![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "Julio C. Hernandez-Castro"
@article{DBLP:journals/ijisec/PatsakisPAH24, author = {Constantinos Patsakis and Eugenia A. Politou and Efthimios Alepis and Julio C. Hernandez{-}Castro}, title = {Cashing out crypto: state of practice in ransom payments}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {2}, pages = {699--712}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00766-z}, doi = {10.1007/S10207-023-00766-Z}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PatsakisPAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/RodriguezQuinonezTFSMSCR24, author = {Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Wendy Flores{-}Fuentes and Oleg Sergiyenko and Jes{\'{u}}s El{\'{\i}}as Miranda{-}Vega and Jonathan J. Sanchez{-}Castro and Moises J. Castro{-}Toscano and Oscar Real{-}Moreno}, title = {Anthropometric Stereo Vision System for Measuring Foot Arches Angles in Three Dimensions}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {73}, pages = {1--11}, year = {2024}, url = {https://doi.org/10.1109/TIM.2023.3334341}, doi = {10.1109/TIM.2023.3334341}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tim/RodriguezQuinonezTFSMSCR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/OzkokBCAH24, author = {Meryem Berfin Ozkok and Baturay Birinci and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Shujun Li and Kovila P. L. Coopamootoo and Michael Sirivianos}, title = {Honeypot's Best Friend? Investigating ChatGPT's Ability to Evaluate Honeypot Logs}, booktitle = {European Interdisciplinary Cybersecurity Conference, {EICC} 2024, Xanthi, Greece, June 5-6, 2024}, pages = {128--135}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3655693.3655716}, doi = {10.1145/3655693.3655716}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/OzkokBCAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/WangAH24, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Shujun Li and Kovila P. L. Coopamootoo and Michael Sirivianos}, title = {Analysis of Security Mechanisms of Dark Web Markets}, booktitle = {European Interdisciplinary Cybersecurity Conference, {EICC} 2024, Xanthi, Greece, June 5-6, 2024}, pages = {120--127}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3655693.3655700}, doi = {10.1145/3655693.3655700}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/WangAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/Ortiz-Villasenor24, author = {Dayanna Ortiz{-}Villase{\~{n}}or and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Jonathan J. Sanchez{-}Castro}, title = {Measurement of Plantar Pressures through {FSR} Sensors and Spatial Resolution through Interpolation}, booktitle = {33rd {IEEE} International Symposium on Industrial Electronics, {ISIE} 2024, Ulsan, Republic of Korea, June 18-21, 2024}, pages = {1--4}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ISIE54533.2024.10595719}, doi = {10.1109/ISIE54533.2024.10595719}, timestamp = {Fri, 02 Aug 2024 11:15:06 +0200}, biburl = {https://dblp.org/rec/conf/isie/Ortiz-Villasenor24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LuengoOGC23, author = {Elena Almaraz Luengo and Bittor Ala{\~{n}}a Olivares and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Further analysis of the statistical independence of the {NIST} {SP} 800-22 randomness tests}, journal = {Appl. Math. Comput.}, volume = {459}, pages = {128222}, year = {2023}, url = {https://doi.org/10.1016/j.amc.2023.128222}, doi = {10.1016/J.AMC.2023.128222}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/LuengoOGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bhudia0CHH23, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {105:1--105:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3604985}, doi = {10.1145/3600160.3604985}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Bhudia0CHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/OzturkECAH23, author = {Omer Said Ozturk and Emre Ekmekcioglu and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Aleksandra Mileva and Steffen Wendzel and Virginia N. L. Franqueira}, title = {New Tricks to Old Codes: Can {AI} Chatbots Replace Static Code Analysis Tools?}, booktitle = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, pages = {13--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590777.3590780}, doi = {10.1145/3590777.3590780}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eicc/OzturkECAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusflat/GutierrezSCHGE23, author = {Inmaculada Guti{\'{e}}rrez and Daniel Santos and Javier Castro and Julio Alberto Hern{\'{a}}ndez{-}Gonzalo and Daniel G{\'{o}}mez and Rosa Esp{\'{\i}}nola}, editor = {Sebastia Massanet and Susana Montes and Daniel Ruiz{-}Aguilera and Manuel Gonz{\'{a}}lez Hidalgo}, title = {Machine Learning and Fuzzy Measures: {A} Real Approach to Individual Classification}, booktitle = {Fuzzy Logic and Technology, and Aggregation Operators - 13th Conference of the European Society for Fuzzy Logic and Technology, {EUSFLAT} 2023, and 12th International Summer School on Aggregation Operators, {AGOP} 2023, Palma de Mallorca, Spain, September 4-8, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14069}, pages = {137--148}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39965-7\_12}, doi = {10.1007/978-3-031-39965-7\_12}, timestamp = {Thu, 27 Jun 2024 20:49:01 +0200}, biburl = {https://dblp.org/rec/conf/eusflat/GutierrezSCHGE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BellizziVCH23, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {389--401}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011634700003405}, doi = {10.5220/0011634700003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BellizziVCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/WangAH23, author = {Yichao Wang and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Dark Ending: What Happens when a Dark Web Market Closes down}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {106--117}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011681600003405}, doi = {10.5220/0011681600003405}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/WangAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-00590, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators}, journal = {CoRR}, volume = {abs/2308.00590}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00590}, doi = {10.48550/ARXIV.2308.00590}, eprinttype = {arXiv}, eprint = {2308.00590}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00590.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BellizziVCC22, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps}, journal = {{IEEE} Access}, volume = {10}, pages = {35172--35218}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3160531}, doi = {10.1109/ACCESS.2022.3160531}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BellizziVCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LuengoCGH22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {A new approach to analyze the independence of statistical tests of randomness}, journal = {Appl. Math. Comput.}, volume = {426}, pages = {127116}, year = {2022}, url = {https://doi.org/10.1016/j.amc.2022.127116}, doi = {10.1016/J.AMC.2022.127116}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/LuengoCGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LuengoCGHH22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {Critical Analysis of Hypothesis Tests in Federal Information Processing Standard {(140-2)}}, journal = {Entropy}, volume = {24}, number = {5}, pages = {613}, year = {2022}, url = {https://doi.org/10.3390/e24050613}, doi = {10.3390/E24050613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/LuengoCGHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuengoCGHC22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Darren Hurley{-}Smith and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Sensitivity and uniformity in statistical randomness tests}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103322}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103322}, doi = {10.1016/J.JISA.2022.103322}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LuengoCGHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hurley-SmithPH22, author = {Darren Hurley{-}Smith and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {On the Unbearable Lightness of {FIPS} 140-2 Randomness Tests}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3946--3958}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2020.2988505}, doi = {10.1109/TIFS.2020.2988505}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Hurley-SmithPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coins/BhudiaCCHH22, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism}, booktitle = {{IEEE} International Conference on Omni-layer Intelligent Systems, {COINS} 2022, Barcelona, Spain, August 1-3, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COINS54846.2022.9854946}, doi = {10.1109/COINS54846.2022.9854946}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coins/BhudiaCCHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deepbdb/Bhudia0CHH22, author = {Alpesh Bhudia and Anna Cartwright and Edward J. Cartwright and Julio C. Hernandez{-}Castro and Darren Hurley{-}Smith}, editor = {Irfan Awan and Muhammad Younas and Jamal Bentahar and Salima Benbernou}, title = {Identifying Incentives for Extortion in Proof of Stake Consensus Protocols}, booktitle = {The International Conference on Deep Learning, Big Data and Blockchain {(DBB} 2022), Rome, Italy, 22-24 August 2022}, series = {Lecture Notes in Networks and Systems}, volume = {541}, pages = {109--118}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16035-6\_9}, doi = {10.1007/978-3-031-16035-6\_9}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/deepbdb/Bhudia0CHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/Real-MorenoRSFC22, author = {Oscar Real{-}Moreno and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Oleg Sergiyenko and Wendy Flores{-}Fuentes and Moises J. Castro{-}Toscano and Jes{\'{u}}s El{\'{\i}}as Miranda{-}Vega and Paolo Mercorelli and Jorge Alejandro Valdez{-}Rodr{\'{\i}}guez and Gabriel Trujillo{-}Hern{\'{a}}ndez and Jonathan J. Sanchez{-}Castro}, title = {A Quadrant Approach of Camera Calibration Method for Depth Estimation Using a Stereo Vision System}, booktitle = {{IECON} 2022 - 48th Annual Conference of the {IEEE} Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IECON49645.2022.9968346}, doi = {10.1109/IECON49645.2022.9968346}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/Real-MorenoRSFC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MariotJBH22, author = {Luca Mariot and Domagoj Jakobovic and Thomas B{\"{a}}ck and Julio C. Hernandez{-}Castro}, title = {Artificial Intelligence for the Design of Symmetric Cryptographic Primitives}, booktitle = {Security and Artificial Intelligence}, pages = {3--24}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_1}, doi = {10.1007/978-3-030-98795-4\_1}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MariotJBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-04173, author = {I{\~{n}}igo L{\'{o}}pez{-}Riob{\'{o}}o Botana and Carlos Eiras{-}Franco and Julio Hernandez{-}Castro and Amparo Alonso{-}Betanzos}, title = {Explanation Method for Anomaly Detection on Mixed Numerical and Categorical Spaces}, journal = {CoRR}, volume = {abs/2209.04173}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.04173}, doi = {10.48550/ARXIV.2209.04173}, eprinttype = {arXiv}, eprint = {2209.04173}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-04173.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HernandezCM21, author = {Julio Noe Hernandez and Heidy Marisol Mar{\'{\i}}n Castro and Miguel Morales{-}Sandoval}, title = {WebQuIn-LD: {A} Method of Integrating Web Query Interfaces Based on Linked Data}, journal = {{IEEE} Access}, volume = {9}, pages = {115664--115675}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3104524}, doi = {10.1109/ACCESS.2021.3104524}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HernandezCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeguesseCVH21, author = {Yonas Leguesse and Christian Colombo and Mark Vella and Julio C. Hernandez{-}Castro}, title = {PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone}, journal = {{IEEE} Access}, volume = {9}, pages = {168600--168612}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3137360}, doi = {10.1109/ACCESS.2021.3137360}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LeguesseCVH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FilizACH21, author = {Burak Filiz and Budi Arief and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {On the Effectiveness of Ransomware Decryption Tools}, journal = {Comput. Secur.