Julio César Hernández Castro

According to our database1, Julio César Hernández Castro authored at least 104 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
An in-Depth Study of the Jisut Family of Android Ransomware.
IEEE Access, 2018

2017
Detecting discussion communities on vaccination in twitter.
Future Generation Comp. Syst., 2017

Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Image source acquisition identification of mobile devices based on the use of features.
Multimedia Tools Appl., 2016

Identification of smartphone brand and model via forensic video analysis.
Expert Syst. Appl., 2016

2015
Analysis of errors in exif metadata on mobile devices.
Multimedia Tools Appl., 2015

2014
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Computational Applied Mathematics, 2014

A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Systems, 2014

Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014

A Survey of Social Web Mining Applications for Disease Outbreak Detection.
Proceedings of the Intelligent Distributed Computing VIII, 2014

2013
Cryptanalysis of the RNTS system.
The Journal of Supercomputing, 2013

A study on the false positive rate of Stegdetect.
Digital Investigation, 2013

2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Personal and Ubiquitous Computing, 2012

Online Randomization Strategies to Obfuscate User Behavioral Patterns.
J. Network Syst. Manage., 2012

A framework for avoiding steganography usage over HTTP.
J. Network and Computer Applications, 2012

Bypassing information leakage protection with trusted applications.
Computers & Security, 2012

Another Fallen Hash-Based RFID Authentication Protocol.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Weaknesses in another Gen2-based RFID authentication protocol.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

On the Security of Tan et al. Serverless RFID Authentication and Search Protocols.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

2011
Flaws on RFID grouping-proofs. Guidelines for future sound protocols.
J. Network and Computer Applications, 2011

Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptology ePrint Archive, 2011

Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. of AI, 2011

On the Strength of Egglue and Other Logic CAPTCHAs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Studying the pseudo random number generator of a low-cost RFID tag.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

AKARI-X: A pseudorandom number generator for secure lightweight systems.
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011

On the Key Schedule Strength of PRESENT.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Blind Steganalysis of Mp3stego.
J. Inf. Sci. Eng., 2010

Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard.
IEICE Transactions, 2010

Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Communications Letters, 2010

Vulnerability analysis of RFID protocols for tag ownership transfer.
Computer Networks, 2010

A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Fine-Grained Timing Using Genetic Programming.
Proceedings of the Genetic Programming, 13th European Conference, 2010

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification.
Computer Standards & Interfaces, 2009

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.
Computer Standards & Interfaces, 2009

Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Computer Communications, 2009

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Steganalysis of Hydan.
Proceedings of the Emerging Challenges for Security, 2009

Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Trans. Information Forensics and Security, 2008

Automated design of a lightweight block cipher with Genetic Programming.
KES Journal, 2008

Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008

Cryptanalysis of Syverson's Rational Exchange Protocol.
I. J. Network Security, 2008

Bayesian rational exchange.
Int. J. Inf. Sec., 2008

Secure content access and replication in pure P2P networks.
Computer Communications, 2008

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008

Nature-Inspired Synthesis of Rational Protocols.
Proceedings of the Parallel Problem Solving from Nature, 2008

Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008

On the Salsa20 Core Function.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007

Bayesian Analysis of Secure P2P Sharing Protocols.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Multi-party Rational Exchange Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
Proceedings of the Cryptography and Coding, 2007

Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Heuristic search for non-linear cryptanalytic approximations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Steganography in games: A general methodology and its application to the game of Go.
Computers & Security, 2006

Guest Editorial.
Journal of Research and Practice in Information Technology, 2006

M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming.
Proceedings of the Parallel Problem Solving from Nature, 2006

Certificate-based Access Control in Pure P2P Networks.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

RFID Systems: A Survey on Security Threats and Proposed Solutions.
Proceedings of the Personal Wireless Communications, 2006

Evolving hash functions by means of genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

Security in P2P Networks: Survey and Research Directions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A P2P Content Authentication Protocol Based on Byzantine Agreement.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Protocol for Secure Content Distribution in Pure P2P Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming.
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006

2005
Reference Chromosome to Overcome User Fatigue in IEC.
New Generation Comput., 2005

Evolutionary Computation in Computer Security and Cryptography.
New Generation Comput., 2005

The strict avalanche criterion randomness test.
Mathematics and Computers in Simulation, 2005

Marketing on Internet Communications Security for Online Bank Transactions.
Proceedings of the Computational Science and Its Applications, 2005

Attacks on Port Knocking Authentication Mechanism.
Proceedings of the Computational Science and Its Applications, 2005

2004
Beware of the Security Software.
Information Systems Security, 2004

Hiding Data in Games.
ICGA Journal, 2004

Low computational cost integrity for block ciphers.
Future Generation Comp. Syst., 2004

Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography.
Computational Intelligence, 2004

Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA.
Computational Intelligence, 2004

Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004

Filtering spam at e-mail server level with improved CRM114.
Proceedings of the Security In Information Systems, 2004

Forecasting Time Series by Means of Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature, 2004

Validating the Use of BAN LOGIC.
Proceedings of the Computational Science and Its Applications, 2004

Security Issues in Network File Systems.
Proceedings of the Computational Science and Its Applications, 2004

The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis.
Proceedings of the Computational Science and Its Applications, 2004

On the design of state-of-the-art pseudorandom number generators by means of genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Finding Efficient Nonlinear Functions by Means of Genetic Programming.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Protection of Multiagent Systems.
Proceedings of the Computational Science and Its Applications, 2003

On MARS's s-boxes Strength against Linear Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2003

2002
Genetic Cryptoanalysis of Two Rounds TEA.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators.
Cryptologia, 2001

Search Engines as a Security Threat.
IEEE Computer, 2001

Search Engines as a security thread.
Proceedings of WebNet 2001, 2001

Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001

Robust New Method in Frequency Domain Watermarking.
Proceedings of the Information Security, 4th International Conference, 2001

Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001


  Loading...