Jorge Munilla
Jorge Munilla
Professor of Telecommunication Engineering, University of Malaga
Email confirmado em
Citado por
Citado por
Ensembles of deep learning architectures for the early diagnosis of the Alzheimer’s disease
A Ortiz, J Munilla, JM Gorriz, J Ramirez
International journal of neural systems 26 (07), 1650025, 2016
HB-MP: A further step in the HB-family of lightweight authentication protocols
J Munilla, A Peinado
Computer Networks 51 (9), 2262-2267, 2007
Distance bounding protocols for RFID enhanced by using void‐challenges and analysis in noisy channels
J Munilla, A Peinado
Wireless communications and mobile computing 8 (9), 1227-1232, 2008
Distance bounding protocols with void-challenges for RFID
J Munilla, A Ortiz, A Peinado
Printed handout at the Workshop on RFID Security–RFIDSec 6, 2006
Exploratory graphical models of functional and structural connectivity patterns for Alzheimer's Disease diagnosis
A Ortiz, J Munilla, I Álvarez-Illán, JM Górriz, J Ramírez, ...
Frontiers in computational neuroscience 9, 132, 2015
Lightweight RFID authentication with forward and backward security
M Burmester, J Munilla
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-26, 2011
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
Parkinson's disease detection using isosurfaces-based features and convolutional neural networks
A Ortiz, J Munilla, M Martínez-Ibañez, JM Górriz, J Ramírez, ...
Frontiers in neuroinformatics 13, 48, 2019
A flyweight RFID authentication protocol
M Burmester, J Munilla
Cryptology ePrint Archive, 2009
Secure EPC gen2 compliant radio frequency identification
M Burmester, B de Medeiros, J Munilla, A Peinado
Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC …, 2009
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
O Mir, J Munilla, S Kumari
Peer-to-Peer Networking and Applications 10, 79-91, 2017
EPCGen2 pseudorandom number generators: Analysis of J3Gen
A Peinado, J Munilla, A Fúster-Sabater
Sensors 14 (4), 6500-6515, 2014
Off-line password-guessing attack to Peyravian–Jeffries’s remote user authentication protocol
J Munilla, A Peinado
Computer Communications 30 (1), 52-54, 2006
An RFID-based smart structure for the supply chain: Resilient scanning proofs and ownership transfer with positive secrecy capacity channels
M Burmester, J Munilla, A Ortiz, P Caballero-Gil
Sensors 17 (7), 1562, 2017
Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
J Munilla, M Burmester, A Peinado
Computer Communications 88, 84-88, 2016
Learning longitudinal MRI patterns by SICE and deep learning: Assessing the Alzheimer’s disease progression
A Ortiz, J Munilla, FJ Martínez-Murcia, JM Górriz, J Ramírez, ...
Medical Image Understanding and Analysis: 21st Annual Conference, MIUA 2017 …, 2017
Attacks on a distance bounding protocol
J Munilla, A Peinado
Computer Communications 33 (7), 884-889, 2010
Enhanced low‐cost RFID protocol to detect relay attacks
J Munilla, A Peinado
Wireless Communications and Mobile Computing 10 (3), 361-371, 2010
Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
J Munilla, F Guo, W Susilo
Wireless personal communications 72, 245-258, 2013
An anonymous RFID grouping-proof with missing tag identification
M Burmester, J Munilla
2016 IEEE International Conference on RFID (RFID), 1-7, 2016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20