}, volume = {111}, pages = {102469}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102469}, doi = {10.1016/J.COSE.2021.102469}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FilizACH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YilmazCAH21, author = {Yagiz Yilmaz and Or{\c{c}}un {\c{C}}etin and Budi Arief and Julio C. Hernandez{-}Castro}, title = {Investigating the impact of ransomware splash screens}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102934}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102934}, doi = {10.1016/J.JISA.2021.102934}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YilmazCAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CasinoLHPH21, author = {Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains}, journal = {J. Netw. Comput. Appl.}, volume = {190}, pages = {103135}, year = {2021}, url = {https://doi.org/10.1016/j.jnca.2021.103135}, doi = {10.1016/J.JNCA.2021.103135}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/CasinoLHPH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/WangAC21, author = {Yichao Wang and Budi Arief and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2021, Boston, MA, USA, December 1-3, 2021}, pages = {1--13}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/eCrime54498.2021.9738745}, doi = {10.1109/ECRIME54498.2021.9738745}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/WangAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i2mtc/Hernandez-Perez21, author = {Julio Noel Hernandez{-}Perez and Jose de Jesus Rangel{-}Magdaleno and Ricardo Jimenez and Mario Moreno and Alfonso Torres and Arturo Ponce and Daniel Ferrusca and Jorge Castro{-}Ramos}, title = {An Automated {V-I} Acquisition System for Microbolometer Array with FPGA-based Drive}, booktitle = {{IEEE} International Instrumentation and Measurement Technology Conference, {I2MTC} 2021, Glasgow, United Kingdom, May 17-20, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/I2MTC50364.2021.9459964}, doi = {10.1109/I2MTC50364.2021.9459964}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/i2mtc/Hernandez-Perez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BrierleyABH21, author = {Calvin Brierley and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, editor = {Nicola Tuveri and Antonis Michalas and Billy Bob Brumley}, title = {Industrialising Blackmail: Privacy Invasion Based IoT Ransomware}, booktitle = {Secure {IT} Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13115}, pages = {72--92}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91625-1\_5}, doi = {10.1007/978-3-030-91625-1\_5}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BrierleyABH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BellizziV0H21, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics {(JIT-MF)} for Android}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {356--369}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010603603560369}, doi = {10.5220/0010603603560369}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BellizziV0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/Hurley-SmithH21, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {165--181}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_10}, doi = {10.1007/978-3-030-10591-4\_10}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/21/Hurley-SmithH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05510, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, title = {Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics {(JIT-MF)} for Android}, journal = {CoRR}, volume = {abs/2105.05510}, year = {2021}, url = {https://arxiv.org/abs/2105.05510}, eprinttype = {arXiv}, eprint = {2105.05510}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/JimenezMTMPFRCH20, author = {Ricardo Jimenez and Mario Moreno and Alfonso Torres and Alfredo Morales and Arturo Ponce and Daniel Ferrusca and Jose de Jesus Rangel{-}Magdaleno and Jorge Castro{-}Ramos and Julio Noel Hernandez{-}Perez and Eduardo Cano}, title = {Fabrication of Microbolometer Arrays Based on Polymorphous Silicon-Germanium}, journal = {Sensors}, volume = {20}, number = {9}, pages = {2716}, year = {2020}, url = {https://doi.org/10.3390/s20092716}, doi = {10.3390/S20092716}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/JimenezMTMPFRCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Hurley-SmithH20, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {3}, pages = {16:1--16:25}, year = {2020}, url = {https://doi.org/10.1145/3398726}, doi = {10.1145/3398726}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Hurley-SmithH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BrierleyPABH20, author = {Calvin Brierley and Jamie Pont and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {PaperW8: an IoT bricking ransomware proof of concept}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {82:1--82:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407044}, doi = {10.1145/3407023.3407044}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BrierleyPABH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/Jimenez-BarrosR20, author = {Miguel Angel Jimenez{-}Barros and Diana Gineth Ram{\'{\i}}rez R{\'{\i}}os and Carlos Julio Ardila Hernandez and Lauren Julieth Castro Bola{\~{n}}o and Dionicio Neira{-}Rodado}, editor = {Khalid Saeed and Jir{\'{\i}} Dvorsk{\'{y}}}, title = {Design of a Decision Support System for Multiobjective Activity Planning and Programming Using Global Bacteria Optimization}, booktitle = {Computer Information Systems and Industrial Management - 19th International Conference, {CISIM} 2020, Bialystok, Poland, October 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12133}, pages = {158--171}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-47679-3\_14}, doi = {10.1007/978-3-030-47679-3\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisim/Jimenez-BarrosR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoW/KnezevicPJH20, author = {Karlo Knezevic and Stjepan Picek and Domagoj Jakobovic and Julio C. Hernandez{-}Castro}, editor = {Pedro A. Castillo and Juan Luis Jim{\'{e}}nez Laredo and Francisco Fern{\'{a}}ndez de Vega}, title = {What Is Your {MOVE:} Modeling Adversarial Network Environments}, booktitle = {Applications of Evolutionary Computation - 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Seville, Spain, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12104}, pages = {260--275}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-43722-0\_17}, doi = {10.1007/978-3-030-43722-0\_17}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/evoW/KnezevicPJH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/AriefPCH20, author = {Budi Arief and Andy Periam and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Using Eyetracker to Find Ways to Mitigate Ransomware}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {448--456}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008956004480456}, doi = {10.5220/0008956004480456}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/AriefPCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/Sanchez-CastroR20, author = {Jonathan J. Sanchez{-}Castro and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Luis R. Ram{\'{\i}}rez{-}Hern{\'{a}}ndez and Guillermo Galaviz and Daniel Hern{\'{a}}ndez{-}Balbuena and Gabriel Trujillo{-}Hern{\'{a}}ndez and Wendy Flores{-}Fuentes and Paolo Mercorelli and Wilmar Hern{\'{a}}ndez{-}Perdomo and Oleg Sergiyenko and F{\'{e}}lix Fernando Gonz{\'{a}}lez{-}Navarro}, title = {A Lean Convolutional Neural Network for Vehicle Classification}, booktitle = {29th {IEEE} International Symposium on Industrial Electronics, {ISIE} 2020, Delft, The Netherlands, June 17-19, 2020}, pages = {1365--1369}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIE45063.2020.9152274}, doi = {10.1109/ISIE45063.2020.9152274}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isie/Sanchez-CastroR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/PontAH20, author = {Jamie Pont and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {Why Current Statistical Approaches to Ransomware Detection Fail}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {199--216}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_12}, doi = {10.1007/978-3-030-62974-8\_12}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/PontAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BellizziVCH20, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {20--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_2}, doi = {10.1007/978-3-030-70852-8\_2}, timestamp = {Sun, 23 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BellizziVCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BrierleyPABH20, author = {Calvin Brierley and Jamie Pont and Budi Arief and David J. Barnes and Julio C. Hernandez{-}Castro}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Persistence in Linux-Based IoT Malware}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {3--19}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_1}, doi = {10.1007/978-3-030-70852-8\_1}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/BrierleyPABH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LeguesseVCH20, author = {Yonas Leguesse and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Reducing the Forensic Footprint with Android Accessibility Attacks}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {22--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_2}, doi = {10.1007/978-3-030-59817-4\_2}, timestamp = {Sun, 23 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/LeguesseVCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-02507, author = {Fran Casino and Nikolaos Lykousas and Ivan Homoliak and Constantinos Patsakis and Julio C. Hernandez{-}Castro}, title = {Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains}, journal = {CoRR}, volume = {abs/2008.02507}, year = {2020}, url = {https://arxiv.org/abs/2008.02507}, eprinttype = {arXiv}, eprint = {2008.02507}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-02507.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CartwrightHC19, author = {Edward J. Cartwright and Julio C. Hernandez{-}Castro and Anna Cartwright}, title = {To pay or not: game theoretic models of ransomware}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz009}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz009}, doi = {10.1093/CYBSEC/TYZ009}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/CartwrightHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/Santos-Zavaleta19, author = {Alberto Santos{-}Zavaleta and Heladia Salgado and Socorro Gama{-}Castro and Mishael S{\'{a}}nchez{-}P{\'{e}}rez and Laura G{\'{o}}mez{-}Romero and Daniela Ledezma{-}Tejeida and Jair Santiago Garc{\'{\i}}a{-}Sotelo and Kevin Alquicira{-}Hern{\'{a}}ndez and Luis Mu{\~{n}}iz{-}Rascado and Pablo Pe{\~{n}}a{-}Loredo and Cecilia Ishida{-}Guti{\'{e}}rrez and David A. Vel{\'{a}}zquez{-}Ram{\'{\i}}rez and Victor del Moral{-}Ch{\'{a}}vez and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Carlos{-}Francisco M{\'{e}}ndez{-}Cruz and James E. Galagan and Julio Collado{-}Vides}, title = {RegulonDB v 10.5: tackling challenges to unify classic and high throughput knowledge of gene regulation in E. coli {K-12}}, journal = {Nucleic Acids Res.}, volume = {47}, number = {Database-Issue}, pages = {D212--D220}, year = {2019}, url = {https://doi.org/10.1093/nar/gky1077}, doi = {10.1093/NAR/GKY1077}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/Santos-Zavaleta19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/Trujillo-Hernandez19, author = {Gabriel Trujillo{-}Hern{\'{a}}ndez and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Luis R. Ram{\'{\i}}rez{-}Hern{\'{a}}ndez and Moises J. Castro{-}Toscano and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Oleg Sergiyenko and Lars Lindner and Paolo Mercorelli}, title = {Accuracy Improvement by Artificial Neural Networks in Technical Vision System}, booktitle = {{IECON} 2019 - 45th Annual Conference of the {IEEE} Industrial Electronics Society, Lisbon, Portugal, October 14-17, 2019}, pages = {5572--5577}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IECON.2019.8927596}, doi = {10.1109/IECON.2019.8927596}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/Trujillo-Hernandez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/PontOBAH19, author = {Jamie Pont and Osama Abu Oun and Calvin Brierley and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Aslan Askarov and Ren{\'{e}} Rydhof Hansen and Willard Rafnsson}, title = {A Roadmap for Improving the Impact of Anti-ransomware Research}, booktitle = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11875}, pages = {137--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35055-0\_9}, doi = {10.1007/978-3-030-35055-0\_9}, timestamp = {Tue, 21 Mar 2023 20:59:10 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/PontOBAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MartinCC18, author = {Alejandro Mart{\'{\i}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and David Camacho}, title = {An in-Depth Study of the Jisut Family of Android Ransomware}, journal = {{IEEE} Access}, volume = {6}, pages = {57205--57218}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2873583}, doi = {10.1109/ACCESS.2018.2873583}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MartinCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SloanH18, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Dismantling OpenPuff {PDF} steganography}, journal = {Digit. Investig.