default search action
Search dblp for Publications
export results for "Julio C. Hernandez-Castro"
@article{DBLP:journals/ijisec/PatsakisPAH24, author = {Constantinos Patsakis and Eugenia A. Politou and Efthimios Alepis and Julio C. Hernandez{-}Castro}, title = {Cashing out crypto: state of practice in ransom payments}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {2}, pages = {699--712}, year = {2024} }
@article{DBLP:journals/tim/RodriguezQuinonezTFSMSCR24, author = {Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Wendy Flores{-}Fuentes and Oleg Sergiyenko and Jes{\'{u}}s El{\'{\i}}as Miranda{-}Vega and Jonathan J. Sanchez{-}Castro and Moises J. Castro{-}Toscano and Oscar Real{-}Moreno}, title = {Anthropometric Stereo Vision System for Measuring Foot Arches Angles in Three Dimensions}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {73}, pages = {1--11}, year = {2024} }
@inproceedings{DBLP:conf/eicc/OzkokBCAH24, author = {Meryem Berfin Ozkok and Baturay Birinci and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs}, booktitle = {{EICC}}, pages = {128--135}, publisher = {{ACM}}, year = {2024} }
@inproceedings{DBLP:conf/eicc/WangAH24, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Analysis of Security Mechanisms of Dark Web Markets}, booktitle = {{EICC}}, pages = {120--127}, publisher = {{ACM}}, year = {2024} }
@inproceedings{DBLP:conf/isie/Ortiz-Villasenor24, author = {Dayanna Ortiz{-}Villase{\~{n}}or and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Jonathan J. Sanchez{-}Castro}, title = {Measurement of Plantar Pressures through {FSR} Sensors and Spatial Resolution through Interpolation}, booktitle = {{ISIE}}, pages = {1--4}, publisher = {{IEEE}}, year = {2024} }
@article{DBLP:journals/amc/LuengoOGC23, author = {Elena Almaraz Luengo and Bittor Ala{\~{n}}a Olivares and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Further analysis of the statistical independence of the {NIST} {SP} 800-22 randomness tests}, journal = {Appl. Math. Comput.}, volume = {459}, pages = {128222}, year = {2023} }
@inproceedings{DBLP:conf/IEEEares/Bhudia0CHH23, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators}, booktitle = {{ARES}}, pages = {105:1--105:11}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/eicc/OzturkECAH23, author = {Omer Said Ozturk and Emre Ekmekcioglu and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {New Tricks to Old Codes: Can {AI} Chatbots Replace Static Code Analysis Tools?}, booktitle = {{EICC}}, pages = {13--18}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/eusflat/GutierrezSCHGE23, author = {Inmaculada Guti{\'{e}}rrez and Daniel Santos and Javier Castro and Julio Alberto Hern{\'{a}}ndez{-}Gonzalo and Daniel G{\'{o}}mez and Rosa Esp{\'{\i}}nola}, title = {Machine Learning and Fuzzy Measures: {A} Real Approach to Individual Classification}, booktitle = {{EUSFLAT/AGOP}}, series = {Lecture Notes in Computer Science}, volume = {14069}, pages = {137--148}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/icissp/BellizziVCH23, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications}, booktitle = {{ICISSP}}, pages = {389--401}, publisher = {SciTePress}, year = {2023} }
@inproceedings{DBLP:conf/icissp/WangAH23, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Dark Ending: What Happens when a Dark Web Market Closes down}, booktitle = {{ICISSP}}, pages = {106--117}, publisher = {SciTePress}, year = {2023} }
@article{DBLP:journals/corr/abs-2308-00590, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators}, journal = {CoRR}, volume = {abs/2308.00590}, year = {2023} }
@article{DBLP:journals/access/BellizziVCC22, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps}, journal = {{IEEE} Access}, volume = {10}, pages = {35172--35218}, year = {2022} }
@article{DBLP:journals/amc/LuengoCGH22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {A new approach to analyze the independence of statistical tests of randomness}, journal = {Appl. Math. Comput.}, volume = {426}, pages = {127116}, year = {2022} }
@article{DBLP:journals/entropy/LuengoCGHH22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {Critical Analysis of Hypothesis Tests in Federal Information Processing Standard {(140-2)}}, journal = {Entropy}, volume = {24}, number = {5}, pages = {613}, year = {2022} }
@article{DBLP:journals/istr/LuengoCGHC22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Darren Hurley{-}Smith and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Sensitivity and uniformity in statistical randomness tests}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103322}, year = {2022} }
@article{DBLP:journals/tifs/Hurley-SmithPH22, author = {Darren Hurley{-}Smith and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {On the Unbearable Lightness of {FIPS} 140-2 Randomness Tests}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3946--3958}, year = {2022} }
@inproceedings{DBLP:conf/coins/BhudiaCCHH22, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism}, booktitle = {{COINS}}, pages = {1--6}, publisher = {{IEEE}}, year = {2022} }
@inproceedings{DBLP:conf/deepbdb/Bhudia0CHH22, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {Identifying Incentives for Extortion in Proof of Stake Consensus Protocols}, booktitle = {{DBB}}, series = {Lecture Notes in Networks and Systems}, volume = {541}, pages = {109--118}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/iecon/Real-MorenoRSFC22, author = {Oscar Real{-}Moreno and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Oleg Sergiyenko and Wendy Flores{-}Fuentes and Moises J. Castro{-}Toscano and Jes{\'{u}}s El{\'{\i}}as Miranda{-}Vega and Paolo Mercorelli and Jorge Alejandro Valdez{-}Rodr{\'{\i}}guez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Jonathan J. Sanchez{-}Castro}, title = {A Quadrant Approach of Camera Calibration Method for Depth Estimation Using a Stereo Vision System}, booktitle = {{IECON}}, pages = {1--6}, publisher = {{IEEE}}, year = {2022} }
@incollection{DBLP:series/lncs/MariotJBH22, author = {Luca Mariot and Domagoj Jakobovic and Thomas B{\"{a}}ck and Julio C. Hernandez{-}Castro}, title = {Artificial Intelligence for the Design of Symmetric Cryptographic Primitives}, booktitle = {Security and Artificial Intelligence}, pages = {3--24}, year = {2022} }
@article{DBLP:journals/corr/abs-2209-04173, author = {I{\~{n}}igo L{\'{o}}pez{-}Riob{\'{o}}o Botana and Carlos Eiras{-}Franco and Julio Hernandez{-}Castro and Amparo Alonso{-}Betanzos}, title = {Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces}, journal = {CoRR}, volume = {abs/2209.04173}, year = {2022} }
@article{DBLP:journals/access/HernandezCM21, author = {Julio Noe Hernandez and Heidy Marisol Mar{\'{\i}}n Castro and Miguel Morales{-}Sandoval}, title = {WebQuIn-LD: {A} Method of Integrating Web Query Interfaces Based on Linked Data}, journal = {{IEEE} Access}, volume = {9}, pages = {115664--115675}, year = {2021} }
@article{DBLP:journals/access/LeguesseCVH21, author = {Yonas Leguesse and Christian Colombo and Mark Vella and Julio C. Hernandez{-}Castro}, title = {PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone}, journal = {{IEEE} Access}, volume = {9}, pages = {168600--168612}, year = {2021} }
@article{DBLP:journals/compsec/FilizACH21, author = {Burak Filiz and Budi Arief and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {On the Effectiveness of Ransomware Decryption Tools}, journal = {Comput. Secur.}, volume = {111}, pages = {102469}, year = {2021} }
@article{DBLP:journals/istr/YilmazCAH21, author = {Yagiz Yilmaz and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Investigating the impact of ransomware splash screens}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102934}, year = {2021} }
