default search action
Julio César Hernández Castro
Julio C. Hernandez-Castro
Person information
- affiliation: University of Kent, Canterbury, UK
- affiliation (former): Charles III University of Madrid, Madrid, Spain
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j76]Constantinos Patsakis, Eugenia A. Politou, Efthimios Alepis, Julio C. Hernandez-Castro:
Cashing out crypto: state of practice in ransom payments. Int. J. Inf. Sec. 23(2): 699-712 (2024) - [j75]Orçun Çetin, Emre Ekmekcioglu, Budi Arief, Julio C. Hernandez-Castro:
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection. J. Univers. Comput. Sci. 30(9): 1163-1183 (2024) - [c89]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Analysis of Security Mechanisms of Dark Web Markets. EICC 2024: 120-127 - [c88]Meryem Berfin Ozkok, Baturay Birinci, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs. EICC 2024: 128-135 - [c87]Yonas Leguesse, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication Tool. EuroUSEC 2024: 309-321 - 2023
- [j74]Elena Almaraz Luengo, Bittor Alaña Olivares, Luis Javier García-Villalba, Julio César Hernández Castro:
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests. Appl. Math. Comput. 459: 128222 (2023) - [j73]Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan:
Introduction to the Special Issue on Ransomware. DTRAP 4(4): 51:1-51:3 (2023) - [j72]Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro:
Personality Types and Ransomware Victimisation. DTRAP 4(4): 53:1-53:25 (2023) - [c86]Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. ARES 2023: 105:1-105:11 - [c85]Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools? EICC 2023: 13-18 - [c84]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. ICISSP 2023: 106-117 - [c83]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications. ICISSP 2023: 389-401 - [i13]Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro:
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. CoRR abs/2308.00590 (2023) - 2022
- [j71]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio César Hernández Castro:
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps. IEEE Access 10: 35172-35218 (2022) - [j70]Elena Almaraz Luengo, Marcos Brian Leiva Cerna, Luis Javier García-Villalba, Julio C. Hernandez-Castro:
A new approach to analyze the independence of statistical tests of randomness. Appl. Math. Comput. 426: 127116 (2022) - [j69]Elena Almaraz Luengo, Marcos Brian Leiva Cerna, Luis Javier García-Villalba, Julio C. Hernandez-Castro, Darren Hurley-Smith:
Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2). Entropy 24(5): 613 (2022) - [j68]Elena Almaraz Luengo, Marcos Brian Leiva Cerna, Luis Javier García-Villalba, Darren Hurley-Smith, Julio César Hernández Castro:
Sensitivity and uniformity in statistical randomness tests. J. Inf. Secur. Appl. 70: 103322 (2022) - [j67]Darren Hurley-Smith, Constantinos Patsakis, Julio C. Hernandez-Castro:
On the Unbearable Lightness of FIPS 140-2 Randomness Tests. IEEE Trans. Inf. Forensics Secur. 17: 3946-3958 (2022) - [c82]Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith:
Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism. COINS 2022: 1-6 - [c81]Alpesh Bhudia, Anna Cartwright, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith:
Identifying Incentives for Extortion in Proof of Stake Consensus Protocols. DBB 2022: 109-118 - [p2]Luca Mariot, Domagoj Jakobovic, Thomas Bäck, Julio C. Hernandez-Castro:
Artificial Intelligence for the Design of Symmetric Cryptographic Primitives. Security and Artificial Intelligence 2022: 3-24 - 2021
- [j66]Yonas Leguesse, Christian Colombo, Mark Vella, Julio C. Hernandez-Castro:
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone. IEEE Access 9: 168600-168612 (2021) - [j65]Burak Filiz, Budi Arief, Orçun Çetin, Julio C. Hernandez-Castro:
On the Effectiveness of Ransomware Decryption Tools. Comput. Secur. 111: 102469 (2021) - [j64]Yagiz Yilmaz, Orçun Çetin, Budi Arief, Julio C. Hernandez-Castro:
Investigating the impact of ransomware splash screens. J. Inf. Secur. Appl. 61: 102934 (2021) - [j63]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains. J. Netw. Comput. Appl. 190: 103135 (2021) - [c80]Yichao Wang, Budi Arief, Julio César Hernández Castro:
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. eCrime 2021: 1-13 - [c79]Calvin Brierley, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. NordSec 2021: 72-92 - [c78]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android. SECRYPT 2021: 356-369 - [p1]Darren Hurley-Smith, Julio C. Hernandez-Castro:
Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators. Security of Ubiquitous Computing Systems 2021: 165-181 - [i12]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android. CoRR abs/2105.05510 (2021) - 2020
- [j62]Darren Hurley-Smith, Julio C. Hernandez-Castro:
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Trans. Priv. Secur. 23(3): 16:1-16:25 (2020) - [c77]Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
PaperW8: an IoT bricking ransomware proof of concept. ARES 2020: 82:1-82:10 - [c76]Karlo Knezevic, Stjepan Picek, Domagoj Jakobovic, Julio C. Hernandez-Castro:
What Is Your MOVE: Modeling Adversarial Network Environments. EvoApplications 2020: 260-275 - [c75]Budi Arief, Andy Periam, Orçun Çetin, Julio C. Hernandez-Castro:
Using Eyetracker to Find Ways to Mitigate Ransomware. ICISSP 2020: 448-456 - [c74]Jamie Pont, Budi Arief, Julio C. Hernandez-Castro:
Why Current Statistical Approaches to Ransomware Detection Fail. ISC 2020: 199-216 - [c73]Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro:
Persistence in Linux-Based IoT Malware. NordSec 2020: 3-19 - [c72]Jennifer Bellizzi, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation. NordSec 2020: 20-36 - [c71]Yonas Leguesse, Mark Vella, Christian Colombo, Julio C. Hernandez-Castro:
Reducing the Forensic Footprint with Android Accessibility Attacks. STM 2020: 22-38 - [i11]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. CoRR abs/2008.02507 (2020)
2010 – 2019
- 2019
- [j61]Edward J. Cartwright, Julio C. Hernandez-Castro, Anna Cartwright:
To pay or not: game theoretic models of ransomware. J. Cybersecur. 5(1): tyz009 (2019) - [c70]Jamie Pont, Osama Abu Oun, Calvin Brierley, Budi Arief, Julio C. Hernandez-Castro:
A Roadmap for Improving the Impact of Anti-ransomware Research. NordSec 2019: 137-154 - 2018
- [j60]Alejandro Martín, Julio César Hernández Castro, David Camacho:
An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access 6: 57205-57218 (2018) - [j59]Thomas Sloan, Julio C. Hernandez-Castro:
Dismantling OpenPuff PDF steganography. Digit. Investig. 25: 90-96 (2018) - [j58]Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Julio C. Hernandez-Castro:
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors 18(9): 2804 (2018) - [j57]Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Julio C. Hernandez-Castro:
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors 18(10): 3372 (2018) - [j56]Darren Hurley-Smith, Julio C. Hernandez-Castro:
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Trans. Inf. Forensics Secur. 13(4): 1031-1041 (2018) - [c69]Jack McBride, Budi Arief, Julio C. Hernandez-Castro:
Security Analysis of Contiki IoT Operating System. EWSN 2018: 278-283 - [c68]Darren Hurley-Smith, Julio C. Hernandez-Castro:
Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification. SSR 2018: 143-163 - 2017
- [j55]Gema Bello Orgaz, Julio C. Hernandez-Castro, David Camacho:
Detecting discussion communities on vaccination in twitter. Future Gener. Comput. Syst. 66: 125-136 (2017) - [j54]Luis Javier García-Villalba, Ana Lucila Sandoval Orozco, Jocelin Rosales Corripio, Julio C. Hernandez-Castro:
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques. Future Gener. Comput. Syst. 76: 418-427 (2017) - [j53]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. IEEE Trans. Inf. Forensics Secur. 12(11): 2640-2653 (2017) - [c67]Julio C. Hernandez-Castro, David F. Barrero:
Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery. CEC 2017: 1420-1427 - [c66]Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. CSCML 2017: 19-33 - [c65]Thibault de Balthasar, Julio C. Hernandez-Castro:
An Analysis of Bitcoin Laundry Services. NordSec 2017: 297-312 - [c64]Jack McBride, Julio C. Hernandez-Castro, Budi Arief:
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override. SIoT 2017: 30-39 - [i10]Julio C. Hernandez-Castro, Edward J. Cartwright, Anna Stepanova:
Economic Analysis of Ransomware. CoRR abs/1703.06660 (2017) - 2016