}, volume = {25}, pages = {90--96}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.03.003}, doi = {10.1016/J.DIIN.2018.03.003}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SloanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FernandezOGH18, author = {Edgar Gonz{\'{a}}lez Fern{\'{a}}ndez and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Digital Image Tamper Detection Technique Based on Spectrum Analysis of {CFA} Artifacts}, journal = {Sensors}, volume = {18}, number = {9}, pages = {2804}, year = {2018}, url = {https://doi.org/10.3390/s18092804}, doi = {10.3390/S18092804}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FernandezOGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/VegaOGH18, author = {Esteban Alejandro Armas Vega and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Digital Images Authentication Technique Based on DWT, {DCT} and Local Binary Patterns}, journal = {Sensors}, volume = {18}, number = {10}, pages = {3372}, year = {2018}, url = {https://doi.org/10.3390/s18103372}, doi = {10.3390/S18103372}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/VegaOGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Hurley-SmithH18, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, title = {Certifiably Biased: An In-Depth Analysis of a Common Criteria {EAL4+} Certified {TRNG}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {1031--1041}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2777342}, doi = {10.1109/TIFS.2017.2777342}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Hurley-SmithH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/McBrideAH18, author = {Jack McBride and Budi Arief and Julio C. Hernandez{-}Castro}, editor = {Domenico Giustiniano and Dimitrios Koutsonikolas and Albert Banchs and Enzo Mingozzi and Kaushik Roy Chowdhury}, title = {Security Analysis of Contiki IoT Operating System}, booktitle = {Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, {EWSN} 2018. Madrid, Spain, February 14-16, 2018}, pages = {278--283}, publisher = {Junction Publishing, Canada/ {ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3234913}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewsn/McBrideAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/Real-MorenoCRHF18, author = {Oscar Real{-}Moreno and Moises J. Castro{-}Toscano and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Daniel Hern{\'{a}}ndez{-}Balbuena and Wendy Flores{-}Fuentes and Moises Rivas{-}L{\'{o}}pez}, title = {Implementing k-Nearest Neighbor Algorithm on Scanning Aperture for Accuracy Improvement}, booktitle = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018}, pages = {3182--3186}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IECON.2018.8592804}, doi = {10.1109/IECON.2018.8592804}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/Real-MorenoCRHF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/Hurley-SmithH18, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, editor = {Cas Cremers and Anja Lehmann}, title = {Great Expectations: {A} Critique of Current Approaches to Random Number Generation Testing {\&} Certification}, booktitle = {Security Standardisation Research - 4th International Conference, {SSR} 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11322}, pages = {143--163}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04762-7\_8}, doi = {10.1007/978-3-030-04762-7\_8}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/Hurley-SmithH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Garcia-Villalba17, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and Julio C. Hernandez{-}Castro}, title = {A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques}, journal = {Future Gener. Comput. Syst.}, volume = {76}, pages = {418--427}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.11.007}, doi = {10.1016/J.FUTURE.2016.11.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Garcia-Villalba17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/OrgazHC17, author = {Gema Bello Orgaz and Julio C. Hernandez{-}Castro and David Camacho}, title = {Detecting discussion communities on vaccination in twitter}, journal = {Future Gener. Comput. Syst.}, volume = {66}, pages = {125--136}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.06.032}, doi = {10.1016/J.FUTURE.2016.06.032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/OrgazHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OsadchyHGDP17, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to {CAPTCHA} Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2640--2653}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718479}, doi = {10.1109/TIFS.2017.2718479}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OsadchyHGDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Hernandez-Castro17, author = {Julio C. Hernandez{-}Castro and David F. Barrero}, title = {Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery}, booktitle = {2017 {IEEE} Congress on Evolutionary Computation, {CEC} 2017, Donostia, San Sebasti{\'{a}}n, Spain, June 5-8, 2017}, pages = {1420--1427}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CEC.2017.7969470}, doi = {10.1109/CEC.2017.7969470}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cec/Hernandez-Castro17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/OsadchyWDGHS17, author = {Margarita Osadchy and Yan Wang and Orr Dunkelman and Stuart J. Gibson and Julio C. Hernandez{-}Castro and Christopher J. Solomon}, editor = {Shlomi Dolev and Sachin Lodha}, title = {GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {19--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_2}, doi = {10.1007/978-3-319-60080-2\_2}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/OsadchyWDGHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/Castro-ToscanoR17, author = {Moises J. Castro{-}Toscano and Julio C. Rodr{\'{\i}}guez{-}Qui{\~{n}}onez and Daniel Hern{\'{a}}ndez{-}Balbuena and Lars Lindner and Oleg Sergiyenko and Moises Rivas{-}L{\'{o}}pez and Wendy Flores{-}Fuentes}, title = {A methodological use of inertial navigation systems for strapdown navigation task}, booktitle = {26th {IEEE} International Symposium on Industrial Electronics, {ISIE} 2017, Edinburgh, United Kingdom, June 19-21, 2017}, pages = {1589--1595}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISIE.2017.8001484}, doi = {10.1109/ISIE.2017.8001484}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isie/Castro-ToscanoR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/BalthasarH17, author = {Thibault de Balthasar and Julio C. Hernandez{-}Castro}, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {An Analysis of Bitcoin Laundry Services}, booktitle = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, pages = {297--312}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2\_18}, doi = {10.1007/978-3-319-70290-2\_18}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/BalthasarH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siot/McBrideHA17, author = {Jack McBride and Julio C. Hernandez{-}Castro and Budi Arief}, title = {Earworms Make Bad Passwords: An Analysis of the Nok{\={e}} Smart Lock Manual Override}, booktitle = {2017 International Workshop on Secure Internet of Things, SIoT 2017, Oslo, Norway, September 15, 2017}, pages = {30--39}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SIoT.2017.00009}, doi = {10.1109/SIOT.2017.00009}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/siot/McBrideHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Hernandez-Castro17a, author = {Julio C. Hernandez{-}Castro and Edward J. Cartwright and Anna Stepanova}, title = {Economic Analysis of Ransomware}, journal = {CoRR}, volume = {abs/1703.06660}, year = {2017}, url = {http://arxiv.org/abs/1703.06660}, eprinttype = {arXiv}, eprint = {1703.06660}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Hernandez-Castro17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/OrozcoCGGH16, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and David Manuel Arenas Gonz{\'{a}}lez and L. Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro}, title = {Theia: a tool for the forensic analysis of mobile devices pictures}, journal = {Computing}, volume = {98}, number = {12}, pages = {1251--1286}, year = {2016}, url = {https://doi.org/10.1007/s00607-015-0482-5}, doi = {10.1007/S00607-015-0482-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/OrozcoCGGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AvoineBHDT16, author = {Gildas Avoine and Antonin Beaujeant and Julio C. Hernandez{-}Castro and Louis Demay and Philippe Teuwen}, title = {A Survey of Security and Privacy Issues in ePassport Protocols}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {3}, pages = {47:1--47:37}, year = {2016}, url = {https://doi.org/10.1145/2825026}, doi = {10.1145/2825026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AvoineBHDT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/VillalbaOLC16, author = {Luis Javier Garc{\'{\i}}a{-}Villalba and Ana Lucila Sandoval Orozco and Raquel Ramos L{\'{o}}pez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Identification of smartphone brand and model via forensic video analysis}, journal = {Expert Syst. Appl.}, volume = {55}, pages = {59--69}, year = {2016}, url = {https://doi.org/10.1016/j.eswa.2016.01.025}, doi = {10.1016/J.ESWA.2016.01.025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/VillalbaOLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/OrozcoCGC16, author = {Ana Lucila Sandoval Orozco and Jocelin Rosales Corripio and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Image source acquisition identification of mobile devices based on the use of features}, journal = {Multim. Tools Appl.}, volume = {75}, number = {12}, pages = {7087--7111}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2633-2}, doi = {10.1007/S11042-015-2633-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/OrozcoCGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/Gama-CastroSSLM16, author = {Socorro Gama{-}Castro and Heladia Salgado and Alberto Santos{-}Zavaleta and Daniela Ledezma{-}Tejeida and Luis Mu{\~{n}}iz{-}Rascado and Jair Santiago Garc{\'{\i}}a{-}Sotelo and Kevin Alquicira{-}Hern{\'{a}}ndez and Irma Mart{\'{\i}}nez{-}Flores and Lucia Pannier and Jaime Abraham Castro{-}Mondrag{\'{o}}n and Alejandra Medina{-}Rivera and Hilda Solano{-}Lira and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Ernesto P{\'{e}}rez{-}Rueda and Shirley Alquicira{-}Hern{\'{a}}ndez and Liliana Porr{\'{o}}n{-}Sotelo and Alejandra L{\'{o}}pez{-}Fuentes and Anastasia Hern{\'{a}}ndez{-}Koutoucheva and Victor del Moral{-}Ch{\'{a}}vez and Fabio Rinaldi and Julio Collado{-}Vides}, title = {RegulonDB version 9.0: high-level integration of gene regulation, coexpression, motif clustering and beyond}, journal = {Nucleic Acids Res.}, volume = {44}, number = {Database-Issue}, pages = {133--143}, year = {2016}, url = {https://doi.org/10.1093/nar/gkv1156}, doi = {10.1093/NAR/GKV1156}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/Gama-CastroSSLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AvoineCH16, author = {Gildas Avoine and Xavier Carpent and Julio C. Hernandez{-}Castro}, title = {Pitfalls in Ultralightweight Authentication Protocol Designs}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {9}, pages = {2317--2332}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2492553}, doi = {10.1109/TMC.2015.2492553}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/AvoineCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/Hurley-SmithH16, author = {Darren Hurley{-}Smith and Julio C. Hernandez{-}Castro}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Bias in the Mifare DESFire {EV1} {TRNG}}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {123--133}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_9}, doi = {10.1007/978-3-319-62024-4\_9}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/Hurley-SmithH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OsadchyHGDe16, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to {CAPTCHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2016}, url = {http://eprint.iacr.org/2016/336}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OsadchyHGDe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarnesH15, author = {David J. Barnes and Julio C. Hernandez{-}Castro}, title = {On the limits of engine analysis for cheating detection in chess}, journal = {Comput. Secur.