Julio Hernandez-Castro

According to our database1, Julio Hernandez-Castro
  • authored at least 20 papers between 2013 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG.
IEEE Trans. Information Forensics and Security, 2018

2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Information Forensics and Security, 2017

Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators.
IACR Cryptology ePrint Archive, 2017

A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Generation Comp. Syst., 2017

Economic Analysis of Ransomware.
CoRR, 2017

An Analysis of Bitcoin Laundry Services.
Proceedings of the Secure IT Systems, 2017

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Pitfalls in Ultralightweight Authentication Protocol Designs.
IEEE Trans. Mob. Comput., 2016

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptology ePrint Archive, 2016

A Survey of Security and Privacy Issues in ePassport Protocols.
ACM Comput. Surv., 2016

Theia: a tool for the forensic analysis of mobile devices pictures.
Computing, 2016

Bias in the Mifare DESFire EV1 TRNG.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

2015
Forensic analysis of video steganography tools.
PeerJ PrePrints, 2015

Forensic analysis of video steganography tools.
PeerJ Computer Science, 2015

Automatic detection of potentially illegal online sales of elephant ivory via data mining.
PeerJ Computer Science, 2015

Smartphone image acquisition forensics using sensor fingerprint.
IET Computer Vision, 2015

Steganalysis of OpenPuff through atomic concatenation of MP4 flags.
Digital Investigation, 2015

On the limits of engine analysis for cheating detection in chess.
Computers & Security, 2015

2014
Detecting fraudulent activity in a cloud using privacy-friendly data aggregates.
CoRR, 2014

2013
Steganography using the Extensible Messaging and Presence Protocol (XMPP).
CoRR, 2013


  Loading...