- [j52]Ana Lucila Sandoval Orozco, Jocelin Rosales Corripio, David Manuel Arenas González, L. Javier García-Villalba, Julio C. Hernandez-Castro:
Theia: a tool for the forensic analysis of mobile devices pictures. Computing 98(12): 1251-1286 (2016) - [j51]Gildas Avoine, Antonin Beaujeant, Julio C. Hernandez-Castro, Louis Demay, Philippe Teuwen:
A Survey of Security and Privacy Issues in ePassport Protocols. ACM Comput. Surv. 48(3): 47:1-47:37 (2016) - [j50]Luis Javier García-Villalba, Ana Lucila Sandoval Orozco, Raquel Ramos López, Julio César Hernández Castro:
Identification of smartphone brand and model via forensic video analysis. Expert Syst. Appl. 55: 59-69 (2016) - [j49]Ana Lucila Sandoval Orozco, Jocelin Rosales Corripio, Luis Javier García-Villalba, Julio César Hernández Castro:
Image source acquisition identification of mobile devices based on the use of features. Multim. Tools Appl. 75(12): 7087-7111 (2016) - [j48]Gildas Avoine, Xavier Carpent, Julio C. Hernandez-Castro:
Pitfalls in Ultralightweight Authentication Protocol Designs. IEEE Trans. Mob. Comput. 15(9): 2317-2332 (2016) - [c63]Darren Hurley-Smith, Julio C. Hernandez-Castro:
Bias in the Mifare DESFire EV1 TRNG. RFIDSec 2016: 123-133 - [i9]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. IACR Cryptol. ePrint Arch. 2016: 336 (2016) - 2015
- [j47]David J. Barnes, Julio C. Hernandez-Castro:
On the limits of engine analysis for cheating detection in chess. Comput. Secur. 48: 58-73 (2015) - [j46]Thomas Sloan, Julio C. Hernandez-Castro:
Steganalysis of OpenPuff through atomic concatenation of MP4 flags. Digit. Investig. 13: 15-21 (2015) - [j45]Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, David Manuel Arenas González, Jocelin Rosales Corripio, Julio C. Hernandez-Castro, Stuart James Gibson:
Smartphone image acquisition forensics using sensor fingerprint. IET Comput. Vis. 9(5): 723-731 (2015) - [j44]Ana Lucila Sandoval Orozco, David Manuel Arenas González, Luis Javier García-Villalba, Julio César Hernández Castro:
Analysis of errors in exif metadata on mobile devices. Multim. Tools Appl. 74(13): 4735-4763 (2015) - [j43]Julio C. Hernandez-Castro, David L. Roberts:
Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Comput. Sci. 1: e10 (2015) - [j42]Thomas Sloan, Julio C. Hernandez-Castro:
Forensic analysis of video steganography tools. PeerJ Comput. Sci. 1: e7 (2015) - [i8]Thomas Sloan, Julio C. Hernandez-Castro:
Forensic analysis of video steganography tools. PeerJ Prepr. 3: e1019 (2015) - 2014
- [j41]Ana Lucila Sandoval Orozco, David Manuel Arenas González, Jocelin Rosales Corripio, Luis Javier García-Villalba, Julio César Hernández Castro:
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing 96(9): 829-841 (2014) - [j40]David F. Barrero, Julio César Hernández Castro, Pedro Peris-Lopez, David Camacho, María Dolores Rodríguez-Moreno:
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol. Expert Syst. J. Knowl. Eng. 31(1): 9-19 (2014) - [j39]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri:
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259: 571-577 (2014) - [c62]Gema Bello Orgaz, Julio C. Hernandez-Castro, David Camacho:
A Survey of Social Web Mining Applications for Disease Outbreak Detection. IDC 2014: 345-356 - 2013
- [j38]Omed S. Khalind, Julio C. Hernandez-Castro, Benjamin Aziz:
A study on the false positive rate of Stegdetect. Digit. Investig. 9(3-4): 235-245 (2013) - [j37]Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Julio César Hernández Castro:
Cryptanalysis of the RNTS system. J. Supercomput. 65(2): 949-960 (2013) - [c61]Jocelin Rosales Corripio, David Manuel Arenas González, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba, Julio C. Hernandez-Castro, Stuart James Gibson:
Source smartphone identification using sensor pattern noise and wavelet transform. ICDP 2013: 1-6 - [i7]Julio C. Hernandez-Castro, Jeremy Rossman:
Measuring Software Diversity, with Applications to Security. CoRR abs/1310.3307 (2013) - 2012
- [j36]Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. Comput. Secur. 31(4): 557-568 (2012) - [j35]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [j34]Jorge Blasco Alís, Julio César Hernández Castro, José María de Fuentes, Benjamín Ramos:
A framework for avoiding steganography usage over HTTP. J. Netw. Comput. Appl. 35(1): 491-501 (2012) - [j33]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez:
Online Randomization Strategies to Obfuscate User Behavioral Patterns. J. Netw. Syst. Manag. 20(4): 561-578 (2012) - [j32]Pedro Peris-Lopez, Agustín Orfila, Esther Palomar, Julio C. Hernandez-Castro:
A secure distance-based RFID identification protocol with an off-line back-end database. Pers. Ubiquitous Comput. 16(3): 351-365 (2012) - [c60]Masoumeh Safkhani, Pedro Peris-Lopez, Nasour Bagheri, Majid Naderi, Julio César Hernández Castro:
On the Security of Tan et al. Serverless RFID Authentication and Search Protocols. RFIDSec 2012: 1-19 - [c59]Masoumeh Safkhani, Nasour Bagheri, Pedro Peris-Lopez, Aikaterini Mitrokotsa, Julio C. Hernandez-Castro:
Weaknesses in another Gen2-based RFID authentication protocol. RFID-TA 2012: 80-84 - [c58]Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:
Another Fallen Hash-Based RFID Authentication Protocol. WISTP 2012: 29-37 - 2011
- [j31]Emad Mabrouk, Julio César Hernández Castro, Masao Fukushima:
Prime number generation using memetic programming. Artif. Life Robotics 16(1): 53-56 (2011) - [j30]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [j29]Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe:
Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3): 833-845 (2011) - [c57]Julio César Hernández Castro, Pedro Peris-Lopez, Jean-Philippe Aumasson:
On the Key Schedule Strength of PRESENT. DPM/SETOP 2011: 253-263 - [c56]Honorio Martín, Enrique San Millán, Luis Entrena, Julio César Hernández Castro, Pedro Peris-Lopez:
AKARI-X: A pseudorandom number generator for secure lightweight systems. IOLTS 2011: 228-233 - [c55]Mohamad Merhi, Julio César Hernández Castro, Pedro Peris-Lopez:
Studying the pseudo random number generator of a low-cost RFID tag. RFID-TA 2011: 381-385 - [c54]Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro:
On the Strength of Egglue and Other Logic CAPTCHAs. SECRYPT 2011: 157-167 - [i6]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - [i5]Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:
Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. IACR Cryptol. ePrint Arch. 2011: 331 (2011) - 2010
- [j28]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j27]Aikaterini Mitrokotsa, Christos Dimitrakakis, Pedro Peris-Lopez, Julio César Hernández Castro:
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Commun. Lett. 14(2): 121-123 (2010) - [j26]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Trans. Inf. Syst. 93-D(3): 518-527 (2010) - [j25]Julio C. Hernandez-Castro, Juan E. Tapiador, Esther Palomar, Angel Romero-Gonzalex:
Blind Steganalysis of Mp3stego. J. Inf. Sci. Eng. 26(5): 1787-1799 (2010) - [c53]Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Inscrypt 2010: 427-442 - [c52]David Robert White, Juan E. Tapiador, Julio César Hernández Castro, John A. Clark:
Fine-Grained Timing Using Genetic Programming. EuroGP 2010: 325-336 - [c51]Carlos Javier Hernández-Castro, Jonathan D. Stainton-Ellis, Arturo Ribagorda, Julio César Hernández Castro:
Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal. INC 2010: 159-168 - [c50]Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010: 22-34 - [c49]Elena Castro Galán, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda:
A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs. Web Intelligence 2010: 682-685
2000 – 2009
- 2009
- [j24]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Comput. Commun. 32(7-10): 1185-1193 (2009) - [j23]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j22]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j21]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c48]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c47]Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c46]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. SEC 2009: 132-142 - [c45]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [i4]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i3]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2008
- [j20]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. Comput. Commun. 31(2): 266-279 (2008) - [j19]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008) - [j18]