}, volume = {48}, pages = {58--73}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.002}, doi = {10.1016/J.COSE.2014.10.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarnesH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Steganalysis of OpenPuff through atomic concatenation of {MP4} flags}, journal = {Digit. Investig.}, volume = {13}, pages = {15--21}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.02.002}, doi = {10.1016/J.DIIN.2015.02.002}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SloanH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cvi/OrozcoGGCHG15, author = {Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and David Manuel Arenas Gonz{\'{a}}lez and Jocelin Rosales Corripio and Julio C. Hernandez{-}Castro and Stuart James Gibson}, title = {Smartphone image acquisition forensics using sensor fingerprint}, journal = {{IET} Comput. Vis.}, volume = {9}, number = {5}, pages = {723--731}, year = {2015}, url = {https://doi.org/10.1049/iet-cvi.2014.0243}, doi = {10.1049/IET-CVI.2014.0243}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cvi/OrozcoGGCHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/OrozcoGGC15, author = {Ana Lucila Sandoval Orozco and David Manuel Arenas Gonz{\'{a}}lez and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Analysis of errors in exif metadata on mobile devices}, journal = {Multim. Tools Appl.}, volume = {74}, number = {13}, pages = {4735--4763}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1837-6}, doi = {10.1007/S11042-013-1837-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/OrozcoGGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/Hernandez-Castro15, author = {Julio C. Hernandez{-}Castro and David L. Roberts}, title = {Automatic detection of potentially illegal online sales of elephant ivory via data mining}, journal = {PeerJ Comput. Sci.}, volume = {1}, pages = {e10}, year = {2015}, url = {https://doi.org/10.7717/peerj-cs.10}, doi = {10.7717/PEERJ-CS.10}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/Hernandez-Castro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Forensic analysis of video steganography tools}, journal = {PeerJ Comput. Sci.}, volume = {1}, pages = {e7}, year = {2015}, url = {https://doi.org/10.7717/peerj-cs.7}, doi = {10.7717/PEERJ-CS.7}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/SloanH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerjpre/SloanH15, author = {Thomas Sloan and Julio C. Hernandez{-}Castro}, title = {Forensic analysis of video steganography tools}, journal = {PeerJ Prepr.}, volume = {3}, pages = {e1019}, year = {2015}, url = {https://doi.org/10.7287/peerj.preprints.1019v2}, doi = {10.7287/PEERJ.PREPRINTS.1019V2}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerjpre/SloanH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/OrozcoGCGC14, author = {Ana Lucila Sandoval Orozco and David Manuel Arenas Gonz{\'{a}}lez and Jocelin Rosales Corripio and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections}, journal = {Computing}, volume = {96}, number = {9}, pages = {829--841}, year = {2014}, url = {https://doi.org/10.1007/s00607-013-0313-5}, doi = {10.1007/S00607-013-0313-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/OrozcoGCGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/BarreroCPCR14, author = {David F. Barrero and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and David Camacho and Mar{\'{\i}}a Dolores Rodr{\'{\i}}guez{-}Moreno}, title = {A genetic tango attack against the David-Prasad {RFID} ultra-lightweight authentication protocol}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {31}, number = {1}, pages = {9--19}, year = {2014}, url = {https://doi.org/10.1111/j.1468-0394.2012.00652.x}, doi = {10.1111/J.1468-0394.2012.00652.X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/BarreroCPCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/SafkhaniPCB14, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Nasour Bagheri}, title = {Cryptanalysis of the Cho et al. protocol: {A} hash-based {RFID} tag mutual authentication protocol}, journal = {J. Comput. Appl. Math.}, volume = {259}, pages = {571--577}, year = {2014}, url = {https://doi.org/10.1016/j.cam.2013.09.073}, doi = {10.1016/J.CAM.2013.09.073}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcam/SafkhaniPCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/OrgazHC14, author = {Gema Bello Orgaz and Julio C. Hernandez{-}Castro and David Camacho}, editor = {David Camacho and Lars Braubach and Salvatore Venticinque and Costin Badica}, title = {A Survey of Social Web Mining Applications for Disease Outbreak Detection}, booktitle = {Intelligent Distributed Computing {VIII} - Proceedings of the 8th International Symposium on Intelligent Distributed Computing, {IDC} 2014, Madrid, Spain, September 3-5, 2014}, series = {Studies in Computational Intelligence}, volume = {570}, pages = {345--356}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10422-5\_36}, doi = {10.1007/978-3-319-10422-5\_36}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/OrgazHC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/KhalindHA13, author = {Omed S. Khalind and Julio C. Hernandez{-}Castro and Benjamin Aziz}, title = {A study on the false positive rate of Stegdetect}, journal = {Digit. Investig.}, volume = {9}, number = {3-4}, pages = {235--245}, year = {2013}, url = {https://doi.org/10.1016/j.diin.2013.01.004}, doi = {10.1016/J.DIIN.2013.01.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/KhalindHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/SalgadoPGSMGWSMMSAALPHBBPOLJVMHMC13, author = {Heladia Salgado and Mart{\'{\i}}n Peralta{-}Gil and Socorro Gama{-}Castro and Alberto Santos{-}Zavaleta and Luis Mu{\~{n}}iz{-}Rascado and Jair S. Garc{\'{\i}}a{-}Sotelo and Verena Weiss and Hilda Solano{-}Lira and Irma Mart{\'{\i}}nez{-}Flores and Alejandra Medina{-}Rivera and Gerardo Salgado{-}Osorio and Shirley Alquicira{-}Hern{\'{a}}ndez and Kevin Alquicira{-}Hern{\'{a}}ndez and Alejandra L{\'{o}}pez{-}Fuentes and Liliana Porr{\'{o}}n{-}Sotelo and Araceli M. Huerta and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Yalbi Itzel Balderas{-}Mart{\'{\i}}nez and Lucia Pannier and Maricela Olvera and Aurora Labastida and Ver{\'{o}}nica Jim{\'{e}}nez{-}Jacinto and Leticia Vega{-}Alvarado and Victor del Moral{-}Ch{\'{a}}vez and Alfredo Hern{\'{a}}ndez{-}Alvarez and Enrique Morett and Julio Collado{-}Vides}, title = {RegulonDB v8.0: omics data sets, evolutionary conservation, regulatory phrases, cross-validated gold standards and more}, journal = {Nucleic Acids Res.}, volume = {41}, number = {Database-Issue}, pages = {203--213}, year = {2013}, url = {https://doi.org/10.1093/nar/gks1201}, doi = {10.1093/NAR/GKS1201}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/SalgadoPGSMGWSMMSAALPHBBPOLJVMHMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/Picazo-SanchezOPC13, author = {Pablo Picazo{-}Sanchez and Lara Ortiz{-}Martin and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Cryptanalysis of the {RNTS} system}, journal = {J. Supercomput.}, volume = {65}, number = {2}, pages = {949--960}, year = {2013}, url = {https://doi.org/10.1007/s11227-013-0873-3}, doi = {10.1007/S11227-013-0873-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/Picazo-SanchezOPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdp/CorripioGOGHG13, author = {Jocelin Rosales Corripio and David Manuel Arenas Gonz{\'{a}}lez and Ana Lucila Sandoval Orozco and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio C. Hernandez{-}Castro and Stuart James Gibson}, title = {Source smartphone identification using sensor pattern noise and wavelet transform}, booktitle = {5th International Conference on Imaging for Crime Detection and Prevention, {ICDP} 2013, London, UK, 16-17 December 2013}, pages = {1--6}, publisher = {{IET} / {IEEE}}, year = {2013}, url = {https://doi.org/10.1049/ic.2013.0267}, doi = {10.1049/IC.2013.0267}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdp/CorripioGOGHG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Hernandez-CastroR13, author = {Julio C. Hernandez{-}Castro and Jeremy Rossman}, title = {Measuring Software Diversity, with Applications to Security}, journal = {CoRR}, volume = {abs/1310.3307}, year = {2013}, url = {http://arxiv.org/abs/1310.3307}, eprinttype = {arXiv}, eprint = {1310.3307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Hernandez-CastroR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlisCTR12, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan E. Tapiador and Arturo Ribagorda}, title = {Bypassing information leakage protection with trusted applications}, journal = {Comput. Secur.}, volume = {31}, number = {4}, pages = {557--568}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.01.008}, doi = {10.1016/J.COSE.2012.01.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlisCTR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/CastroEPCT12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic Traceability Attack against SLMAP, an {RFID} Lightweight Authentication Protocol}, journal = {Int. J. Found. Comput. Sci.}, volume = {23}, number = {2}, pages = {543--553}, year = {2012}, url = {https://doi.org/10.1142/S0129054112400278}, doi = {10.1142/S0129054112400278}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/CastroEPCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AlisCFR12, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Benjam{\'{\i}}n Ramos}, title = {A framework for avoiding steganography usage over {HTTP}}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {1}, pages = {491--501}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.10.003}, doi = {10.1016/J.JNCA.2011.10.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AlisCFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/TapiadorHP12, author = {Juan E. Tapiador and Julio C. Hernandez{-}Castro and Pedro Peris{-}Lopez}, title = {Online Randomization Strategies to Obfuscate User Behavioral Patterns}, journal = {J. Netw. Syst. Manag.}, volume = {20}, number = {4}, pages = {561--578}, year = {2012}, url = {https://doi.org/10.1007/s10922-012-9246-0}, doi = {10.1007/S10922-012-9246-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/TapiadorHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/Peris-LopezOPH12, author = {Pedro Peris{-}Lopez and Agust{\'{\i}}n Orfila and Esther Palomar and Julio C. Hernandez{-}Castro}, title = {A secure distance-based {RFID} identification protocol with an off-line back-end database}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {3}, pages = {351--365}, year = {2012}, url = {https://doi.org/10.1007/s00779-011-0396-y}, doi = {10.1007/S00779-011-0396-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/Peris-LopezOPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/educon/MartinLRR0C12, author = {Sergio Mart{\'{\i}}n and Emilio Julio Lorenzo and Miguel Rodr{\'{\i}}guez{-}Artacho and Salvador Ros and Roberto Hern{\'{a}}ndez and Manuel Castro}, title = {Ubiquitous anotation and a collaborative open mobile augmented reality}, booktitle = {Proceedings of the {IEEE} Global Engineering Education Conference, {EDUCON} 2012, Marrakech, Morocco, April 17-20, 2012}, pages = {1--5}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/EDUCON.2012.6201201}, doi = {10.1109/EDUCON.2012.6201201}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/educon/MartinLRR0C12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/SafkhaniPBNC12, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Nasour Bagheri and Majid Naderi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {On the Security of Tan et al. Serverless {RFID} Authentication and Search Protocols}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {1--19}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_1}, doi = {10.1007/978-3-642-36140-1\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/SafkhaniPBNC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidta/SafkhaniBPMH12, author = {Masoumeh Safkhani and Nasour Bagheri and Pedro Peris{-}Lopez and Aikaterini Mitrokotsa and Julio C. Hernandez{-}Castro}, title = {Weaknesses in another Gen2-based {RFID} authentication protocol}, booktitle = {2012 {IEEE} International Conference on RFID-Technologies and Applications, {RFID-TA} 2012, Nice, France, November 5-7, 2012}, pages = {80--84}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RFID-TA.2012.6404572}, doi = {10.1109/RFID-TA.2012.6404572}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidta/SafkhaniBPMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/CastroPSBN12, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Another Fallen Hash-Based {RFID} Authentication Protocol}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {29--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_4}, doi = {10.1007/978-3-642-30955-7\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/CastroPSBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/alr/MabroukCF11, author = {Emad Mabrouk and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Masao Fukushima}, title = {Prime number generation using memetic programming}, journal = {Artif. Life Robotics}, volume = {16}, number = {1}, pages = {53--56}, year = {2011}, url = {https://doi.org/10.1007/s10015-011-0890-3}, doi = {10.1007/S10015-011-0890-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/alr/MabroukCF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/Peris-LopezHTL11, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Jan C. A. van der Lubbe}, title = {Cryptanalysis of an {EPC} Class-1 Generation-2 standard compliant authentication protocol}, journal = {Eng. Appl. Artif. Intell.