Pino Caballero Gil
#33,443
Most Influential Person Now
Spanish mathematician
Pino Caballero Gil's AcademicInfluence.com Rankings
Pino Caballero Gilmathematics Degrees
Mathematics
#5156
World Rank
#7279
Historical Rank
Number Theory
#352
World Rank
#440
Historical Rank
Group Theory
#390
World Rank
#448
Historical Rank
Algebra
#449
World Rank
#611
Historical Rank
Download Badge
Mathematics
Pino Caballero Gil's Degrees
- PhD Mathematics University of Seville
- Masters Mathematics University of Seville
- Bachelors Mathematics University of Seville
Similar Degrees You Can Earn
Why Is Pino Caballero Gil Influential?
(Suggest an Edit or Addition)According to Wikipedia, Pino Caballero Gil is a Spanish scientist. She is a professor in Computer Science and Artificial Intelligence at the University of La Laguna where she coordinates the CryptULL cryptology research group.
Pino Caballero Gil's Published Works
Published Works
- Smart contracts based on blockchain for logistics management (2017) (35)
- On the Use of Cellular Automata in Symmetric Cryptography (2006) (32)
- Aggregation and probabilistic verification for data authentication in VANETs (2014) (30)
- Implementation and Analysis of Real-Time Streaming Protocols (2017) (30)
- Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks (2018) (27)
- Synthesis of cryptographic interleaved sequences by means of linear cellular automata (2009) (27)
- A wide family of nonlinear filter functions with a large linear span (2004) (27)
- Efficient Public Key Certificate Management for Mobile Ad Hoc Networks (2011) (24)
- Self-Organized Clustering Architecture for Vehicular Ad Hoc Networks (2015) (23)
- Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things (2016) (20)
- Secure UAV-Based System to Detect Small Boats Using Neural Networks (2019) (20)
- Chaotic modelling of the generalized self-shrinking generator (2011) (20)
- On the Linear Complexity of Nonlinear Filtered PN-sequences (1994) (20)
- Linear solutions for cryptographic nonlinear sequence generators (2007) (20)
- Stimulating cooperation in self-organized vehicular networks (2009) (19)
- Flexible authentication in vehicular ad hoc networks (2009) (18)
- How to build vehicular ad-hoc networks on smartphones (2013) (18)
- An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels † (2017) (18)
- Design and Implementation of an Application for Deploying Vehicular Networks with Smartphones (2013) (17)
- A simple linearization of the self-shrinking generator by means of cellular automata (2010) (17)
- Using Groups to Reduce Communication Overhead in VANETs (2010) (16)
- Security Issues in Vehicular Ad Hoc Networks (2011) (16)
- Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks (2020) (15)
- Secure system based on UAV and BLE for improving SAR missions (2020) (15)
- Alternative Communication System for Emergency Situations (2014) (15)
- Data aggregation for information authentication in VANETs (2010) (15)
- Cooperation Enforcement Schemes in Vehicular Ad-Hoc Networks (2009) (14)
- Self-organized authentication architecture for Mobile Ad-hoc Networks (2008) (14)
- Strategic attack on the shrinking generator (2008) (14)
- Concatenated Automata in Cryptanalysis of Stream Ciphers (2006) (14)
- Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones (2017) (13)
- Data Aggregation Based on Fuzzy Logic for VANETs (2011) (13)
- Self-organized authentication in mobile ad-hoc networks (2009) (13)
- Cellular Automata-Based Application for Driver Assistance in Indoor Parking Areas † (2016) (13)
- Strong Solutions to the Identification Problem (2001) (13)
- A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks (2007) (13)
- Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator (2006) (12)
- Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application (2009) (12)
- IoT Application in the Supply Chain Logistics (2013) (12)
- Collaborative SQL-injections detection system with machine learning (2017) (11)
- Lightweight Authentication for RFID Used in VANETs (2011) (10)
- Mutual authentication in self-organized VANETs (2014) (10)
- Zero-Knowledge Hierarchical Authentication in MANETs (2006) (9)
- VANET Event Verification Based on User Trust (2016) (9)
