• Publications
  • Influence
LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags
Low-cost Radio Frequency Identification (RFID) tags are devices of very limited computational capabilities, where only 250-3K logic gates can be devoted to security-related tasks. Many proposals haveExpand
  • 248
  • 34
  • PDF
An Analysis of Bitcoin Laundry Services
TLDR
This work briefly (An extended version can be found at https://kar.kent.ac.uk/id/eprint/63502) examines some of the most relevant Bitcoin Laundry Services, commonly known as tumblers or mixers, and studies their main features to answer some fundamental questions including their security, popularity, transaction volume, and generated revenue. Expand
  • 25
  • 3
  • PDF
Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security
TLDR
This paper shows that it is possible to enhance the security of RFID systems by requiring readers to perform a computational effort test to obtain the static identifier of the interrogated tag. Expand
  • 27
  • 3
  • PDF
Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard
The security level of the EPC Class-1 Generation-2 RFID standard is very low, as shown in previous works such as [1–4]. In particular, the security of the access and kill passwords of an RFID tag isExpand
  • 29
  • 2
  • PDF
Assessing the extent and nature of wildlife trade on the dark web.
Use of the internet as a trade platform has resulted in a shift in the illegal wildlife trade. Increased scrutiny of illegal wildlife trade has led to concerns that online trade of wildlife will moveExpand
  • 43
  • 2
Smartphone image acquisition forensics using sensor fingerprint
TLDR
The forensic analysis of digital images from mobile devices is particularly important given their quick expansion and everyday use in the society. Expand
  • 9
  • 2
Steganography using the Extensible Messaging and Presence Protocol (XMPP)
TLDR
We present here the first work to propose different mechanisms for hiding data in the Extensible Messaging and Presence Protocol (XMPP) using the underlying protocol as a means for steganography. Expand
  • 5
  • 2
  • PDF
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation
TLDR
We introduce DeepCAPTCHA, a new and secure CAPTCHA scheme based on adversarial examples, an inherit limitation of the current DL networks. Expand
  • 80
  • 1
  • PDF
...
1
2
3
4
5
...