}, volume = {24}, number = {6}, pages = {1061--1069}, year = {2011}, url = {https://doi.org/10.1016/j.engappai.2011.04.001}, doi = {10.1016/J.ENGAPPAI.2011.04.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/Peris-LopezHTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Peris-LopezOHL11, author = {Pedro Peris{-}Lopez and Agust{\'{\i}}n Orfila and Julio C. Hernandez{-}Castro and Jan C. A. van der Lubbe}, title = {Flaws on {RFID} grouping-proofs. Guidelines for future sound protocols}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {3}, pages = {833--845}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.04.008}, doi = {10.1016/J.JNCA.2010.04.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/Peris-LopezOHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/Gama-CastroSPSMSJWGLPAMMAMBMHMCTVOOGMC11, author = {Socorro Gama{-}Castro and Heladia Salgado and Mart{\'{\i}}n Peralta{-}Gil and Alberto Santos{-}Zavaleta and Luis Mu{\~{n}}iz{-}Rascado and Hilda Solano{-}Lira and Ver{\'{o}}nica Jim{\'{e}}nez{-}Jacinto and Verena Weiss and Jair S. Garc{\'{\i}}a{-}Sotelo and Alejandra L{\'{o}}pez{-}Fuentes and Liliana Porr{\'{o}}n{-}Sotelo and Shirley Alquicira{-}Hern{\'{a}}ndez and Alejandra Medina{-}Rivera and Irma Mart{\'{\i}}nez{-}Flores and Kevin Alquicira{-}Hern{\'{a}}ndez and Ruth Mart{\'{\i}}nez{-}Adame and C{\'{e}}sar Bonavides{-}Mart{\'{\i}}nez and Juan Miranda{-}R{\'{\i}}os and Araceli M. Huerta and Alfredo Mendoza{-}Vargas and Leonardo Collado{-}Torres and Blanca Taboada and Leticia Vega{-}Alvarado and Maricela Olvera and Leticia Olvera and Ricardo Grande and Enrique Morett and Julio Collado{-}Vides}, title = {RegulonDB version 7.0: transcriptional regulation of \emph{Escherichia coli} {K-12} integrated within genetic sensory response units (Gensor Units)}, journal = {Nucleic Acids Res.}, volume = {39}, number = {Database-Issue}, pages = {98--105}, year = {2011}, url = {https://doi.org/10.1093/nar/gkq1110}, doi = {10.1093/NAR/GKQ1110}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nar/Gama-CastroSPSMSJWGLPAMMAMBMHMCTVOOGMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CastroPA11, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Jean{-}Philippe Aumasson}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {On the Key Schedule Strength of {PRESENT}}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {253--263}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_17}, doi = {10.1007/978-3-642-28879-1\_17}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CastroPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/MartinMECL11, author = {Honorio Mart{\'{\i}}n and Enrique San Mill{\'{a}}n and Luis Entrena and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez}, title = {{AKARI-X:} {A} pseudorandom number generator for secure lightweight systems}, booktitle = {17th {IEEE} International On-Line Testing Symposium {(IOLTS} 2011), 13-15 July, 2011, Athens, Greece}, pages = {228--233}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IOLTS.2011.5994534}, doi = {10.1109/IOLTS.2011.5994534}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iolts/MartinMECL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidta/MerhiCP11, author = {Mohamad Merhi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez}, title = {Studying the pseudo random number generator of a low-cost {RFID} tag}, booktitle = {2011 {IEEE} International Conference on RFID-Technologies and Applications, {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011}, pages = {381--385}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/RFID-TA.2011.6068666}, doi = {10.1109/RFID-TA.2011.6068666}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidta/MerhiCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRC11, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Arturo Ribagorda and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {On the Strength of Egglue and Other Logic CAPTCHAs}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {157--167}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hernandez-CastroRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-2744, author = {Juan E. Tapiador and Julio C. Hernandez{-}Castro and Pedro Peris{-}Lopez and John A. Clark}, title = {Cryptanalysis of Song's advanced smart card based password authentication protocol}, journal = {CoRR}, volume = {abs/1111.2744}, year = {2011}, url = {http://arxiv.org/abs/1111.2744}, eprinttype = {arXiv}, eprint = {1111.2744}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-2744.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniPCBN11, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Cho \emph{et al.}'s Protocol, {A} Hash-Based Mutual Authentication Protocol for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2011}, url = {http://eprint.iacr.org/2011/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniPCBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Peris-LopezHTLL10, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Yingjiu Li}, title = {Vulnerability analysis of {RFID} protocols for tag ownership transfer}, journal = {Comput. Networks}, volume = {54}, number = {9}, pages = {1502--1508}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2009.11.007}, doi = {10.1016/J.COMNET.2009.11.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Peris-LopezHTLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/MitrokotsaDPC10, author = {Aikaterini Mitrokotsa and Christos Dimitrakakis and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {2}, pages = {121--123}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.02.091946}, doi = {10.1109/LCOMM.2010.02.091946}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/MitrokotsaDPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Peris-LopezLH10, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro}, title = {Lightweight Props on the Weak Security of {EPC} Class-1 Generation-2 Standard}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {518--527}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.518}, doi = {10.1587/TRANSINF.E93.D.518}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Peris-LopezLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Hernandez-CastroTPR10, author = {Julio C. Hernandez{-}Castro and Juan E. Tapiador and Esther Palomar and Angel Romero{-}Gonzalex}, title = {Blind Steganalysis of Mp3stego}, journal = {J. Inf. Sci. Eng.}, volume = {26}, number = {5}, pages = {1787--1799}, year = {2010}, url = {http://www.iis.sinica.edu.tw/page/jise/2010/201009\_14.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Hernandez-CastroTPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Peris-LopezCPEL10, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador and Tieyan Li}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Quasi-Linear Cryptanalysis of a Secure {RFID} Ultralightweight Authentication Protocol}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {427--442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_30}, doi = {10.1007/978-3-642-21518-6\_30}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Peris-LopezCPEL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurogp/WhiteTCC10, author = {David Robert White and Juan E. Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, editor = {Anna Isabel Esparcia{-}Alc{\'{a}}zar and Anik{\'{o}} Ek{\'{a}}rt and Sara Silva and Stephen Dignum and A. Sima Etaner{-}Uyar}, title = {Fine-Grained Timing Using Genetic Programming}, booktitle = {Genetic Programming, 13th European Conference, EuroGP 2010, Istanbul, Turkey, April 7-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6021}, pages = {325--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12148-7\_28}, doi = {10.1007/978-3-642-12148-7\_28}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/eurogp/WhiteTCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inc/Hernandez-CastroSRC10, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Jonathan D. Stainton{-}Ellis and Arturo Ribagorda and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Udo Bleimann and Paul Dowland and Steven Furnell and Oliver Schneider}, title = {Shortcomings in {CAPTCHA} Design and Implementation: Captcha2, a Commercial Proposal}, booktitle = {Eighth International Network Conference {(INC} 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings}, pages = {159--168}, publisher = {University of Plymouth}, year = {2010}, url = {http://www.cscan.org/?page=openaccess\&id=105}, timestamp = {Tue, 16 May 2023 22:42:08 +0200}, biburl = {https://dblp.org/rec/conf/inc/Hernandez-CastroSRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/CastroPPE10, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Raphael C.{-}W. Phan and Juan M. Est{\'{e}}vez{-}Tapiador}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Cryptanalysis of the David-Prasad {RFID} Ultralightweight Authentication Protocol}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {22--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_3}, doi = {10.1007/978-3-642-16822-2\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/CastroPPE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/GalanCAR10, author = {Elena Castro Gal{\'{a}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Arturo Ribagorda}, editor = {Jimmy Xiangji Huang and Irwin King and Vijay V. Raghavan and Stefan M. R{\"{u}}ger}, title = {A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs}, booktitle = {2010 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2010, Toronto, Canada, August 31 - September 3, 2010, Main Conference Proceedings}, pages = {682--685}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WI-IAT.2010.120}, doi = {10.1109/WI-IAT.2010.120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/GalanCAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Peris-LopezLHT09, author = {Pedro Peris{-}Lopez and Tieyan Li and Julio C. Hernandez{-}Castro and Juan E. Tapiador}, title = {Practical attacks on a mutual authentication scheme under the {EPC} Class-1 Generation-2 standard}, journal = {Comput. Commun.}, volume = {32}, number = {7-10}, pages = {1185--1193}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2009.03.010}, doi = {10.1016/J.COMCOM.2009.03.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Peris-LopezLHT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Peris-LopezCTR09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Cryptanalysis of a novel authentication protocol conforming to {EPC-C1G2} standard}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {372--380}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.05.012}, doi = {10.1016/J.CSI.2008.05.012}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Peris-LopezCTR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Peris-LopezHER09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {{LAMED} - {A} {PRNG} for {EPC} Class-1 Generation-2 {RFID} specification}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {1}, pages = {88--97}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2007.11.013}, doi = {10.1016/J.CSI.2007.11.