- A vision of cooperation tools for VANETs (2010) (9)
- Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers (2005) (9)
- Regular Cosets and Upper Bounds on the Linear Complexity of Certain Sequences (1998) (9)
- Fuzzy-Based Forest Fire Prevention and Detection by Wireless Sensor Networks (2018) (8)
- A rational approach to cryptographic protocols (2007) (8)
- Chaotic Cellular Automata with Cryptographic Application (2010) (8)
- Priority and collision avoidance system for traffic lights (2019) (8)
- Differentiated Services to Provide Efficient Node Authentication in VANETs (2009) (8)
- A Luggage Control System Based on NFC and Homomorphic Cryptography (2017) (7)
- Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems (2022) (7)
- Strong authentication on smart wireless devices (2013) (7)
- Pseudorandom Generator to Strengthen Cooperation in VANETs (2011) (7)
- Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange (2017) (7)
- New upper bounds on the linear complexity (2000) (6)
- Management of Forest Fires Using IoT Devices (2017) (6)
- Real-Time Streaming: A Comparative Study Between RTSP and WebRTC (2016) (6)
- A secure mHealth application for attention deficit and hyperactivity disorder (2019) (6)
- Using Identity-Based Cryptography in Mobile Applications (2022) (5)
- Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies (2015) (5)
- Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences (2010) (5)
- Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments (2015) (5)
- Harassment Detection Using Machine Learning and Fuzzy Logic Techniques (2019) (5)
- Application of Linear Hybrid Cellular Automata to Stream Ciphers (2007) (5)
- New Attack Strategy for the Shrinking Generator (2009) (5)
- Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs) (2009) (5)
- Optimizing Resource Allocation and Indoor Location Using Bluetooth Low Energy (2016) (4)
- On Privacy and Integrity in Vehicular Ad hoc Networks (2010) (4)
- Designing communication-oriented node authentication for VANETs (2009) (4)
- Blockchain-Based Ubiquitous Transport and Logistics Monitoring System (2019) (4)
- Distributed Communication System for Emergencies (2016) (4)
- A cryptological way of teaching mathematics (2007) (4)
- Countermeasures to Prevent Misbehaviour in VANETs (2012) (4)
- Enhancing Collaboration in Vehicular Networks (2010) (4)
- Ambient Assisted Living and Ambient Intelligence for Health (2018) (3)
- Knowledge Management using Clusters in VANETs - Description, Simulation and Analysis (2010) (3)
- Analysis of the New Standard Hash Function (2013) (3)
- A Trustworthy Distributed Social Carpool Method (2015) (3)
- Cooperative approach to self-managed VANETs (2010) (3)
- Low-Cost Service to Predict and Manage Indoor Parking Spaces (2015) (3)
- Beacon-Based Fuzzy Indoor Tracking at Airports (2018) (3)
- Mobile application for elderly assistance in public transport (2017) (3)
- Self-organizing life cycle management of mobile ad hoc networks (2012) (3)
- FastTriaje: A Mobile System for Victim Classification in Emergency Situations (2014) (3)
- Fuzzy Logic System for Identity Theft Detection in Social Networks (2018) (3)
- Revocation Management in Vehicular Ad-hoc Networks (2015) (3)
- Cooperative Security Schemes for Mobile Ad-Hoc Networks (2008) (3)
- Ubiquitous System to Monitor Transport and Logistics (2018) (2)
- Software implementation of the SNOW 3G Generator on iOS and Android platforms (2015) (2)
- Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences (2010) (2)
- Novel Guidance CPS Based on the FatBeacon Protocol (2018) (2)
- Analysis of the generalized self-shrinking generator (2011) (2)
- Enhancing Cooperation in Wireless Vehicular Networks (2011) (2)
- Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators (2008) (2)
- IBSC System for Victims Management in Emergency Scenarios (2017) (2)
- Ubiquitous Collision Avoidance System for Red Light Running (2018) (2)
- Monitoring Environmental Conditions in Airports with Wireless Sensor Networks (2018) (2)
- Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks (2014) (2)
- Analysis of Lightweight Cryptographic Solutions for Authentication in IoT (2013) (2)
- Merging sub-networks in VANETs by using the IEEE 802.11xx protocols (2015) (2)
