Pica4x6
Pica4x6
Academia
Industry
Service
Publications
Contact
Light
Dark
Automatic
Pablo Picazo-Sanchez
Latest
Analysing the impact of ChatGPT in research
FakeX: A Framework for Detecting Fake Reviews of Browser Extensions
Ideology and Power Identification in Parliamentary Debates
Closing the Gap: Automated Distractor Generation in Japanese Language Testing
Attribute-Based Encryption with Enforceable Obligations
Clipaha: A Scheme to Perform Password Stretching on the Client
IBE.js: A Framework for Instrumenting Browser Extensions
Are Chrome Extensions Compliant with the Spirit of Least Privilege?
DeDup.js: Discovering Malicious and Vulnerable Extensions by Detecting Duplication
Gridchain: An Investigation of Privacy for the Future Local Distribution Grid
Hardening the Security Analysis of Browser Extensions
Heart-Based Biometric Protocols: A look back over almost two decades
No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns
Semantic Attribute-Based Encryption: A Framework for Combining ABE schemes with Semantic Technologies
Modelling cryptographic distinguishers using machine learning
A collaborative access control framework for online social networks
After you, please: browser extensions order attacks and countermeasures
Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation
HMAC and “secure preferences”: Revisiting chromium-based browsers security
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks
Heartbeats do not make good pseudo-random number generators: An analysis of the randomness of inter-pulse intervals
HIKE: Walking the privacy trail
Migrating monitors + ABE: A suitable combination for secure IoT?
Secure photo sharing in social networks
Weaknesses of fingerprint-based mutual authentication protocol
Secure publish-subscribe protocols for heterogeneous medical wireless body area networks
Cryptanalysis of the RNTS system
Security of EPC Class-1
Two RFID standard-based security protocols for healthcare environments
Cite
×