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Peris-LopezHER09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Peris-LopezCER09, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {1}, pages = {33--57}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\_03.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Peris-LopezCER09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Peris-LopezHTLL09, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan E. Tapiador and Tieyan Li and Jan C. A. van der Lubbe}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Weaknesses in Two Recent Lightweight {RFID} Authentication Protocols}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {383--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_28}, doi = {10.1007/978-3-642-16342-5\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Peris-LopezHTLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Hernandez-CastroTPCT09, author = {Julio C. Hernandez{-}Castro and Juan E. Tapiador and Pedro Peris{-}Lopez and John A. Clark and El{-}Ghazali Talbi}, title = {Metaheuristic traceability attack against SLMAP, an {RFID} lightweight authentication protocol}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5161121}, doi = {10.1109/IPDPS.2009.5161121}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipps/Hernandez-CastroTPCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlisCERO09, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda and Miguel A. Orellana{-}Quiros}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Steganalysis of Hydan}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {132--142}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_12}, doi = {10.1007/978-3-642-01244-0\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlisCERO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sewcn/Peris-LopezHEML09, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Enrique San Mill{\'{a}}n and Jan C. A. van der Lubbe}, editor = {Qijun Gu and Wanyu Zang and Meng Yu}, title = {Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments}, booktitle = {Security in Emerging Wireless Communication and Networking Systems - First International {ICST} Workshop, {SEWCN} 2009, Athens, Greece, September 14, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {42}, pages = {25--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11526-4\_3}, doi = {10.1007/978-3-642-11526-4\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sewcn/Peris-LopezHEML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0906-4618, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jan C. A. van der Lubbe}, title = {Shedding Some Light on {RFID} Distance Bounding Protocols and Terrorist Attacks}, journal = {CoRR}, volume = {abs/0906.4618}, year = {2009}, url = {http://arxiv.org/abs/0906.4618}, eprinttype = {arXiv}, eprint = {0906.4618}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0906-4618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-2115, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jan C. A. van der Lubbe}, title = {Security Flaws in a Recent Ultralightweight {RFID} Protocol}, journal = {CoRR}, volume = {abs/0910.2115}, year = {2009}, url = {http://arxiv.org/abs/0910.2115}, eprinttype = {arXiv}, eprint = {0910.2115}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-2115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PalomarECR08, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Secure content access and replication in pure {P2P} networks}, journal = {Comput. Commun.}, volume = {31}, number = {2}, pages = {266--279}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.08.015}, doi = {10.1016/J.COMCOM.2007.08.015}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PalomarECR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cys/ZezzattiHGVG08, author = {Carlos Alberto Ochoa Ort{\'{\i}}z Zezzatti and Jos{\'{e}} A. Hern{\'{a}}ndez{-}Aguilar and J. Saul Gonzalez{-}Campos and Arnulfo Castro V{\'{a}}quez and Julio C{\'{e}}sar Ponce Gallegos}, title = {Evaluating the Authority in a Weblog Community}, journal = {Computaci{\'{o}}n y Sistemas}, volume = {11}, number = {4}, year = {2008}, url = {http://cys.cic.ipn.mx/ojs/index.php/CyS/article/view/1182}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cys/ZezzattiHGVG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Estevez-TapiadorACR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Almudena Alcaide and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Bayesian rational exchange}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {85--100}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0039-5}, doi = {10.1007/S10207-007-0039-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Estevez-TapiadorACR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AlcaideECR08, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Cryptanalysis of Syverson's Rational Exchange Protocol}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {2}, pages = {151--156}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p151-156.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AlcaideECR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Estevez-TapiadorCPR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Peris{-}Lopez and Arturo Ribagorda}, title = {Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {5}, pages = {1485--1504}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200809\_13.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Estevez-TapiadorCPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kes/PolimonCER08, author = {Javier Polim{\'{o}}n and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, title = {Automated design of a lightweight block cipher with Genetic Programming}, journal = {Int. J. Knowl. Based Intell. Eng. Syst.}, volume = {12}, number = {1}, pages = {3--14}, year = {2008}, url = {http://content.iospress.com/articles/international-journal-of-knowledge-based-and-intelligent-engineering-systems/kes00141}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kes/PolimonCER08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Estevez-TapiadorCAR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Arturo Ribagorda}, title = {On the Distinguishability of Distance-Bounded Permutations in Ordered Channels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {3}, number = {2}, pages = {166--172}, year = {2008}, url = {https://doi.org/10.1109/TIFS.2008.920724}, doi = {10.1109/TIFS.2008.920724}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Estevez-TapiadorCAR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CastroEQ08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg}, title = {On the Salsa20 Core Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {462--469}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_29}, doi = {10.1007/978-3-540-71039-4\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CastroEQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mco/CastroTR08, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Le Thi Hoai An and Pascal Bouvry and Pham Dinh Tao}, title = {Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol}, booktitle = {Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, {MCO} 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings}, series = {Communications in Computer and Information Science}, volume = {14}, pages = {589--596}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87477-5\_62}, doi = {10.1007/978-3-540-87477-5\_62}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mco/CastroTR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/AlcaideECR08, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {G{\"{u}}nter Rudolph and Thomas Jansen and Simon M. Lucas and Carlo Poloni and Nicola Beume}, title = {Nature-Inspired Synthesis of Rational Protocols}, booktitle = {Parallel Problem Solving from Nature - {PPSN} X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5199}, pages = {981--990}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87700-4\_97}, doi = {10.1007/978-3-540-87700-4\_97}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/AlcaideECR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlisCEG08, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {399--406}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlisCEG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Peris-LopezCER08, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Advances in Ultralightweight Cryptography for Low-Cost {RFID} Tags: Gossamer Protocol}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {56--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_5}, doi = {10.1007/978-3-642-00306-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Peris-LopezCER08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0811-4257, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Pedro Peris{-}Lopez and Jean{-}Jacques Quisquater}, title = {Cryptanalysis of the {SASI} Ultralightweight {RFID} Authentication Protocol with Modular Rotations}, journal = {CoRR}, volume = {abs/0811.4257}, year = {2008}, url = {http://arxiv.org/abs/0811.4257}, eprinttype = {arXiv}, eprint = {0811.4257}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0811-4257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0812-0686, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Almudena Alcaide and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Cryptanalysis of the {RSA-CEGD} protocol}, journal = {CoRR}, volume = {abs/0812.0686}, year = {2008}, url = {http://arxiv.org/abs/0812.0686}, eprinttype = {arXiv}, eprint = {0812.0686}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0812-0686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and John A. Clark}, title = {Heuristic search for non-linear cryptanalytic approximations}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2007, 25-28 September 2007, Singapore}, pages = {3561--3568}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CEC.2007.4424934}, doi = {10.1109/CEC.2007.4424934}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/Estevez-TapiadorCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/PalomarECR07, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile {P2P} Security}, booktitle = {18th International Workshop on Database and Expert Systems Applications {(DEXA} 2007), 3-7 September 2007, Regensburg, Germany}, pages = {779--783}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/DEXA.2007.103}, doi = {10.1109/DEXA.2007.103}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexaw/PalomarECR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/Peris-LopezCER07, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {An Efficient Authentication Protocol for {RFID} Systems Resistant to Active Attacks}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {781--794}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_71}, doi = {10.1007/978-3-540-77090-9\_71}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/Peris-LopezCER07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/AlcaideECR07, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Towards Automated Design of Multi-party Rational Exchange Security Protocols}, booktitle = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}}, pages = {387--390}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WIIATW.2007.4427613}, doi = {10.1109/WIIATW.2007.4427613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iat/AlcaideECR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Estevez-TapiadorCC07, author = {Juan M. Est{\'{e}}vez{-}Tapiador and John A. Clark and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Steven D. Galbraith}, title = {Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {99--117}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_7}, doi = {10.1007/978-3-540-77272-9\_7}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Estevez-TapiadorCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/AlcaideECR07, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {A Multi-party Rational Exchange Protocol}, booktitle = {On the Move to Meaningful Internet Systems 2007: {OTM} 2007 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, {OTM} Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and {SWWS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4805}, pages = {42--43}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76888-3\_21}, doi = {10.1007/978-3-540-76888-3\_21}, timestamp = {Thu, 14 Oct 2021 10:28:28 +0200}, biburl = {https://dblp.org/rec/conf/otm/AlcaideECR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/PalomarAEC07, author = {Esther Palomar and Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Robert Meersman and Zahir Tari}, title = {Bayesian Analysis of Secure {P2P} Sharing Protocols}, booktitle = {On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, {OTM} Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and {IS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4804}, pages = {1701--1717}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76843-2\_41}, doi = {10.1007/978-3-540-76843-2\_41}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/PalomarAEC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/Peris-LopezHER07, author = {Pedro Peris{-}Lopez and Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Panagiotis Georgiadis and Javier L{\'{o}}pez and Stefanos Gritzalis and Giannis F. Marias}, title = {Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for {RFID} Tags}, booktitle = {Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007}, pages = {55--60}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SECPERU.2007.12}, doi = {10.1109/SECPERU.2007.12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secperu/Peris-LopezHER07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Castro06, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Guest Editorial}, journal = {J. Res. Pract. Inf. Technol.}, volume = {38}, number = {1}, year = {2006}, url = {http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.1.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Castro06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hernandez-CastroBER06, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Ignacio Blasco{-}Lopez and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, title = {Steganography in games: {A} general methodology and its application to the game of Go}, journal = {Comput. Secur.}, volume = {25}, number = {1}, pages = {64--71}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2005.12.001}, doi = {10.1016/J.COSE.2005.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hernandez-CastroBER06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Hernandez-CastroEGR06, author = {Julio C. Hernandez{-}Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho and Benjam{\'{\i}}n Ramos {\'{A}}lvarez}, title = {Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming}, booktitle = {{IEEE} International Conference on Evolutionary Computation, {CEC} 2006, part of {WCCI} 2006, Vancouver, BC, Canada, 16-21 July 2006}, pages = {192--199}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/CEC.2006.1688308}, doi = {10.1109/CEC.2006.1688308}, timestamp = {Thu, 16 Dec 2021 14:00:41 +0100}, biburl = {https://dblp.org/rec/conf/cec/Hernandez-CastroEGR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/PalomarEHR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {A Protocol for Secure Content Distribution in Pure {P2P} Networks}, booktitle = {17th International Workshop on Database and Expert Systems Applications {(DEXA} 2006), 4-8 September 2006, Krakow, Poland}, pages = {712--716}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DEXA.2006.17}, doi = {10.1109/DEXA.2006.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/PalomarEHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/AlcaideEHR06, author = {Almudena Alcaide and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {396--408}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_28}, doi = {10.1007/11766155\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etrics/AlcaideEHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/PalomarEHR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {A {P2P} Content Authentication Protocol Based on Byzantine Agreement}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {60--72}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_5}, doi = {10.1007/11766155\_5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/etrics/PalomarEHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/PalomarECR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {Security in {P2P} Networks: Survey and Research Directions}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {183--192}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_19}, doi = {10.1007/11807964\_19}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/PalomarECR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/EstebanezCRI06, author = {C{\'{e}}sar Est{\'{e}}banez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda and Pedro Isasi}, editor = {Mike Cattolico}, title = {Evolving hash functions by means of genetic programming}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006}, pages = {1861--1862}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143997.1144300}, doi = {10.1145/1143997.1144300}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/EstebanezCRI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/Peris-LopezHER06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Pedro Cuenca and Luis Orozco{-}Barbosa}, title = {{RFID} Systems: {A} Survey on Security Threats and Proposed Solutions}, booktitle = {Personal Wireless Communications, {IFIP} {TC6} 11th International Conference, {PWC} 2006, Albacete, Spain, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4217}, pages = {159--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11872153\_14}, doi = {10.1007/11872153\_14}, timestamp = {Fri, 14 May 2021 08:28:27 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-8/Peris-LopezHER06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/Peris-LopezCTR06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {{EMAP:} An Efficient Mutual-Authentication Protocol for Low-Cost {RFID} Tags}, booktitle = {On the Move to Meaningful Internet Systems 2006: {OTM} 2006 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, {OTM} Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4277}, pages = {352--361}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11915034\_59}, doi = {10.1007/11915034\_59}, timestamp = {Thu, 14 Oct 2021 10:28:26 +0200}, biburl = {https://dblp.org/rec/conf/otm/Peris-LopezCTR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/PalomarECR06, author = {Esther Palomar and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {Alberto Montresor and Adam Wierzbicki and Nahid Shahmehri}, title = {Certificate-based Access Control in Pure {P2P} Networks}, booktitle = {Sixth {IEEE} International Conference on Peer-to-Peer Computing {(P2P} 2006), 2-4 October 2006, Cambridge, United Kingdom}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/P2P.2006.7}, doi = {10.1109/P2P.2006.7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/PalomarECR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/EstebanezCRV06, author = {C{\'{e}}sar Est{\'{e}}banez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda and Pedro Isasi Vi{\~{n}}uela}, editor = {Thomas Philip Runarsson and Hans{-}Georg Beyer and Edmund K. Burke and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and L. Darrell Whitley and Xin Yao}, title = {Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming}, booktitle = {Parallel Problem Solving from Nature - {PPSN} IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings}, series = {Lecture Notes in Computer Science}, volume = {4193}, pages = {818--827}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844297\_83}, doi = {10.1007/11844297\_83}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/EstebanezCRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/Lamenca-MartinezCER06, author = {Carlos Lamenca{-}Martinez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Thomas Philip Runarsson and Hans{-}Georg Beyer and Edmund K. Burke and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and L. Darrell Whitley and Xin Yao}, title = {Lamar: {A} New Pseudorandom Number Generator Evolved by Means of Genetic Programming}, booktitle = {Parallel Problem Solving from Nature - {PPSN} IX, 9th International Conference, Reykjavik, Iceland, September 9-13, 2006, Procedings}, series = {Lecture Notes in Computer Science}, volume = {4193}, pages = {850--859}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844297\_86}, doi = {10.1007/11844297\_86}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/Lamenca-MartinezCER06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/Peris-LopezCER06, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Jianhua Ma and Hai Jin and Laurence Tianruo Yang and Jeffrey J. P. Tsai}, title = {M\({}^{\mbox{2}}\)AP: {A} Minimalist Mutual-Authentication Protocol for Low-Cost {RFID} Tags}, booktitle = {Ubiquitous Intelligence and Computing, Third International Conference, {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4159}, pages = {912--923}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11833529\_93}, doi = {10.1007/11833529\_93}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/Peris-LopezCER06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcs/CastroSSIR05, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Andr{\'{e}} Seznec and Antonio Izquierdo and Arturo Ribagorda}, title = {The strict avalanche criterion randomness test}, journal = {Math. Comput. Simul.}, volume = {68}, number = {1}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.1016/j.matcom.2004.09.001}, doi = {10.1016/J.MATCOM.2004.09.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcs/CastroSSIR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/CastroV05, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi Vi{\~{n}}uela}, title = {Evolutionary Computation in Computer Security and Cryptography}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {193--199}, year = {2005}, url = {https://doi.org/10.1007/BF03037654}, doi = {10.1007/BF03037654}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/CastroV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/CastroV05a, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi Vi{\~{n}}uela}, title = {New Results on the Genetic Cryptanalysis of {TEA} and Reduced-round Versions of {XTEA}}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {233--243}, year = {2005}, url = {https://doi.org/10.1007/BF03037657}, doi = {10.1007/BF03037657}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/CastroV05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/SaezVSC05, author = {Yago S{\'{a}}ez and Pedro Isasi Vi{\~{n}}uela and Javier Segovia and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Reference Chromosome to Overcome User Fatigue in {IEC}}, journal = {New Gener. Comput.}, volume = {23}, number = {2}, pages = {129--142}, year = {2005}, url = {https://doi.org/10.1007/BF03037490}, doi = {10.1007/BF03037490}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/SaezVSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/ManzanaresMEC05, author = {Antonio Izquierdo Manzanares and Joaqu{\'{\i}}n Torres M{\'{a}}rquez and Juan M. Est{\'{e}}vez{-}Tapiador and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Attacks on Port Knocking Authentication Mechanism}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3483}, pages = {1292--1300}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424925\_134}, doi = {10.1007/11424925\_134}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/ManzanaresMEC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/SierraHPM05, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Ponce and Jaime Manera}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Marketing on Internet Communications Security for Online Bank Transactions}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3483}, pages = {1301--1308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424925\_135}, doi = {10.1007/11424925\_135}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/SierraHPM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sis/2005, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, publisher = {{INSTICC} Press}, year = {2005}, isbn = {972-8865-25-2}, timestamp = {Wed, 06 Feb 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sis/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/CastroI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi}, title = {Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher {TEA}}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {517--525}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00250.x}, doi = {10.1111/J.0824-7935.2004.00250.X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/CastroI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/IsasiC04, author = {Pedro Isasi and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {445--449}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00244.x}, doi = {10.1111/J.0824-7935.2004.00244.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/IsasiC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SierraCJR04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Narayana Jayaram and Arturo Ribagorda}, title = {Low computational cost integrity for block ciphers}, journal = {Future Gener. Comput. Syst.}, volume = {20}, number = {5}, pages = {857--863}, year = {2004}, url = {https://doi.org/10.1016/j.future.2003.11.006}, doi = {10.1016/J.FUTURE.2003.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SierraCJR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icga/CastroBG04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Ignacio Blasco{-}Lopez and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Hiding Data in Games}, journal = {J. Int. Comput. Games Assoc.}, volume = {27}, number = {2}, pages = {96--101}, year = {2004}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icga/CastroBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/CastroSR04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda}, title = {Beware of the Security Software}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {12}, number = {6}, pages = {39--45}, year = {2004}, url = {https://doi.org/10.1201/1086/44022.12.6.20040101/79785.7}, doi = {10.1201/1086/44022.12.6.20040101/79785.7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/CastroSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MunozCCG04, author = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jes{\'{u}}s Carretero and F{\'{e}}lix Garc{\'{\i}}a}, title = {Filtering Spam at E-Mail Server Level with Improved {CRM114}}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {13}, number = {3}, pages = {48--55}, year = {2004}, url = {https://doi.org/10.1201/1086/44530.13.3.20040701/83069.7}, doi = {10.1201/1086/44530.13.3.20040701/83069.7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MunozCCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/CastroI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi}, title = {New results on the genetic cryptanalysis of {TEA} and reduced-round versions of {XTEA}}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {2124--2129}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331159}, doi = {10.1109/CEC.2004.1331159}, timestamp = {Thu, 16 Dec 2021 13:58:46 +0100}, biburl = {https://dblp.org/rec/conf/cec/CastroI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/HernandezSI04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Andr{\'{e}} Seznec and Pedro Isasi}, title = {On the design of state-of-the-art pseudorandom number generators by means of genetic programming}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {1510--1516}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331075}, doi = {10.1109/CEC.2004.1331075}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/HernandezSI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/HernandezSS04, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Andr{\'{e}} Seznec}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {The {SAC} Test: {A} New Randomness Test, with Some Applications to {PRNG} Analysis}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {960--967}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_108}, doi = {10.1007/978-3-540-24707-4\_108}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/HernandezSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/IzquierdoSHR04, author = {Antonio Izquierdo and Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Security Issues in Network File Systems}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {812--820}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_94}, doi = {10.1007/978-3-540-24707-4\_94}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/IzquierdoSHR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/SierraHAT04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Almudena Alcaide and Joaqu{\'{\i}}n Torres M{\'{a}}rquez}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Validating the Use of {BAN} {LOGIC}}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {851--858}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_98}, doi = {10.1007/978-3-540-24707-4\_98}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/SierraHAT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/Arco-CalderonVC04, author = {Crist{\'{o}}bal Luque del Arco{-}Calder{\'{o}}n and Pedro Isasi Vi{\~{n}}uela and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Xin Yao and Edmund K. Burke and Jos{\'{e}} Antonio Lozano and Jim Smith and Juan Juli{\'{a}}n Merelo Guerv{\'{o}}s and John A. Bullinaria and Jonathan E. Rowe and Peter Ti{\~{n}}o and Ata Kab{\'{a}}n and Hans{-}Paul Schwefel}, title = {Forecasting Time Series by Means of Evolutionary Algorithms}, booktitle = {Parallel Problem Solving from Nature - {PPSN} VIII, 8th International Conference, Birmingham, UK, September 18-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3242}, pages = {1061--1070}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30217-9\_107}, doi = {10.1007/978-3-540-30217-9\_107}, timestamp = {Wed, 28 Jun 2023 16:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/Arco-CalderonVC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/MendezHCG04, author = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jes{\'{u}}s Carretero and F{\'{e}}lix Garc{\'{\i}}a}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Filtering spam at e-mail server level with improved {CRM114}}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {207--216}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Thu, 01 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/MendezHCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/SierraHIR04, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Antonio Izquierdo and Arturo Ribagorda}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Secure Communications in Multi-Agent Systems Protecting {KQML}}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {305--313}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Mon, 23 May 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/SierraHIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sis/2004, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, publisher = {{INSTICC} Press}, year = {2004}, isbn = {972-8865-07-4}, timestamp = {Mon, 23 Aug 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/Hernandez-Castro03, author = {Julio C. Hernandez{-}Castro and Pedro Isasi}, title = {Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher {TEA}}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2189--2193}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299943}, doi = {10.1109/CEC.2003.1299943}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/Hernandez-Castro03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/CastroVCC03, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and L. Javier Garc{\'{\i}}a{-}Villalba and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra}, editor = {Vipin Kumar and Marina L. Gavrilova and Chih Jeng Kenneth Tan and Pierre L'Ecuyer}, title = {On MARS's s-boxes Strength against Linear Cryptanalysis}, booktitle = {Computational Science and Its Applications - {ICCSA} 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {2669}, pages = {79--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44842-X\_9}, doi = {10.1007/3-540-44842-X\_9}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/CastroVCC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/SierraHPR03, author = {Jos{\'{e}} Mar{\'{\i}}a Sierra and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Ponce and Arturo Ribagorda}, editor = {Vipin Kumar and Marina L. Gavrilova and Chih Jeng Kenneth Tan and Pierre L'Ecuyer}, title = {Protection of Multiagent Systems}, booktitle = {Computational Science and Its Applications - {ICCSA} 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {2669}, pages = {123--128}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44842-X\_13}, doi = {10.1007/3-540-44842-X\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/SierraHPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/HernandezIA03, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Pedro Isasi and Crist{\'{o}}bal Luque del Arco{-}Calder{\'{o}}n}, editor = {Vasile Palade and Robert J. Howlett and Lakhmi C. Jain}, title = {Finding Efficient Nonlinear Functions by Means of Genetic Programming}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {2773}, pages = {1192--1198}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45224-9\_161}, doi = {10.1007/978-3-540-45224-9\_161}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/HernandezIA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/HernandezSIR02, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Pedro Isasi and Arturo Ribagorda}, editor = {Peter M. A. Sloot and Chih Jeng Kenneth Tan and Jack J. Dongarra and Alfons G. Hoekstra}, title = {Genetic Cryptoanalysis of Two Rounds {TEA}}, booktitle = {Computational Science - {ICCS} 2002, International Conference, Amsterdam, The Netherlands, April 21-24, 2002. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {2331}, pages = {1024--1031}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-47789-6\_108}, doi = {10.1007/3-540-47789-6\_108}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/HernandezSIR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HernandezSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, title = {Search Engines as a Security Threat}, journal = {Computer}, volume = {34}, number = {10}, pages = {25--30}, year = {2001}, url = {https://doi.org/10.1109/2.955094}, doi = {10.1109/2.955094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HernandezSRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hernandez-Castro01, author = {Julio C. Hernandez{-}Castro and Arturo Ribagorda and Pedro Isasi and Jos{\'{e}} M. Sierra}, title = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators}, journal = {Cryptologia}, volume = {25}, number = {3}, pages = {213--229}, year = {2001}, url = {https://doi.org/10.1080/0161-110191889897}, doi = {10.1080/0161-110191889897}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hernandez-Castro01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/HernandezSRRM01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos and J. Carlos Mex{-}Perera}, editor = {Bahram Honary}, title = {Distinguishing {TEA} from a Random Permutation: Reduced Round Versions of {TEA} Do Not Have the {SAC} or Do Not Generate Random Numbers}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {374--377}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_34}, doi = {10.1007/3-540-45325-3\_34}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/HernandezSRRM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SanchezOHS01, author = {David S{\'{a}}nchez and Agust{\'{\i}}n Orfila and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra}, editor = {George I. Davida and Yair Frankel}, title = {Robust New Method in Frequency Domain Watermarking}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {166--182}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_12}, doi = {10.1007/3-540-45439-X\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/SanchezOHS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/HernandezCSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Eva Mar{\'{\i}}a Cebri{\'{a}}n and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, editor = {Wendy A. Lawrence{-}Fowler and Joachim Hasebrook}, title = {Project WebOracle: Developing an advanced web server security assesment tool}, booktitle = {Proceedings of WebNet 2001 - World Conference on the {WWW} and Internet, Orlando, Florida, USA, October 23-27, 2001}, pages = {526--529}, publisher = {{AACE}}, year = {2001}, timestamp = {Thu, 21 Jun 2018 07:47:32 +0200}, biburl = {https://dblp.org/rec/conf/webnet/HernandezCSRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/HernandezSRR01, author = {Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Jos{\'{e}} Mar{\'{\i}}a Sierra and Arturo Ribagorda and Benjam{\'{\i}}n Ramos}, editor = {Wendy A. Lawrence{-}Fowler and Joachim Hasebrook}, title = {Search Engines as a security thread}, booktitle = {Proceedings of WebNet 2001 - World Conference on the {WWW} and Internet, Orlando, Florida, USA, October 23-27, 2001}, pages = {530--533}, publisher = {{AACE}}, year = {2001}, timestamp = {Tue, 07 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webnet/HernandezSRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.