Search Results - "MUNILLA, J"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    HB-MP: A further step in the HB-family of lightweight authentication protocols by Munilla, J., Peinado, A.

    “…A family of lightweight authentication protocols has been developed since Hopper and Blum proposed the HB protocol in 2001. In 2005, the HB + protocol was…”
    Get full text
    Journal Article
  2. 2

    Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments by Munilla, J., Burmester, M., Peinado, A.

    Published in Computer communications (15-08-2016)
    “…Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Status of Nb-Ti CCT Magnet EU Programs for Hadron Therapy by Toral, F., Barna, D., Calzolaio, C., Carloni, A., Ceruti, G., De Matteis, E., Kirby, G., Lecrevisse, T., Mariotto, S., Munilla, J., Perini, D., Prioli, M., Rossi, L., Statera, M., Sorbi, M., Sorti, S., Valente, R. U.

    “…The use of Canted Cosine Theta (CCT) magnets for accelerator applications has gained popularity due to their ease of manufacturing and assembly. In the context…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Concept Design of a Novel Superconducting PTO Actuator for Wave Energy Extraction by Garcia-Tabares, L., Hernando, C., Munilla, J., Torres, J., Santos-Herran, M., Blanco, M., Sanz, S., Sarmiento, G., Garcia Lorenzo, F., Neri, M., Magrassi, D.

    “…The role of the Power Take-Off (PTO) as part of modern Wave Energy Converters is becoming more and more relevant and many efforts have been done or are ongoing…”
    Get full text
    Journal Article
  7. 7

    Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol by Munilla, J., Peinado, A.

    Published in Computer communications (15-12-2006)
    “…Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (2006) 660–667] have…”
    Get full text
    Journal Article
  8. 8

    Design process and series production of the intersection control rack for the European XFEL linear accelerator by Moreno-Torres, P., Vazquez, C., Guirao, A., Molina, E., Cela, J. M., Munilla, J., Martinez, L. M., Toral, F.

    “…The design and procurement of 98 Intersection Control Racks is part of the Spanish in-kind contribution to the European XFEL. This cabinet contains all the…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10
  11. 11

    What can RFID do for VANETs? A cryptographic point of view by Munilla, J., Ortiz, A., Peinado, A.

    “…Vehicular ad hoc networks (VANETs) are becoming more popular as a way to increase the traffic safety and comfort. The inclusion of RFID technology in the…”
    Get full text
    Conference Proceeding
  12. 12

    Security Analysis of Tu and Piramuthu's Protocol by Munilla, J., Peinado, A.

    “…RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and…”
    Get full text
    Conference Proceeding
  13. 13

    Secure wireless data link for low-cost telemetry and telecommand applications by Ortiz, A., Munilla, J., Peinado, A.

    “…This paper introduces a secure wireless data link for telemetry and telecommand applications characterized by a low implementation cost, and consequently, a…”
    Get full text
    Conference Proceeding