The EMV standard: Break, fix, verify D Basin, R Sasse, J Toro-Pozo 2021 IEEE Symposium on Security and Privacy (SP), 1766-1781, 2021 | 78 | 2021 |
Distance-bounding protocols: Verification without time and location S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua 2018 IEEE Symposium on Security and Privacy (SP), 549-566, 2018 | 71 | 2018 |
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions D Basin, R Sasse, J Toro-Pozo 30th USENIX Security Symposium (USENIX Security 21), 179-194, 2021 | 35 | 2021 |
A class of precomputation-based distance-bounding protocols S Mauw, J Toro-Pozo, R Trujillo-Rasua 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 97-111, 2016 | 19 | 2016 |
Multiobjective variable mesh optimization Y Salgueiro, JL Toro, R Bello, R Falcon Annals of Operations Research 258, 869-893, 2017 | 13 | 2017 |
Post-collusion security and distance bounding S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 11 | 2019 |
Inducing Authentication Failures to Bypass Credit Card {PINs} D Basin, P Schaller, J Toro-Pozo 32nd USENIX Security Symposium (USENIX Security 23), 3065-3079, 2023 | 10 | 2023 |
Optimality results on the security of lookup-based protocols S Mauw, J Toro-Pozo, R Trujillo-Rasua Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017 | 5 | 2017 |
Automated identification of desynchronisation attacks on shared secrets S Mauw, Z Smith, J Toro-Pozo, R Trujillo-Rasua Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 2 | 2018 |
Evaluación del desempeño de la metaheurística MOVMO en funciones de prueba con restricciones Y Salgueiro Sicilia, JL Toro Pozo, R Bello Pérez Revista Cubana de Ciencias Informáticas 10 (1), 182-193, 2016 | 2 | 2016 |
Noise Detection and Learning Based on Current Information D Pascual-González, FD Vázquez Mesa, JL Toro Pozo Computación y Sistemas 18 (1), 153-167, 2014 | 2 | 2014 |
Limpieza de ruido para clasificación basado en vecindad y cambios de concepto en el tiempo JL Toro Pozo, D Pascual González, FD Vázquez Mesa Revista Cubana de Ciencias Informáticas 10 (2), 1-13, 2016 | 1 | 2016 |
Getting Chip Card Payments Right D Basin, X Hofmeier, R Sasse, J Toro-Pozo International Symposium on Formal Methods, 29-51, 2024 | | 2024 |
SealClub: Computer-aided Paper Document Authentication O Martín, V Hernán, TP Jorge, B David Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Computational and symbolic analysis of distance-bounding protocols JL Toro Pozo Unilu-University of Luxembourg, Esch-sur-Alzette, Luxembourg, 2019 | | 2019 |
Session I: Distance-bounding and RFID security protocols S Mauw, J Toro-Pozo, R Trujillo-Rasua 2nd CRYPTACUS Workshop 16-18 November 2017 Radboud University, Nijmegen The …, 2017 | | 2017 |
Detección de ruido y aprendizaje basado en información actual D Pascual González, FD Vázquez Mesa, JL Toro Pozo Computación y Sistemas 18 (1), 153-167, 2014 | | 2014 |
Getting Chip Card Payments Right R Sasse, J Toro-Pozo | | |
A class of precomputation-based distance-bounding protocols J Toro-Pozo | | |