- Group Proposal to Secure Vehicular Ad-Hoc Networks (2010) (2)
- Tree-Based Management of Revoked Certificates in Vehicular Ad-hoc Networks (2013) (2)
- UAV-Based Rescue System for Emergency Situations (2016) (2)
- Using blockchain in the follow‐up of emergency situations related to events (2019) (2)
- A Zero-Knowledge Identification Scheme (2003) (2)
- An EXperimental Hybrid wIrelesS platform for vehicular networks (2016) (2)
- Detection and Report of Traffic Lights Violation Using Sensors and Smartphones (2015) (2)
- RoboCAM: Robot-Based Video Surveillance Application (2016) (1)
- Efficient Application of Hybrid 150/90 Cellular Automata to Symmetric Cryptography (2006) (1)
- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks (2010) (1)
- Authentication and Encryption for a Robotic Ad Hoc Network Using Identity-Based Cryptography (2018) (1)
- Ethereum-based decentralized car rental system (2022) (1)
- Linear Span Analysis of a Set of Periodic Sequence Generators (1995) (1)
- Secure ambient intelligence prototype for airports (2020) (1)
- COEDU-IN Project: an inclusive co-educational project for teaching computational thinking and digital skills at early ages (2021) (1)
- Reputation lists and groups to promote cooperation (2011) (1)
- Secure Communication System for Emergency Services in Network Congestion Scenarios (2018) (1)
- A Global Authentication Scheme for Mobile Ad-Hoc Networks (2007) (1)
- A Secure Mobile Platform for Intelligent Transportation Systems (2016) (1)
- Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks (2016) (1)
- QuantumSolver: A quantum tool-set for developers (2022) (1)
- Improving Tourist Experience Through an IoT Application Based on FatBeacons (2017) (1)
- Decision Support System Based on Indoor Location for Personnel Management (2021) (1)
- Graph‐Based Improvement of Edit Distance Attacks (2007) (1)
- A secure approach to monitoring emergency health resources (2021) (1)
- Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs (2014) (1)
- On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences (2008) (1)
- Extending OLSR Functionalities to PKI Management (2011) (1)
- Study and Implementation of an Interactive Simulation of Quantum Key Distribution Using the E91 Cryptographic Protocol (2022) (1)
- Poster: Indoor Location System for Vehicles (2015) (1)
- Strong Identification Based on a Hard-on-Average Problem (2005) (1)
- Using query frequencies in tree-based revocation for certificateless authentication in VANETs (2014) (1)
- Preface of the Symposium 15: Cryptology, Information Security, and Networks (2008) (1)
- Introducing secure and self-organized vehicular ad-hoc networks (2011) (1)
- Building an Ethereum-Based Decentralized Vehicle Rental System (2019) (1)
- Patients' Data Management System Through Identity Based Encryption (2016) (1)
- Bridging the diversity gap: actions and experiences fostering diversity in STEM (2020) (1)
- Solving Linear Difference Equations by Means of Cellular Automata (2007) (1)
- Group Formation through Cooperating Node in VANETs (2010) (1)
- 4 Security Issues in Vehicular Ad Hoc Networks (2011) (1)
- Access Control System Based on Raspberry Pi and Android Smartphones (2017) (1)
- Use of a Duplex Construction of SHA-3 for Certificate Revocation in VANETs (2018) (0)
- Secure Indoor Location for Airport Environments (2018) (0)
- Secure Implementation of a Vehicular Application for the Symbian Platform (2022) (0)
- BLE Beacon System for Smartphone Secure Tracking (2022) (0)
- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (2015) (0)
- Rethinking Self-organized Public-key Management for Mobile Ad-Hoc Networks (2009) (0)
- Ubiquitous System to Enhance the Supply Chain (2013) (0)
- A simple attack on some clock-controlled generators (2009) (0)
- Fuzzy-Logic-Based Application to Combat Gender Violence (2017) (0)
- The teaching of cryptologic mathematics (2003) (0)
- An Improved Attack on the Shrinking Generator (2005) (0)
- Zero-Knowledge Proof for the Independent Set Problem (2005) (0)
- Deterministic Cryptanalysis of some Stream Ciphers (2009) (0)
- Application Based on Fuzzy Logic to Detect and Prevent Cyberbullying Through Smartphones (2017) (0)