@article{DBLP:journals/jnca/CasinoLHPH21, author = {Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103135}, year = {2021} }
@inproceedings{DBLP:conf/ecrime/WangAC21, author = {Yichao Wang and Budi Arief and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets}, booktitle = {eCrime}, pages = {1--13}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/i2mtc/Hernandez-Perez21, author = {Julio Noel Hernandez{-}Perez and Jose de Jesus Rangel{-}Magdaleno and Ricardo Jimenez and Mario Moreno and Alfonso Torres and Arturo Ponce and Daniel Ferrusca and Jorge Castro{-}Ramos}, title = {An Automated {V-I} Acquisition System for Microbolometer Array with FPGA-based Drive}, booktitle = {{I2MTC}}, pages = {1--6}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/nordsec/BrierleyABH21, author = {Calvin Brierley and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, title = {Industrialising Blackmail: Privacy Invasion Based IoT Ransomware}, booktitle = {NordSec}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {72--92}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/secrypt/BellizziV0H21, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics {(JIT-MF)} for Android}, booktitle = {{SECRYPT}}, pages = {356--369}, publisher = {{SCITEPRESS}}, year = {2021} }
@incollection{DBLP:books/sp/21/Hurley-SmithH21, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {165--181}, publisher = {Springer International Publishing}, year = {2021} }
@article{DBLP:journals/corr/abs-2105-05510, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics {(JIT-MF)} for Android}, journal = {CoRR}, volume = {abs/2105.05510}, year = {2021} }
@article{DBLP:journals/sensors/JimenezMTMPFRCH20, author = {Ricardo Jimenez and Mario Moreno and Alfonso Torres and Alfredo Morales and Arturo Ponce and Daniel Ferrusca and Jose de Jesus Rangel{-}Magdaleno and Jorge Castro{-}Ramos and Julio Noel Hernandez{-}Perez and Eduardo Cano}, title = {Fabrication of Microbolometer Arrays Based on Polymorphous Silicon-Germanium}, journal = {Sensors}, volume = {20}, number = {9}, pages = {2716}, year = {2020} }
@article{DBLP:journals/tissec/Hurley-SmithH20, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {16:1--16:25}, year = {2020} }
@inproceedings{DBLP:conf/IEEEares/BrierleyPABH20, author = {Calvin Brierley and Jamie Pont and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, title = {PaperW8: an IoT bricking ransomware proof of concept}, booktitle = {{ARES}}, pages = {82:1--82:10}, publisher = {{ACM}}, year = {2020} }
@inproceedings{DBLP:conf/cisim/Jimenez-BarrosR20, author = {Miguel Angel Jimenez{-}Barros and Diana Gineth Ram{\'{\i}}rez R{\'{\i}}os and Carlos Julio Ardila Hernandez and Lauren Julieth Castro Bola{\~{n}}o and Dionicio Neira{-}Rodado}, title = {Design of a Decision Support System for Multiobjective Activity Planning and Programming Using Global Bacteria Optimization}, booktitle = {{CISIM}}, series = {Lecture Notes in Computer Science}, volume = {12133}, pages = {158--171}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/evoW/KnezevicPJH20, author = {Karlo Knezevic and Stjepan Picek and Domagoj Jakobovic and Julio C. Hernandez{-}Castro}, title = {What Is Your {MOVE:} Modeling Adversarial Network Environments}, booktitle = {EvoApplications}, series = {Lecture Notes in Computer Science}, volume = {12104}, pages = {260--275}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {{ICISSP}}, pages = {448--456}, publisher = {{SCITEPRESS}}, year = {2020} }
@inproceedings{DBLP:conf/isie/Sanchez-CastroR20, author = {Jonathan J. Sanchez{-}Castro and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Luis R. Ram{\'{\i}}rez{-}Hern{\'{a}}ndez and Guillermo Galaviz and Daniel Hern{\'{a}}ndez{-}Balbuena and Gabriel Trujillo{-}Hern{\'{a}}ndez and Wendy Flores{-}Fuentes and Paolo Mercorelli and Wilmar Hern{\'{a}}ndez{-}Perdomo and Oleg Sergiyenko and F{\'{e}}lix Fernando Gonz{\'{a}}lez{-}Navarro}, title = {A Lean Convolutional Neural Network for Vehicle Classification}, booktitle = {{ISIE}}, pages = {1365--1369}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/isw/PontAH20, author = {Jamie Pont and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Why Current Statistical Approaches to Ransomware Detection Fail}, booktitle = {{ISC}}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {199--216}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/nordsec/BellizziVCH20, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation}, booktitle = {NordSec}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {20--36}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/nordsec/BrierleyPABH20, author = {Calvin Brierley and Jamie Pont and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, title = {Persistence in Linux-Based IoT Malware}, booktitle = {NordSec}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {3--19}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/stm/LeguesseVCH20, author = {Yonas Leguesse and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Reducing the Forensic Footprint with Android Accessibility Attacks}, booktitle = {{STM}}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {22--38}, publisher = {Springer}, year = {2020} }
@article{DBLP:journals/corr/abs-2008-02507, author = {Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains}, journal = {CoRR}, volume = {abs/2008.02507}, year = {2020} }
@article{DBLP:journals/cybersecurity/CartwrightHC19, author = {Edward J. Cartwright and Julio C. Hernandez{-}Castro and Anna Cartwright}, title = {To pay or not: game theoretic models of ransomware}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz009}, year = {2019} }
@article{DBLP:journals/nar/Santos-Zavaleta19, author = {Alberto Santos{-}Zavaleta and Heladia Salgado and Socorro Gama{-}Castro and Mishael S{\'{a}}nchez{-}P{\'{e}}rez and Laura G{\'{o}}mez{-}Romero and Daniela Ledezma{-}Tejeida and Jair Santiago Garc{\'{\i}}a{-}Sotelo and Kevin Alquicira{-}Hern{\'{a}}ndez and Luis Mu{\~{n}}iz{-}Rascado and Pablo Pe{\~{n}}a{-}Loredo and Cecilia Ishida{-}Guti{\'{e}}rrez and David A. Vel{\'{a}}zquez{-}Ram{\'{\i}}rez and Victor del Moral{-}Ch{\'{a}}vez and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Carlos{-}Francisco M{\'{e}}ndez{-}Cruz and James E. Galagan and Julio Collado{-}Vides}, title = {RegulonDB v 10.5: tackling challenges to unify classic and high throughput knowledge of gene regulation in E. coli {K-12}}, journal = {Nucleic Acids Res.}, volume = {47}, number = {Database-Issue}, pages = {D212--D220}, year = {2019} }
@inproceedings{DBLP:conf/iecon/Trujillo-Hernandez19, author = {Gabriel Trujillo{-}Hern{\'{a}}ndez and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Luis R. Ram{\'{\i}}rez{-}Hern{\'{a}}ndez and Moises J. Castro{-}Toscano and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Oleg Sergiyenko and Lars Lindner and Paolo Mercorelli}, title = {Accuracy Improvement by Artificial Neural Networks in Technical Vision System}, booktitle = {{IECON}}, pages = {5572--5577}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/nordsec/PontOBAH19, author = {Jamie Pont and Osama Abu Oun and Calvin Brierley and Budi Arief and Julio C. Hernandez{-}Castro}, title = {A Roadmap for Improving the Impact of Anti-ransomware Research}, booktitle = {NordSec}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {137--154}, publisher = {Springer}, year = {2019} }
@article{DBLP:journals/access/MartinCC18, author = {Alejandro Mart{\'{\i}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and David Camacho}, title = {An in-Depth Study of the Jisut Family of Android Ransomware}, journal = {{IEEE} Access}, volume = {6}, pages = {57205--57218}, year = {2018} }
@article{DBLP:journals/di/SloanH18, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Dismantling OpenPuff {PDF} steganography}, journal = {Digit. Investig.}, volume = {25}, pages = {90--96}, year = {2018} }
@article{DBLP:journals/sensors/FernandezOGH18, author = {Edgar Gonz{\'{a}}lez Fern{\'{a}}ndez and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Digital Image Tamper Detection Technique Based on Spectrum Analysis of {CFA} Artifacts}, journal = {Sensors}, volume = {18}, number = {9}, pages = {2804}, year = {2018} }
@article{DBLP:journals/sensors/VegaOGH18, author = {Esteban Alejandro Armas Vega and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Digital Images Authentication Technique Based on DWT, {DCT} and Local Binary Patterns}, journal = {Sensors}, volume = {18}, number = {10}, pages = {3372}, year = {2018} }
@article{DBLP:journals/tifs/Hurley-SmithH18, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Certifiably Biased: An In-Depth Analysis of a Common Criteria {EAL4+} Certified {TRNG}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1031--1041}, year = {2018} }
@inproceedings{DBLP:conf/ewsn/McBrideAH18, author = {Jack McBride and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Security Analysis of Contiki IoT Operating System}, booktitle = {{EWSN}}, pages = {278--283}, publisher = {Junction Publishing, Canada/ {ACM}}, year = {2018} }
@inproceedings{DBLP:conf/iecon/Real-MorenoCRHF18, author = {Oscar Real{-}Moreno and Moises J. Castro{-}Toscano and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Moises Rivas{-}L{\'{o}}pez}, title = {Implementing k-Nearest Neighbor Algorithm on Scanning Aperture for Accuracy Improvement}, booktitle = {{IECON}}, pages = {3182--3186}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/secsr/Hurley-SmithH18, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Great Expectations: {A} Critique of Current Approaches to Random Number Generation Testing {\&} Certification}, booktitle = {{SSR}}, series = {Lecture Notes in Computer Science}, volume = {11322}, pages = {143--163}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/fgcs/Garcia-Villalba17, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and Julio C. Hernandez{-}Castro}, title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques}, journal = {Future Gener. Comput. Syst.}, volume = {76}, pages = {418--427}, year = {2017} }
@article{DBLP:journals/fgcs/OrgazHC17, author = {Gema Bello Orgaz and Julio C. Hernandez{-}Castro and David Camacho}, title = {Detecting discussion communities on vaccination in twitter}, journal = {Future Gener. Comput. Syst.}, volume = {66}, pages = {125--136}, year = {2017} }
@article{DBLP:journals/tifs/OsadchyHGDP17, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to {CAPTCHA} Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2640--2653}, year = {2017} }
@inproceedings{DBLP:conf/cec/Hernandez-Castro17, author = {Julio C. Hernandez{-}Castro and David F. Barrero}, title = {Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery}, booktitle = {{CEC}}, pages = {1420--1427}, publisher = {{IEEE}}, year = {2017} }
@inproceedings{DBLP:conf/cscml/OsadchyWDGHS17, author = {Margarita Osadchy and Yan Wang and Orr Dunkelman and Stuart J. Gibson and Julio C. Hernandez{-}Castro and Christopher J. Solomon}, title = {GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation}, booktitle = {{CSCML}}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {19--33}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/isie/Castro-ToscanoR17, author = {Moises J. Castro{-}Toscano and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Daniel Hern{\'{a}}ndez{-}Balbuena and Lars Lindner and Oleg Sergiyenko and Moises Rivas{-}L{\'{o}}pez and Wendy Flores{-}Fuentes}, title = {A methodological use of inertial navigation systems for strapdown navigation task}, booktitle = {{ISIE}}, pages = {1589--1595}, publisher = {{IEEE}}, year = {2017} }
@inproceedings{DBLP:conf/nordsec/BalthasarH17, author = {Thibault de Balthasar and Julio C. Hernandez{-}Castro}, title = {An Analysis of Bitcoin Laundry Services}, booktitle = {NordSec}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {297--312}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/siot/McBrideHA17, author = {Jack McBride and Julio C. Hernandez{-}Castro and Budi Arief}, title = {Earworms Make Bad Passwords: An Analysis of the Nok{\={e}} Smart Lock Manual Override}, booktitle = {SIoT}, pages = {30--39}, publisher = {{IEEE}}, year = {2017} }
@article{DBLP:journals/corr/Hernandez-Castro17a, author = {Julio C. Hernandez{-}Castro and Edward J. Cartwright and Anna Stepanova}, title = {Economic Analysis of Ransomware}, journal = {CoRR}, volume = {abs/1703.06660}, year = {2017} }
@article{DBLP:journals/computing/OrozcoCGGH16, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas Gonz{\'{a}}lez and L. Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Theia: a tool for the forensic analysis of mobile devices pictures}, journal = {Computing}, volume = {98}, number = {12}, pages = {1251--1286}, year = {2016} }
@article{DBLP:journals/csur/AvoineBHDT16, author = {Gildas Avoine and Antonin Beaujeant and Julio C. Hernandez{-}Castro and Louis Demay and Philippe Teuwen}, title = {A Survey of Security and Privacy Issues in ePassport Protocols}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {47:1--47:37}, year = {2016} }
@article{DBLP:journals/eswa/VillalbaOLC16, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Ana Lucila Sandoval Orozco and Raquel Ramos L{\'{o}}pez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Identification of smartphone brand and model via forensic video analysis}, journal = {Expert Syst. Appl.}, volume = {55}, pages = {59--69}, year = {2016} }
@article{DBLP:journals/mta/OrozcoCGC16, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Image source acquisition identification of mobile devices based on the use of features}, journal = {Multim. Tools Appl.}, volume = {75}, number = {12}, pages = {7087--7111}, year = {2016} }
@article{DBLP:journals/nar/Gama-CastroSSLM16, author = {Socorro Gama{-}Castro and Heladia Salgado and Alberto Santos{-}Zavaleta and Daniela Ledezma{-}Tejeida and Luis Mu{\~{n}}iz{-}Rascado and Jair Santiago Garc{\'{\i}}a{-}Sotelo and Kevin Alquicira{-}Hern{\'{a}}ndez and Irma Mart{\'{\i}}nez{-}Flores and Lucia Pannier and Jaime Abraham Castro{-}Mondrag{\'{o}}n and Alejandra Medina{-}Rivera and Hilda Solano{-}Lira and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Ernesto P{\'{e}}rez{-}Rueda and Shirley Alquicira{-}Hern{\'{a}}ndez and Liliana Porr{\'{o}}n{-}Sotelo and Alejandra L{\'{o}}pez{-}Fuentes and Anastasia Hern{\'{a}}ndez{-}Koutoucheva and Victor del Moral{-}Ch{\'{a}}vez and Fabio Rinaldi and Julio Collado{-}Vides}, title = {RegulonDB version 9.0: high-level integration of gene regulation, coexpression, motif clustering and beyond}, journal = {Nucleic Acids Res.}, volume = {44}, number = {Database-Issue}, pages = {133--143}, year = {2016} }
@article{DBLP:journals/tmc/AvoineCH16, author = {Gildas Avoine and Xavier Carpent and Julio C. Hernandez{-}Castro}, title = {Pitfalls in Ultralightweight Authentication Protocol Designs}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {9}, pages = {2317--2332}, year = {2016} }
@inproceedings{DBLP:conf/rfidsec/Hurley-SmithH16, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Bias in the Mifare DESFire {EV1} {TRNG}}, booktitle = {RFIDSec}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {123--133}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/iacr/OsadchyHGDe16, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to {CAPTCHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2016} }
@article{DBLP:journals/compsec/BarnesH15, author = {David J. Barnes and Julio C. Hernandez{-}Castro}, title = {On the limits of engine analysis for cheating detection in chess}, journal = {Comput. Secur.}, volume = {48}, pages = {58--73}, year = {2015} }
@article{DBLP:journals/di/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Steganalysis of OpenPuff through atomic concatenation of {MP4} flags}, journal = {Digit. Investig.}, volume = {13}, pages = {15--21}, year = {2015} }
@article{DBLP:journals/iet-cvi/OrozcoGGCHG15, author = {Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and David Manuel Arenas Gonz{\'{a}}lez and Jocelin Rosales Corripio and Julio C. Hernandez{-}Castro and Stuart James Gibson}, title = {Smartphone image acquisition forensics using sensor fingerprint}, journal = {{IET} Comput. Vis.}, volume = {9}, number = {5}, pages = {723--731}, year = {2015} }
@article{DBLP:journals/mta/OrozcoGGC15, author = {Ana Lucila Sandoval Orozco and David Manuel Arenas Gonz{\'{a}}lez and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Analysis of errors in exif metadata on mobile devices}, journal = {Multim. Tools Appl.}, volume = {74}, number = {13}, pages = {4735--4763}, year = {2015} }
@article{DBLP:journals/peerj-cs/Hernandez-Castro15, author = {Julio C. Hernandez{-}Castro and David L. Roberts}, title = {Automatic detection of potentially illegal online sales of elephant ivory via data mining}, journal = {PeerJ Comput. Sci.}, volume = {1}, pages = {e10}, year = {2015} }
@article{DBLP:journals/peerj-cs/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Forensic analysis of video steganography tools}, journal = {PeerJ Comput. Sci.}, volume = {1}, pages = {e7}, year = {2015} }
@article{DBLP:journals/peerjpre/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Forensic analysis of video steganography tools}, journal = {PeerJ Prepr.}, volume = {3}, pages = {e1019}, year = {2015} }
@article{DBLP:journals/computing/OrozcoGCGC14, author = {Ana Lucila Sandoval Orozco and David Manuel Arenas Gonz{\'{a}}lez and Jocelin Rosales Corripio and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections}, journal = {Computing}, volume = {96}, number = {9}, pages = {829--841}, year = {2014} }
@article{DBLP:journals/es/BarreroCPCR14, author = {David F. Barrero and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and David Camacho and Mar{\'{\i}}a Dolores Rodr{\'{\i}}guez{-}Moreno}, title = {A genetic tango attack against the David-Prasad {RFID} ultra-lightweight authentication protocol}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {31}, number = {1}, pages = {9--19}, year = {2014} }
@article{DBLP:journals/jcam/SafkhaniPCB14, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Nasour Bagheri}, title = {Cryptanalysis of the Cho et al. protocol: {A} hash-based {RFID} tag mutual authentication protocol}, journal = {J. Comput. Appl. Math.}, volume = {259}, pages = {571--577}, year = {2014} }
@inproceedings{DBLP:conf/idc/OrgazHC14, author = {Gema Bello Orgaz and Julio C. Hernandez{-}Castro and David Camacho}, title = {A Survey of Social Web Mining Applications for Disease Outbreak Detection}, booktitle = {{IDC}}, series = {Studies in Computational Intelligence}, volume = {570}, pages = {345--356}, publisher = {Springer}, year = {2014} }
@article{DBLP:journals/di/KhalindHA13, author = {Omed S. Khalind and Julio C. Hernandez{-}Castro and Benjamin Aziz}, title = {A study on the false positive rate of Stegdetect}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {235--245}, year = {2013} }
@article{DBLP:journals/nar/SalgadoPGSMGWSMMSAALPHBBPOLJVMHMC13, author = {Heladia Salgado and Mart{\'{\i}}n Peralta{-}Gil and Socorro Gama{-}Castro and Alberto Santos{-}Zavaleta and Luis Mu{\~{n}}iz{-}Rascado and Jair S. Garc{\'{\i}}a{-}Sotelo and Verena Weiss and Hilda Solano{-}Lira and Irma Mart{\'{\i}}nez{-}Flores and Alejandra Medina{-}Rivera and Gerardo Salgado{-}Osorio and Shirley Alquicira{-}Hern{\'{a}}ndez and Kevin Alquicira{-}Hern{\'{a}}ndez and Alejandra L{\'{o}}pez{-}Fuentes and Liliana Porr{\'{o}}n{-}Sotelo and Araceli M. Huerta and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Yalbi Itzel Balderas{-}Mart{\'{\i}}nez and Lucia Pannier and Maricela Olvera and Aurora Labastida and Ver{\'{o}}nica Jim{\'{e}}nez{-}Jacinto and Leticia Vega{-}Alvarado and Victor del Moral{-}Ch{\'{a}}vez and Alfredo Hern{\'{a}}ndez{-}Alvarez and Enrique Morett and Julio Collado{-}Vides}, title = {RegulonDB v8.0: omics data sets, evolutionary conservation, regulatory phrases, cross-validated gold standards and more}, journal = {Nucleic Acids Res.}, volume = {41}, number = {Database-Issue}, pages = {203--213}, year = {2013} }
@article{DBLP:journals/tjs/Picazo-SanchezOPC13, author = {Pablo Picazo{-}Sanchez and Lara Ortiz{-}Martin and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Cryptanalysis of the {RNTS} system}, journal = {J. Supercomput.}, volume = {65}, number = {2}, pages = {949--960}, year = {2013} }
@inproceedings{DBLP:conf/icdp/CorripioGOGHG13, author = {Jocelin Rosales Corripio and David Manuel Arenas Gonz{\'{a}}lez and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro and Stuart James Gibson}, title = {Source smartphone identification using sensor pattern noise and wavelet transform}, booktitle = {{ICDP}}, pages = {1--6}, publisher = {{IET} / {IEEE}}, year = {2013} }
@article{DBLP:journals/corr/Hernandez-CastroR13, author = {Julio C. Hernandez{-}Castro and Jeremy Rossman}, title = {Measuring Software Diversity, with Applications to Security}, journal = {CoRR}, volume = {abs/1310.3307}, year = {2013} }
@article{DBLP:journals/compsec/AlisCTR12, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan E. Tapiador and Arturo Ribagorda}, title = {Bypassing information leakage protection with trusted applications}, journal = {Comput. Secur.}, volume = {31}, number = {4}, pages = {557--568}, year = {2012} }
@article{DBLP:journals/ijfcs/CastroEPCT12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic Traceability Attack against SLMAP, an {RFID} Lightweight Authentication Protocol}, journal = {Int. J. Found. Comput. Sci.}, volume = {23}, number = {2}, pages = {543--553}, year = {2012} }
@article{DBLP:journals/jnca/AlisCFR12, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Benjam{\'{\i}}n Ramos}, title = {A framework for avoiding steganography usage over {HTTP}}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {1}, pages = {491--501}, year = {2012} }
@article{DBLP:journals/jnsm/TapiadorHP12, author = {Juan E. Tapiador and Julio C. Hernandez{-}Castro and Pedro Peris{-}Lopez}, title = {Online Randomization Strategies to Obfuscate User Behavioral Patterns}, journal = {J. Netw. Syst. Manag.}, volume = {20}, number = {4}, pages = {561--578}, year = {2012} }
@article{DBLP:journals/puc/Peris-LopezOPH12, author = {Pedro Peris{-}Lopez and Agust{\'{\i}}n Orfila and Esther Palomar and Julio C. Hernandez{-}Castro}, title = {A secure distance-based {RFID} identification protocol with an off-line back-end database}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {3}, pages = {351--365}, year = {2012} }
@inproceedings{DBLP:conf/educon/MartinLRR0C12, author = {Sergio Mart{\'{\i}}n and Emilio Julio Lorenzo and Miguel Rodr{\'{\i}}guez{-}Artacho and Salvador Ros and Roberto Hern{\'{a}}ndez and Manuel Castro}, title = {Ubiquitous anotation and a collaborative open mobile augmented reality}, booktitle = {{EDUCON}}, pages = {1--5}, publisher = {{IEEE}}, year = {2012} }
@inproceedings{DBLP:conf/rfidsec/SafkhaniPBNC12, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Nasour Bagheri and Majid Naderi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {On the Security of Tan et al. Serverless {RFID} Authentication and Search Protocols}, booktitle = {RFIDSec}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {1--19}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/rfidta/SafkhaniBPMH12, author = {Masoumeh Safkhani and Nasour Bagheri and Pedro Peris{-}Lopez and Aikaterini Mitrokotsa and Julio C. Hernandez{-}Castro}, title = {Weaknesses in another Gen2-based {RFID} authentication protocol}, booktitle = {{RFID-TA}}, pages = {80--84}, publisher = {{IEEE}}, year = {2012} }
@inproceedings{DBLP:conf/wistp/CastroPSBN12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Another Fallen Hash-Based {RFID} Authentication Protocol}, booktitle = {{WISTP}}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {29--37}, publisher = {Springer}, year = {2012} }
@article{DBLP:journals/alr/MabroukCF11, author = {Emad Mabrouk and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Masao Fukushima}, title = {Prime number generation using memetic programming}, journal = {Artif. Life Robotics}, volume = {16}, number = {1}, pages = {53--56}, year = {2011} }
@article{DBLP:journals/eaai/Peris-LopezHTL11, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Jan C. A. van der Lubbe}, title = {Cryptanalysis of an {EPC} Class-1 Generation-2 standard compliant authentication protocol}, journal = {Eng. Appl. Artif. Intell.}, volume = {24}, number = {6}, pages = {1061--1069}, year = {2011} }
@article{DBLP:journals/jnca/Peris-LopezOHL11, author = {Pedro Peris{-}Lopez and Agust{\'{\i}}n Orfila and Julio C. Hernandez{-}Castro and Jan C. A. van der Lubbe}, title = {Flaws on {RFID} grouping-proofs. Guidelines for future sound protocols}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {3}, pages = {833--845}, year = {2011} }
@article{DBLP:journals/nar/Gama-CastroSPSMSJWGLPAMMAMBMHMCTVOOGMC11, author = {Socorro Gama{-}Castro and Heladia Salgado and Mart{\'{\i}}n Peralta{-}Gil and Alberto Santos{-}Zavaleta and Luis Mu{\~{n}}iz{-}Rascado and Hilda Solano{-}Lira and Ver{\'{o}}nica Jim{\'{e}}nez{-}Jacinto and Verena Weiss and Jair S. Garc{\'{\i}}a{-}Sotelo and Alejandra L{\'{o}}pez{-}Fuentes and Liliana Porr{\'{o}}n{-}Sotelo and Shirley Alquicira{-}Hern{\'{a}}ndez and Alejandra Medina{-}Rivera and Irma Mart{\'{\i}}nez{-}Flores and Kevin Alquicira{-}Hern{\'{a}}ndez and Ruth Mart{\'{\i}}nez{-}Adame and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Juan Miranda{-}R{\'{\i}}os and Araceli M. Huerta and Alfredo Mendoza{-}Vargas and Leonardo Collado{-}Torres and Blanca Taboada and Leticia Vega{-}Alvarado and Maricela Olvera and Leticia Olvera and Ricardo Grande and Enrique Morett and Julio Collado{-}Vides}, title = {RegulonDB version 7.0: transcriptional regulation of \emph{Escherichia coli} {K-12} integrated within genetic sensory response units (Gensor Units)}, journal = {Nucleic Acids Res.}, volume = {39}, number = {Database-Issue}, pages = {98--105}, year = {2011} }
@inproceedings{DBLP:conf/esorics/CastroPA11, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Jean{-}Philippe Aumasson}, title = {On the Key Schedule Strength of {PRESENT}}, booktitle = {{DPM/SETOP}}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {253--263}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/iolts/MartinMECL11, author = {Honorio Mart{\'{\i}}n and Enrique San Mill{\'{a}}n and Luis Entrena and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez}, title = {{AKARI-X:} {A} pseudorandom number generator for secure lightweight systems}, booktitle = {{IOLTS}}, pages = {228--233}, publisher = {{IEEE} Computer Society}, year = {2011} }
@inproceedings{DBLP:conf/rfidta/MerhiCP11, author = {Mohamad Merhi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez}, title = {Studying the pseudo random number generator of a low-cost {RFID} tag}, booktitle = {{RFID-TA}}, pages = {381--385}, publisher = {{IEEE}}, year = {2011} }
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRC11, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Arturo Ribagorda and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {On the Strength of Egglue and Other Logic CAPTCHAs}, booktitle = {{SECRYPT}}, pages = {157--167}, publisher = {SciTePress}, year = {2011} }
@article{DBLP:journals/corr/abs-1111-2744, author = {Juan E. Tapiador and Julio C. Hernandez{-}Castro and Pedro Peris{-}Lopez and John A. Clark}, title = {Cryptanalysis of Song's advanced smart card based password authentication protocol}, journal = {CoRR}, volume = {abs/1111.2744}, year = {2011} }
@article{DBLP:journals/iacr/SafkhaniPCBN11, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Cho \emph{et al.}'s Protocol, {A} Hash-Based Mutual Authentication Protocol for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2011} }
@article{DBLP:journals/cn/Peris-LopezHTLL10, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Yingjiu Li}, title = {Vulnerability analysis of {RFID} protocols for tag ownership transfer}, journal = {Comput. Networks}, volume = {54}, number = {9}, pages = {1502--1508}, year = {2010} }
@article{DBLP:journals/icl/MitrokotsaDPC10, author = {Aikaterini Mitrokotsa and Christos Dimitrakakis and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {2}, pages = {121--123}, year = {2010} }
@article{DBLP:journals/ieicet/Peris-LopezLH10, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro}, title = {Lightweight Props on the Weak Security of {EPC} Class-1 Generation-2 Standard}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {518--527}, year = {2010} }
@article{DBLP:journals/jise/Hernandez-CastroTPR10, author = {Julio C. Hernandez{-}Castro and Juan E. Tapiador and Esther Palomar and Angel Romero{-}Gonzalex}, title = {Blind Steganalysis of Mp3stego}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {5}, pages = {1787--1799}, year = {2010} }
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador and Tieyan Li}, title = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication Protocol}, booktitle = {Inscrypt}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {427--442}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/eurogp/WhiteTCC10, author = {David Robert White and Juan E. Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, title = {Fine-Grained Timing Using Genetic Programming}, booktitle = {EuroGP}, series = {Lecture Notes in Computer Science}, volume = {6021}, pages = {325--336}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/inc/Hernandez-CastroSRC10, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Jonathan D. Stainton{-}Ellis and Arturo Ribagorda and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Shortcomings in {CAPTCHA} Design and Implementation: Captcha2, a Commercial Proposal}, booktitle = {{INC}}, pages = {159--168}, publisher = {University of Plymouth}, year = {2010} }
@inproceedings{DBLP:conf/rfidsec/CastroPPE10, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador}, title = {Cryptanalysis of the David-Prasad {RFID} Ultralightweight Authentication Protocol}, booktitle = {RFIDSec}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {22--34}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/webi/GalanCAR10, author = {Elena Castro Gal{\'{a}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Arturo Ribagorda}, title = {A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs}, booktitle = {Web Intelligence}, pages = {682--685}, publisher = {{IEEE} Computer Society}, year = {2010} }
@article{DBLP:journals/comcom/Peris-LopezLHT09, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro and Juan E. Tapiador}, title = {Practical attacks on a mutual authentication scheme under the {EPC} Class-1 Generation-2 standard}, journal = {Comput. Commun.}, volume = {32}, number = {7-10}, pages = {1185--1193}, year = {2009} }
@article{DBLP:journals/csi/Peris-LopezCTR09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Cryptanalysis of a novel authentication protocol conforming to {EPC-C1G2} standard}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {372--380}, year = {2009} }
@article{DBLP:journals/csi/Peris-LopezHER09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {{LAMED} - {A} {PRNG} for {EPC} Class-1 Generation-2 {RFID} specification}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {1}, pages = {88--97}, year = {2009} }
@article{DBLP:journals/jise/Peris-LopezCER09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {1}, pages = {33--57}, year = {2009} }
@inproceedings{DBLP:conf/cisc/Peris-LopezHTLL09, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Jan C. A. van der Lubbe}, title = {Weaknesses in Two Recent Lightweight {RFID} Authentication Protocols}, booktitle = {Inscrypt}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {383--392}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/ipps/Hernandez-CastroTPCT09, author = {Julio C. Hernandez{-}Castro and Juan E. Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic traceability attack against SLMAP, an {RFID} lightweight authentication protocol}, booktitle = {{IPDPS}}, pages = {1--5}, publisher = {{IEEE}}, year = {2009} }
@inproceedings{DBLP:conf/sec/AlisCERO09, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda and Miguel A. Orellana{-}Quiros}, title = {Steganalysis of Hydan}, booktitle = {{SEC}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {132--142}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/sewcn/Peris-LopezHEML09, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Enrique San Mill{\'{a}}n and Jan C. A. van der Lubbe}, title = {Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments}, booktitle = {{SEWCN}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {42}, pages = {25--35}, publisher = {Springer}, year = {2009} }
@article{DBLP:journals/corr/abs-0906-4618, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jan C. A. van der Lubbe}, title = {Shedding Some Light on {RFID} Distance Bounding Protocols and Terrorist Attacks}, journal = {CoRR}, volume = {abs/0906.4618}, year = {2009} }
@article{DBLP:journals/corr/abs-0910-2115, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jan C. A. van der Lubbe}, title = {Security Flaws in a Recent Ultralightweight {RFID} Protocol}, journal = {CoRR}, volume = {abs/0910.2115}, year = {2009} }
@article{DBLP:journals/comcom/PalomarECR08, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Secure content access and replication in pure {P2P} networks}, journal = {Comput. Commun.}, volume = {31}, number = {2}, pages = {266--279}, year = {2008} }
@article{DBLP:journals/cys/ZezzattiHGVG08, author = {Carlos Alberto Ochoa Ort{\'{\i}}z Zezzatti and Jos{\'{e}} A. Hern{\'{a}}ndez{-}Aguilar and J. Saul Gonzalez{-}Campos and Arnulfo Castro V{\'{a}}quez and Julio C{\'{e}}sar Ponce Gallegos}, title = {Evaluating the Authority in a Weblog Community}, journal = {Computaci{\'{o}}n y Sistemas}, volume = {11}, number = {4}, year = {2008} }
@article{DBLP:journals/ijisec/Estevez-TapiadorACR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Almudena Alcaide and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Bayesian rational exchange}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {85--100}, year = {2008} }
@article{DBLP:journals/ijnsec/AlcaideECR08, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Cryptanalysis of Syverson's Rational Exchange Protocol}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {2}, pages = {151--156}, year = {2008} }
@article{DBLP:journals/jise/Estevez-TapiadorCPR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Arturo Ribagorda}, title = {Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {5}, pages = {1485--1504}, year = {2008} }
@article{DBLP:journals/kes/PolimonCER08, author = {Javier Polim{\'{o}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Automated design of a lightweight block cipher with Genetic Programming}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {12}, number = {1}, pages = {3--14}, year = {2008} }
@article{DBLP:journals/tifs/Estevez-TapiadorCAR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Arturo Ribagorda}, title = {On the Distinguishability of Distance-Bounded Permutations in Ordered Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {166--172}, year = {2008} }
@inproceedings{DBLP:conf/fse/CastroEQ08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jean{-}Jacques Quisquater}, title = {On the Salsa20 Core Function}, booktitle = {{FSE}}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {462--469}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/mco/CastroTR08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol}, booktitle = {{MCO}}, series = {Communications in Computer and Information Science}, volume = {14}, pages = {589--596}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/ppsn/AlcaideECR08, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Nature-Inspired Synthesis of Rational Protocols}, booktitle = {{PPSN}}, series = {Lecture Notes in Computer Science}, volume = {5199}, pages = {981--990}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/secrypt/AlisCEG08, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, title = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text}, booktitle = {{SECRYPT}}, pages = {399--406}, publisher = {{INSTICC} Press}, year = {2008} }
@inproceedings{DBLP:conf/wisa/Peris-LopezCER08, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Advances in Ultralightweight Cryptography for Low-Cost {RFID} Tags: Gossamer Protocol}, booktitle = {{WISA}}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {56--68}, publisher = {Springer}, year = {2008} }
@article{DBLP:journals/corr/abs-0811-4257, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and Jean{-}Jacques Quisquater}, title = {Cryptanalysis of the {SASI} Ultralightweight {RFID} Authentication Protocol with Modular Rotations}, journal = {CoRR}, volume = {abs/0811.4257}, year = {2008} }
@article{DBLP:journals/corr/abs-0812-0686, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Almudena Alcaide and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Cryptanalysis of the {RSA-CEGD} protocol}, journal = {CoRR}, volume = {abs/0812.0686}, year = {2008} }
@inproceedings{DBLP:conf/cec/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, title = {Heuristic search for non-linear cryptanalytic approximations}, booktitle = {{IEEE} Congress on Evolutionary Computation}, pages = {3561--3568}, publisher = {{IEEE}}, year = {2007} }
@inproceedings{DBLP:conf/dexaw/PalomarECR07, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile {P2P} Security}, booktitle = {{DEXA} Workshops}, pages = {779--783}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/euc/Peris-LopezCER07, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {An Efficient Authentication Protocol for {RFID} Systems Resistant to Active Attacks}, booktitle = {{EUC} Workshops}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {781--794}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/iat/AlcaideECR07, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Towards Automated Design of Multi-party Rational Exchange Security Protocols}, booktitle = {Web Intelligence/IAT Workshops}, pages = {387--390}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/ima/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and John A. Clark and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes}, booktitle = {{IMACC}}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {99--117}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/otm/AlcaideECR07, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {A Multi-party Rational Exchange Protocol}, booktitle = {{OTM} Workshops {(1)}}, series = {Lecture Notes in Computer Science}, volume = {4805}, pages = {42--43}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/otm/PalomarAEC07, author = {Esther Palomar and Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Bayesian Analysis of Secure {P2P} Sharing Protocols}, booktitle = {{OTM} Conferences {(2)}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1701--1717}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/secperu/Peris-LopezHER07, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for {RFID} Tags}, booktitle = {SECPerU}, pages = {55--60}, publisher = {{IEEE} Computer Society}, year = {2007} }
@article{DBLP:journals/acj/Castro06, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Guest Editorial}, journal = {J. Res. Pract. Inf. Technol.}, volume = {38}, number = {1}, year = {2006} }
@article{DBLP:journals/compsec/Hernandez-CastroBER06, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Ignacio Blasco{-}Lopez and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, title = {Steganography in games: {A} general methodology and its application to the game of Go}, journal = {Comput. Secur.}, volume = {25}, number = {1}, pages = {64--71}, year = {2006} }
@inproceedings{DBLP:conf/cec/Hernandez-CastroEGR06, author = {Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho and Benjam{\'{\i}}n Ramos {\'{A}}lvarez}, title = {Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming}, booktitle = {{IEEE} Congress on Evolutionary Computation}, pages = {192--199}, publisher = {{IEEE}}, year = {2006} }
@inproceedings{DBLP:conf/dexaw/PalomarEHR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {A Protocol for Secure Content Distribution in Pure {P2P} Networks}, booktitle = {{DEXA} Workshops}, pages = {712--716}, publisher = {{IEEE} Computer Society}, year = {2006} }
@inproceedings{DBLP:conf/etrics/AlcaideEHR06, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information}, booktitle = {{ETRICS}}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {396--408}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/etrics/PalomarEHR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {A {P2P} Content Authentication Protocol Based on Byzantine Agreement}, booktitle = {{ETRICS}}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {60--72}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/euc/PalomarECR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Security in {P2P} Networks: Survey and Research Directions}, booktitle = {{EUC} Workshops}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {183--192}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/gecco/EstebanezCRI06, author = {C{\'{e}}sar Est{\'{e}}banez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda and Pedro Isasi}, title = {Evolving hash functions by means of genetic programming}, booktitle = {{GECCO}}, pages = {1861--1862}, publisher = {{ACM}}, year = {2006} }
@inproceedings{DBLP:conf/ifip6-8/Peris-LopezHER06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {{RFID} Systems: {A} Survey on Security Threats and Proposed Solutions}, booktitle = {{PWC}}, series = {Lecture Notes in Computer Science}, volume = {4217}, pages = {159--170}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/otm/Peris-LopezCTR06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {{EMAP:} An Efficient Mutual-Authentication Protocol for Low-Cost {RFID} Tags}, booktitle = {{OTM} Workshops {(1)}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {352--361}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/p2p/PalomarECR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Certificate-based Access Control in Pure {P2P} Networks}, booktitle = {Peer-to-Peer Computing}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2006} }
@inproceedings{DBLP:conf/ppsn/EstebanezCRV06, author = {C{\'{e}}sar Est{\'{e}}banez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda and Pedro Isasi Vi{\~{n}}uela}, title = {Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming}, booktitle = {{PPSN}}, series = {Lecture Notes in Computer Science}, volume = {4193}, pages = {818--827}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/ppsn/Lamenca-MartinezCER06, author = {Carlos Lamenca{-}Martinez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Lamar: {A} New Pseudorandom Number Generator Evolved by Means of Genetic Programming}, booktitle = {{PPSN}}, series = {Lecture Notes in Computer Science}, volume = {4193}, pages = {850--859}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/uic/Peris-LopezCER06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {M\({}^{\mbox{2}}\)AP: {A} Minimalist Mutual-Authentication Protocol for Low-Cost {RFID} Tags}, booktitle = {{UIC}}, series = {Lecture Notes in Computer Science}, volume = {4159}, pages = {912--923}, publisher = {Springer}, year = {2006} }
@article{DBLP:journals/mcs/CastroSSIR05, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Andr{\'{e}} Seznec and Antonio Izquierdo and Arturo Ribagorda}, title = {The strict avalanche criterion randomness test}, journal = {Math. Comput. Simul.}, volume = {68}, number = {1}, pages = {1--7}, year = {2005} }
@article{DBLP:journals/ngc/CastroV05, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi Vi{\~{n}}uela}, title = {Evolutionary Computation in Computer Security and Cryptography}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {193--199}, year = {2005} }
@article{DBLP:journals/ngc/CastroV05a, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi Vi{\~{n}}uela}, title = {New Results on the Genetic Cryptanalysis of {TEA} and Reduced-round Versions of {XTEA}}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {233--243}, year = {2005} }
@article{DBLP:journals/ngc/SaezVSC05, author = {Yago S{\'{a}}ez and Pedro Isasi Vi{\~{n}}uela and Javier Segovia and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Reference Chromosome to Overcome User Fatigue in {IEC}}, journal = {New Gener. Comput.}, volume = {23}, number = {2}, pages = {129--142}, year = {2005} }
@inproceedings{DBLP:conf/iccsa/ManzanaresMEC05, author = {Antonio Izquierdo Manzanares and Joaqu{\'{\i}}n Torres M{\'{a}}rquez and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Attacks on Port Knocking Authentication Mechanism}, booktitle = {{ICCSA} {(4)}}, series = {Lecture Notes in Computer Science}, volume = {3483}, pages = {1292--1300}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/iccsa/SierraHPM05, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Ponce and Jaime Manera}, title = {Marketing on Internet Communications Security for Online Bank Transactions}, booktitle = {{ICCSA} {(4)}}, series = {Lecture Notes in Computer Science}, volume = {3483}, pages = {1301--1308}, publisher = {Springer}, year = {2005} }
@proceedings{DBLP:conf/sis/2005, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, publisher = {{INSTICC} Press}, year = {2005} }
@article{DBLP:journals/ci/CastroI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi}, title = {Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher {TEA}}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {517--525}, year = {2004} }
@article{DBLP:journals/ci/IsasiC04, author = {Pedro Isasi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {445--449}, year = {2004} }
@article{DBLP:journals/fgcs/SierraCJR04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Narayana Jayaram and Arturo Ribagorda}, title = {Low computational cost integrity for block ciphers}, journal = {Future Gener. Comput. Syst.}, volume = {20}, number = {5}, pages = {857--863}, year = {2004} }
@article{DBLP:journals/icga/CastroBG04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Ignacio Blasco{-}Lopez and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Hiding Data in Games}, journal = {J. Int. Comput. Games Assoc.}, volume = {27}, number = {2}, pages = {96--101}, year = {2004} }
@article{DBLP:journals/isjgp/CastroSR04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda}, title = {Beware of the Security Software}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {12}, number = {6}, pages = {39--45}, year = {2004} }
@article{DBLP:journals/isjgp/MunozCCG04, author = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jes{\'{u}}s Carretero and F{\'{e}}lix Garc{\'{\i}}a}, title = {Filtering Spam at E-Mail Server Level with Improved {CRM114}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {48--55}, year = {2004} }
@inproceedings{DBLP:conf/cec/CastroI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi}, title = {New results on the genetic cryptanalysis of {TEA} and reduced-round versions of {XTEA}}, booktitle = {{IEEE} Congress on Evolutionary Computation}, pages = {2124--2129}, publisher = {{IEEE}}, year = {2004} }
@inproceedings{DBLP:conf/cec/HernandezSI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Andr{\'{e}} Seznec and Pedro Isasi}, title = {On the design of state-of-the-art pseudorandom number generators by means of genetic programming}, booktitle = {{IEEE} Congress on Evolutionary Computation}, pages = {1510--1516}, publisher = {{IEEE}}, year = {2004} }
@inproceedings{DBLP:conf/iccsa/HernandezSS04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Andr{\'{e}} Seznec}, title = {The {SAC} Test: {A} New Randomness Test, with Some Applications to {PRNG} Analysis}, booktitle = {{ICCSA} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {960--967}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/iccsa/IzquierdoSHR04, author = {Antonio Izquierdo and Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Security Issues in Network File Systems}, booktitle = {{ICCSA} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {812--820}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/iccsa/SierraHAT04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Joaqu{\'{\i}}n Torres M{\'{a}}rquez}, title = {Validating the Use of {BAN} {LOGIC}}, booktitle = {{ICCSA} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {851--858}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/ppsn/Arco-CalderonVC04, author = {Crist{\'{o}}bal Luque del Arco{-}Calder{\'{o}}n and Pedro Isasi Vi{\~{n}}uela and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Forecasting Time Series by Means of Evolutionary Algorithms}, booktitle = {{PPSN}}, series = {Lecture Notes in Computer Science}, volume = {3242}, pages = {1061--1070}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/sis/MendezHCG04, author = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jes{\'{u}}s Carretero and F{\'{e}}lix Garc{\'{\i}}a}, title = {Filtering spam at e-mail server level with improved {CRM114}}, booktitle = {{WOSIS}}, pages = {207--216}, publisher = {{INSTICC} Press}, year = {2004} }
@inproceedings{DBLP:conf/sis/SierraHIR04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Antonio Izquierdo and Arturo Ribagorda}, title = {Secure Communications in Multi-Agent Systems Protecting {KQML}}, booktitle = {{WOSIS}}, pages = {305--313}, publisher = {{INSTICC} Press}, year = {2004} }
@proceedings{DBLP:conf/sis/2004, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, publisher = {{INSTICC} Press}, year = {2004} }
@inproceedings{DBLP:conf/cec/Hernandez-Castro03, author = {Julio C. Hernandez{-}Castro and Pedro Isasi}, title = {Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher {TEA}}, booktitle = {{IEEE} Congress on Evolutionary Computation}, pages = {2189--2193}, publisher = {{IEEE}}, year = {2003} }
@inproceedings{DBLP:conf/iccsa/CastroVCC03, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and L. Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra}, title = {On MARS's s-boxes Strength against Linear Cryptanalysis}, booktitle = {{ICCSA} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {2669}, pages = {79--83}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/iccsa/SierraHPR03, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Ponce and Arturo Ribagorda}, title = {Protection of Multiagent Systems}, booktitle = {{ICCSA} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {2669}, pages = {123--128}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/kes/HernandezIA03, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi and Crist{\'{o}}bal Luque del Arco{-}Calder{\'{o}}n}, title = {Finding Efficient Nonlinear Functions by Means of Genetic Programming}, booktitle = {{KES}}, series = {Lecture Notes in Computer Science}, volume = {2773}, pages = {1192--1198}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/iccS/HernandezSIR02, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Pedro Isasi and Arturo Ribagorda}, title = {Genetic Cryptoanalysis of Two Rounds {TEA}}, booktitle = {International Conference on Computational Science {(3)}}, series = {Lecture Notes in Computer Science}, volume = {2331}, pages = {1024--1031}, publisher = {Springer}, year = {2002} }
@article{DBLP:journals/computer/HernandezSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, title = {Search Engines as a Security Threat}, journal = {Computer}, volume = {34}, number = {10}, pages = {25--30}, year = {2001} }
@article{DBLP:journals/cryptologia/Hernandez-Castro01, author = {Julio C. Hernandez{-}Castro and Arturo Ribagorda and Pedro Isasi and Jos{\'{e}} M. Sierra}, title = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {213--229}, year = {2001} }
@inproceedings{DBLP:conf/ima/HernandezSRRM01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos and J. Carlos Mex{-}Perera}, title = {Distinguishing {TEA} from a Random Permutation: Reduced Round Versions of {TEA} Do Not Have the {SAC} or Do Not Generate Random Numbers}, booktitle = {{IMACC}}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {374--377}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/isw/SanchezOHS01, author = {David S{\'{a}}nchez and Agust{\'{\i}}n Orfila and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra}, title = {Robust New Method in Frequency Domain Watermarking}, booktitle = {{ISC}}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {166--182}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/webnet/HernandezCSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Mar{\'{\i}}a Cebri{\'{a}}n and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, title = {Project WebOracle: Developing an advanced web server security assesment tool}, booktitle = {WebNet}, pages = {526--529}, publisher = {{AACE}}, year = {2001} }
@inproceedings{DBLP:conf/webnet/HernandezSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, title = {Search Engines as a security thread}, booktitle = {WebNet}, pages = {530--533}, publisher = {{AACE}}, year = {2001} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.