- Linearization of Stream Ciphers by Means of Concatenated Automata (2007) (0)
- Algorithm for Proving the Knowledge of an Independent Vertex Set (2005) (0)
- A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols (2004) (0)
- Weak Equivalents for Nonlinear Filtering Functions (2014) (0)
- Probability to Break Certain Digital Signature Schemes (2019) (0)
- A hierarchical access control scheme in ad-hoc wireless networks (2005) (0)
- Detection of forest fires outbreaks by dynamic fuzzy logic controller (2020) (0)
- Detection of Anomalies in the Call Flow of an Emergency Management Center (2022) (0)
- Practical Attack on the Shrinking Generator (2006) (0)
- A Mobile Learning App for Driving Lessons (2013) (0)
- Non-Interactive Authentication for Light Environments (2012) (0)
- Tree-based revocation for authentication in vehicular ad-hoc networks (2014) (0)
- Merging sub-networks in self-managed vehicular ad-hoc networks (2016) (0)
- A game-theoretic model for two-party cryptographic protocols (2004) (0)
- Global Linear Complexity Analysis of Filter Keystream Generators (2010) (0)
- A Linear Cellular Automata-Based Model for Generating Cryptographic Sequences (2010) (0)
- Decentralized Authentication for Opportunistic Communications in Disaster Situations (2017) (0)
- Tool to simulate groups in vehicular networks using NS-2 and TraceGraph (2010) (0)
- Secret Sharing Based on a Hard-on-Average Problem (2006) (0)
- Drowsiness detection in drivers with a smartwatch (2022) (0)
- Modelling of Complex Cryptographic Systems in Terms of Simple Cellular Automata (2006) (0)
- McEliece Cryptosystem: Reducing the Key Size with QC-LDPC codes (2023) (0)
- A secure approach to monitoring emergency health resources (2021) (0)
- Using New Tools for Certificate Repositories Generation in MANETs (2008) (0)
- Simple Cellular Automata-Based Linear Models for a Class of Sequence Generators (2010) (0)
- Ubiquitous Computing and Ambient Intelligence (2016) (0)
- RFID authentication protocol based on a novel EPC Gen2 PRNG (2022) (0)
- Revocation for Certificateless Authentication in VANETs (2014) (0)
- Secure Indoor Positioning System based on Inertial Measurements for Low Cost Devices (2018) (0)
- Linearization of the Alternating Step Generator in Terms of Cellular Automata (2009) (0)
- Secure system based on UAV and BLE for improving SAR missions (2017) (0)
- A Cellular Automata based method for predicting binary sequences (2008) (0)
- Version of the New SHA Standard Applied to Manage Certificate Revocation in VANETs (2013) (0)
- Video surveillance robot powered by raspberry pi (2017) (0)
- Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations (2008) (0)
- Poster: Revocation in VANETs Based on k-ary Huffman Trees (2015) (0)
- Merging sub-networks in VANETs by using the IEEE 802.11xx protocols (2014) (0)
- Development of an Android Application to Combat Domestic Violence (2016) (0)
- A Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators (2005) (0)
- Increasing Privacy and Trust in Cooperative Social Platforms for Vehicular Applications (2014) (0)
- Merging sub-networks in self-managed vehicular ad-hoc networks (2014) (0)
- On the Design of Cryptographic Primitives (2006) (0)
- Secure System Communication to Emergencies for Victims Management Through Identity Based Signcryption Scheme (2017) (0)
- A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography (2005) (0)
- Zero-knowledge Authentication for Self-managed Vehicular Networks (2016) (0)
- Solving Linear Difference Equations by Means of (2007) (0)
- A Secret Sharing Scheme Using Matrices (2003) (0)
- Session 8: Internet Applications and Information Security (2014) (0)
- Current Topics in Security of Mobile Ad-hoc NETworks (2008) (0)
- Theoretical Analysis and Software Implementation of a Quantum Encryption Proposal (2023) (0)
- Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation (2022) (0)
- Study and security analysis of the Spanish identity card (2022) (0)
- Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers (2009) (0)
This paper list is powered by the following services:
Other Resources About Pino Caballero Gil
What Schools Are Affiliated With Pino Caballero Gil?
Pino Caballero Gil is affiliated with the following schools: