Skip to main content

Items where Author, Editor or other role is "Hernandez Castro, Julio"

Group by: Creator's name | Item Type | Date | No Grouping
Jump to: A | B | C | D | E | F | G | H | K | M | O | P | R | S | T | Y
Number of items: 65.

A

Arief, Budi, Periam, Andy, Cetin, Orcun, Hernandez-Castro, Julio C. (2020) Using Eyetracker to Find Ways to Mitigate Ransomware. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. . pp. 448-456. Scitepress ISBN 978-989-758-399-5. (doi:10.5220/0008956004480456) (KAR id:80445)
[thumbnail of ICISSP_2020_48.pdf]
Preview
[thumbnail of ICISSP_2020_48_CR.pdf]
Preview

Armas Vega, Esteban, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns. Sensors, 18 (10). Article Number 3372. ISSN 1424-8220. (doi:10.3390/s18103372) (KAR id:69864)
[thumbnail of sensors-18-03372.pdf]
Preview

Avoine, Gildas, Beaujeant, Antonin, Hernandez-Castro, Julio C., Demay, Louis, Teuwen, Philippe (2016) A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys, 48 (3). Article Number 47. ISSN 0360-0300. (doi:10.1145/2825026) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:60598)

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security, 7 (2). pp. 151-156. ISSN 2152-5064. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31956)
[thumbnail of Cryptanalysis of Syverson’s Rational Exchange.pdf]

Alcaide, Almudena, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Bayesian rational exchange. International Journal of Information Security, 7 (1). pp. 85-100. ISSN 1615-5262. (doi:10.1007/s10207-007-0039-5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31958)
[thumbnail of Bayesian rational exchange.pdf]

B

Brierley, Calvin, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. In: Tuveri, N. and Michalas, A. and Brumley, B.B., eds. Lecture Notes in Computer Science. Secure IT Systems. 26th Nordic Conference, NordSec 2021. 13115. pp. 79-92. Springer ISBN 978-3-030-91624-4. E-ISBN 978-3-030-91625-1. (doi:10.1007/978-3-030-91625-1_5) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92304)
[thumbnail of Preprint-Industrialising Blackmail_PrivacyInvasionBasedIoTRansomware.pdf] [thumbnail of NordSec2021-PublishedVersion.pdf]

Brierley, Calvin, Pont, Jamie, Arief, Budi, Barnes, David J., Hernandez-Castro, Julio C. (2021) Persistence in Linux-Based IoT Malware. In: Lecture Notes in Computer Science. Secure IT Systems. 12556. pp. 3-19. Springer E-ISBN 978-3-030-70852-8. (doi:10.1007/978-3-030-70852-8_1) (KAR id:84209)
[thumbnail of Persistence_in_IoT_Malware_Camera_Ready.pdf]
Preview

Bello, Gema, Hernandez-Castro, Julio, Camacho, David (2016) Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems, 66 . pp. 125-136. ISSN 0167-739X. (doi:10.1016/j.future.2016.06.032) (KAR id:58380)
[thumbnail of final-FGCS-gema.pdf]
Preview

Barnes, David J., Hernandez-Castro, Julio C. (2015) On the limits of engine analysis for cheating detection in chess. Computers and Security, 48 . pp. 58-73. ISSN 0167-4048. (doi:10.1016/j.cose.2014.10.002) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:44719)
[thumbnail of 1-s2.0-S0167404814001485-main.pdf]

Bowles, Stephen, Hernandez-Castro, Julio C. (2015) The first 10 years of the Trojan Horse defence. Computer Fraud & Security, 2015 (1). pp. 5-13. ISSN 1361-3723. (doi:10.1016/S1361-3723(15)70005-9) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58386)
[thumbnail of thd.pdf]

Bello Orgaz, Gema, Hernandez-Castro, Julio C., Camacho, David (2015) A Survey of Social Web Mining Applications for Disease Outbreak Detection. In: UNSPECIFIED. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:45297)

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Targeted ‘malvertising’ reveals move towards more sophisticated hacks. . The Conversation UK Internet only. (KAR id:45255)
[thumbnail of targeted-malvertising-reveals-move-towards-more-sophisticated-hacks-33294]

Boiten, Eerke Albert, Hernandez-Castro, Julio C. (2014) Can you really be identified on Tor or is that just what the cops want you to believe? . The Conversation UK Internet only. (KAR id:45256)
[thumbnail of can-you-really-be-identified-on-tor-or-is-that-just-what-the-cops-want-you-to-believe-29430]

Barrero, David, Hernandez-Castro, Julio C., Peris-Lopez, Pedro, Camacho, David (2014) A genetic tango attack against the David–Prasad RFID ultra?lightweight authentication protocol. Expert Systems, 31 (1). pp. 9-19. ISSN 0266-4720. (doi:10.1111/j.1468-0394.2012.00652.x) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45299)
[thumbnail of Restricted due to publisher policy]

Blasco Alis, Jorge, Hernandez-Castro, Julio C., Tapiador, Juan E., Ribagorda, Arturo (2012) Bypassing information leakage protection with trusted applications. Computers and Security, 31 (4). pp. 557-568. ISSN 0167-4080. (doi:10.1016/j.cose.2012.01.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31937)
[thumbnail of Bypassing information leakage protection with trusted applications.pdf]

Blasco Alis, Jorge, Hernandez-Castro, Julio C., de Fuentes, Jose Maria, Ramos, Benjamin (2012) A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35 (1). pp. 491-501. ISSN 1084-8045. (doi:10.1016/j.jnca.2011.10.003) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31941)
[thumbnail of A framework for avoiding steganography usage over HTTP.pdf]

C

Cervantes, Alejandro, Sloan, Tom, Hernandez-Castro, Julio C., Isasi, Pedro (2018) System steganalysis with automatic fingerprint extraction. PLOS ONE, 13 (4). Article Number 195737. ISSN 1932-6203. (doi:10.1371/journal.pone.0195737) (KAR id:67066)
[thumbnail of journal.pone.0195737.pdf]

Corripio, J.R., Sandoval Orozco, A.L., Garcia Villalba, L.J., Hernandez-Castro, Julio C., Gibson, Stuart J. (2013) Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. In: The 5th International Conference on Imaging for Crime Detection and Prevention, 16th-17th December 2013, London, UK. (Unpublished) (KAR id:37195)
[thumbnail of corripio2013.pdf]
Preview

D

de Balthasar, Thibault, Hernandez-Castro, Julio C. (2017) An Analysis of Bitcoin Laundry Services. In: Lecture Notes in Computer Science. . pp. 297-312. Springer-Verlag Berlin ISBN 978-3-319-70289-6. E-ISBN 978-3-319-70290-2. (doi:10.1007/978-3-319-70290-2_18) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:64334)
[thumbnail of An Analysis of Bitcoin Mixers.pdf]

E

Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Alcaide, Almudena, Ribagorda, Arturo (2008) On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security, 3 (2). pp. 166-172. ISSN 1556-6013. (doi:10.1109/TIFS.2008.920724) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31957)
[thumbnail of On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.pdf]

F

Filiz, Burak, Arief, Budi, Cetin, Orcun, Hernandez-Castro, Julio C. (2021) On the Effectiveness of Ransomware Decryption Tools. Computers & Security, 111 . Article Number 102469. ISSN 0167-4048. (doi:10.1016/j.cose.2021.102469) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92302)
[thumbnail of Preprint-OnTheEffectivenessOfRansomwareDecryptionTools.pdf] [thumbnail of 1-s2.0-S0167404821002935-main.pdf]

G

González Fernández, Edgar, Sandoval Orozco, Ana, García Villalba, Luis, Hernandez-Castro, Julio C. (2018) Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts. Sensors (Basel, Switzerland), 18 (9). ISSN 1424-8220. (doi:10.3390/s18092804) (KAR id:69341)
[thumbnail of sensors-18-02804.pdf]
Preview

H

Hurley-Smith, Darren, Patsakis, Constantinos, Hernandez-Castro, Julio C. (2020) On the unbearable lightness of FIPS 140-2 randomness tests. IEEE Transactions on Information Forensics and Security, . p. 1. ISSN 1556-6013. (doi:10.1109/TIFS.2020.2988505) (KAR id:81881)
[thumbnail of 09069949.pdf]
Preview

Hernandez-Castro, J., Cartwright, A., Cartwright, E. (2020) An economic analysis of ransomware and its welfare consequences. Royal Society Open Science, 7 (3). p. 190023. ISSN 2054-5703. (doi:10.1098/rsos.190023) (KAR id:80658)
[thumbnail of An economic analysis of ransomware and its welfare consequences.pdf]
Preview

Hurley-Smith, Darren, Hernandez-Castro, Julio (2020) Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators. ACM Transactions on Privacy and Security, 23 (3). pp. 1-25. ISSN 2471-2566. (doi:10.1145/3398726) (KAR id:81957)
[thumbnail of Quantum_Leap_TOPS_Submission_FINAL.pdf]
Preview
[thumbnail of QLC.pdf]

Hurley-Smith, Darren, Hernandez-Castro, Julio (2018) Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG. IEEE Transactions on Information Forensics and Security, 13 (4). pp. 1031-1041. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2777342) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:67241)
[thumbnail of certifiablybiased.pdf]

Harrison, Joe, Roberts, David L., Hernandez-Castro, Julio (2016) Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology, 30 (4). pp. 900-904. ISSN 0888-8892. (doi:10.1111/cobi.12707) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58382)
[thumbnail of cobi12707.pdf]

Hernandez-Castro, Julio C., Roberts, David L. (2015) Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science, 1:e10 . pp. 1-11. ISSN 2376-5992. (doi:10.7717/peerj-cs.10) (KAR id:49885)
[thumbnail of peerj-cs-10.pdf]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2015) UK has little to be proud of as survey reveals sorry state of European cybersecurity. . The Conversation Internet only. (KAR id:51071)
[thumbnail of uk-has-little-to-be-proud-of-as-survey-reveals-sorry-state-of-european-cybersecurity-37505]

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2014) Cybercrime prevalence and impact in the UK. Computer Fraud & Security, 2014 (2). pp. 5-8. ISSN 1361-3723. (doi:10.1016/S1361-3723(14)70461-0) (KAR id:38400)
[thumbnail of preprint]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert, Barnoux, Magali F.L. (2014) Second Kent Cyber Security Survey. . Internet only. (KAR id:52891)
[thumbnail of Survey2.pdf]
Preview

Hernandez-Castro, Julio C., Boiten, Eerke Albert (2013) First Kent Cyber Security Survey. . Internet only. (KAR id:52890)
[thumbnail of Survey1.pdf]
Preview

Hernandez-Castro, Julio C., Estévez-Tapiador, Juan M., Peris-Lopez, Pedro, Clark, John A., Talbi, El-Ghazali (2012) Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science, 23 (2). pp. 543-553. ISSN 0129-0541. (doi:10.1142/S0129054112400278) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31940)
[thumbnail of METAHEURISTIC TRACEABILITY ATTACK AGAINST SLMAP, AN RFID LIGHTWEIGHT AUTHENTICATION PROTOCOL.pdf]

Hernandez-Castro, Julio C., Tapiador, Juan E., Palomar, Esther, Romero-Gonzalez, Angel (2010) Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering, 26 (5). pp. 1787-1799. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31949)
[thumbnail of Blind Steganalysis of Mp3stego.pdf]

Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Peris-Lopez, Pedro, Ribagorda, Arturo (2008) Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering, 24 (5). pp. 1485-1504. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31959)
[thumbnail of Automated Design of Cryptographic Hashes by Evolving Highly Nonlinear functions.pdf]

K

Khalil, Omar, Hernandez-Castro, Julio C., Asis, Benjamon (2013) A study on the false positive rate of Stegdetect. Digital Investigation, 9 (3-4). pp. 235-245. ISSN 1742-2876. (doi:10.1016/j.diin.2013.01.004) (KAR id:45303)
[thumbnail of Microsoft_Word_-_Stegdetect_article_-_Final.pdf]
Preview

M

Martin, Alejandro, Hernandez-Castro, Julio C., Camacho, David (2018) An in-Depth Study of the Jisut Family of Android Ransomware. IEEE Access, 6 . pp. 57205-57218. ISSN 2169-3536. (doi:10.1109/ACCESS.2018.2873583) (KAR id:69882)
[thumbnail of 08481441.pdf]
Preview

McBride, Jack and Hernandez-Castro, Julio and Arief, Budi (2018) Earworms Make Bad Passwords: An Analysis of the Noke Smart Lock Manual Override. In: 2017 International Workshop on Secure Internet of Things (SIoT). IEEE. ISBN 978-1-5386-4542-0. E-ISBN 978-1-5386-4541-3. (doi:10.1109/SIoT.2017.00009) (KAR id:64302)
[thumbnail of EarwormsMakeBadPasswords.pdf]
Preview

McBride, Jack and Arief, Budi and Hernandez-Castro, Julio C. (2018) Security Analysis of Contiki IoT Operating System. In: EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks. Junction Publishing, Canada, pp. 278-283. ISBN 978-0-9949886-2-1. (KAR id:67379)
[thumbnail of SecurityAnalysisOfContiki.pdf]
Preview

Mitrokotsa, Aikaterini, Dimitrakakis, Christos, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2010) Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 14 (2). pp. 121-123. ISSN 1089-7798. (doi:10.1109/LCOMM.2010.02.091946) (KAR id:31946)
[thumbnail of Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.pdf]
Preview

O

Osadchy, Margarita, Hernandez-Castro, Julio C., Gibson, Stuart J., Dunkelman, Orr, Perez-Cabo, Daniel (2017) No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2640-2653. ISSN 1556-6013. E-ISSN 1556-6021. (doi:10.1109/TIFS.2017.2718479) (KAR id:62081)
[thumbnail of deepCapt_journal_final.pdf]
Preview

Orozco, Ana Lucila Sandoval, Corripio, Jocelin Rosales, González, David Manuel Arenas, Villalba, Luis Javier García, Hernandez-Castro, Julio C. (2016) Theia: a tool for the forensic analysis of mobile devices pictures. Computing, 98 (12). pp. 1251-1286. ISSN 0010-485X. E-ISSN 1436-5057. (doi:10.1007/s00607-015-0482-5) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:61997)

P

Pont, Jamie, Arief, Budi, Hernandez-Castro, Julio C. (2020) Why Current Statistical Approaches to Ransomware Detection Fail. In: Lecture Notes in Computer Science. Information Security. 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings. 12472. Springer ISBN 978-3-030-62973-1. (doi:10.1007/978-3-030-62974-8_12) (KAR id:82960)
[thumbnail of why-current-statistical-approaches-to-ransomware-detection-fail.pdf]
Preview

Pont, Jamie, Abu Oun, Osama, Brierley, Calvin, Arief, Budi, Hernandez-Castro, Julio C. (2019) A Roadmap for Improving the Impact of Anti-Ransomware Research. In: Askarov, Aslan and Hansen, René Rydhof and Rafnsson, Willard, eds. Lecture Notes in Computer Science. Secure IT Systems: 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings. 11875. Springer ISBN 978-3-030-35054-3. (doi:10.1007/978-3-030-35055-0_9) (KAR id:76942)
[thumbnail of Paper24.pdf]
Preview

Picazo Sanchez, Pablo, Martin, Lara, Peris-Lopez, Pedro, Hernandez-Castro, Julio C. (2013) Cryptanalysis of the RNTS system. The Journal of Supercomputing, 65 (2). pp. 949-960. ISSN 0920-8542. (doi:10.1007/s11227-013-0873-3) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45300)
[thumbnail of Restricted due to publisher policy]

Peris-Lopez, Pedro, Orfila, Agustin, Palomar, Esther, Hernandez-Castro, Julio C. (2012) A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing, 16 (3). pp. 351-365. ISSN 1617-4909. (doi:10.1007/s00779-011-0396-y) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31942)
[thumbnail of A secure distance-based RFID identification protocol with an off-line back-end database.pdf]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., van der Lubbe, Jan C. A. (2011) Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 24 (6). pp. 1061-1069. ISSN 0952-1976. (doi:10.1016/j.engappai.2011.04.001) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31943)
[thumbnail of Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.pdf]

Peris-Lopez, Pedro, Orfila, Agustin, Hernandez-Castro, Julio C., van der Lubbe, Jan C. A. (2011) Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications, 34 (3). pp. 833-845. ISSN 1084-8045. (doi:10.1016/j.jnca.2010.04.008) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31944)
[thumbnail of Flaws on RFID grouping-proofs. Guidelines for future sound protocols.pdf]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Tapiador, Juan E., Li, Tieyan, Li, Yingjiu (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks, 54 (9). pp. 1502-1508. ISSN 1389-1286. (doi:10.1016/j.comnet.2009.11.007) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31945)
[thumbnail of Vulnerability analysis of RFID protocols for tag ownership transfer.pdf]

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C. (2010) Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems, E93-D (3). pp. 518-527. ISSN 1745-1353. (doi:10.1587/transinf.E93.D.518) (KAR id:31947)
[thumbnail of Lightweight Props on the Weak Security of EPC Class-1.pdf]
Preview

Peris-Lopez, Pedro, Li, Tieyan, Hernandez-Castro, Julio C., Tapiador, Juan E. (2009) Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications, 32 (7-10). pp. 1185-1193. ISSN 0140-3664. (doi:10.1016/j.comcom.2009.03.010) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31950)
[thumbnail of Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.pdf]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 31 (2). pp. 372-380. ISSN 0920-5489. (doi:10.1016/j.csi.2008.05.012) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31952)
[thumbnail of Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard.pdf]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces, 31 (1). pp. 88-97. ISSN 0920-5489. (doi:10.1016/j.csi.2007.11.013) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31951)
[thumbnail of LAMED — A PRNG for EPC Class-1 Generation-2 RFID specification.pdf]

Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2009) An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering, 25 (1). pp. 33-57. ISSN 1530-9827. (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31953)
[thumbnail of An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.pdf]

Palomar, Esther, Estevez Tapiador, Juan, Hernandez-Castro, Julio C., Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664. (doi:10.1016/j.comcom.2007.08.015) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31955)
[thumbnail of Secure content access and replication in pure P2P networks.pdf]

Polimon, Javier, Hernandez-Castro, Julio C., Estevez Tapiador, Juan, Ribagorda, Arturo (2008) Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too, 12 (1). pp. 3-14. ISSN 1327-2314. (KAR id:31960)
[thumbnail of Proof]
Preview

R

Roberts, David L., Hernandez-Castro, Julio (2017) Bycatch and illegal wildlife trade on the dark web. Oryx, 51 (3). pp. 393-394. ISSN 0030-6053. E-ISSN 1365-3008. (doi:10.1017/S0030605317000679) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:62140)
[thumbnail of div-class-title-bycatch-and-illegal-wildlife-trade-on-the-dark-web-div.pdf]

S

Sloan, Tom, Hernandez-Castro, Julio (2018) Dismantling OpenPuff PDF steganography. Digital Investigation, 25 . pp. 90-96. ISSN 1742-2876. (doi:10.1016/j.diin.2018.03.003) (KAR id:67242)
[thumbnail of Dismantling OpenPuff PDF steganography.pdf]
Preview

Sandoval Orozco, Ana Lucila, Garcia Villalba, Luis Javier, Arenas Gonzalez, David Manuel, Rosales Corripio, Jocelin, Hernandez-Castro, Julio C., Gibson, Stuart James (2015) Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision,, 9 (5). pp. 723-731. ISSN 1751-9632. E-ISSN 1751-9640. (doi:10.1049/iet-cvi.2014.0243) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:53396)
[thumbnail of sandoval2015.pdf]

Sandoval Orozco, Ana Lucila, Corripio, Jocelin Rosales, García Villalba, Luis Javier, Hernandez-Castro, Julio C. (2015) Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications, 75 (12). pp. 7087-7111. ISSN 1380-7501. E-ISSN 1573-7721. (doi:10.1007/s11042-015-2633-2) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:61966)

Safkhani, Masoumeh, Peris-Lopez, Pedro, Hernandez-Castro, Julio C., Bagheri, Nasour (2014) Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics, 259 (Pt B). pp. 571-577. ISSN 0377-0427. (doi:10.1016/j.cam.2013.09.073) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:45298)
[thumbnail of Restricted due to publisher policy]

Sandoval Orozco, A.L., Arenas Gonzalez, David Manuel, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2014) Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74 (13). pp. 4735-4763. ISSN 1380-7501. (doi:10.1007/s11042-013-1837-6) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:58385)
[thumbnail of errormetadata.pdf]

Sandoval Orozco, A.L., Arenas, Gonzalez, Rosales, Corripio, Garcia Villalba, L.J., Hernandez-Castro, Julio C. (2013) Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing, 96 (9). pp. 829-841. ISSN 1436-5057. (doi:10.1007/s00607-013-0313-5) (KAR id:45306)
[thumbnail of Source identification for mobile devices.pdf]
Preview

T

Tapiador, Juan E., Hernandez-Castro, Julio C., Peris-Lopez, Pedro (2012) Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management,, 20 (4). pp. 561-578. ISSN 1064-7570. (doi:10.1007/s10922-012-9246-0) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:31939)
[thumbnail of Online Randomization Strategies to Obfuscate User Behavioral Patterns.pdf]

Y

Yilmaz, Yagiz, Cetin, Orcun, Arief, Budi, Hernandez-Castro, Julio C. (2021) Investigating the Impact of Ransomware Splash Screens. Journal of Information Security and Applications, 61 . Article Number 102934. ISSN 2214-2126. E-ISSN 2214-2126. (doi:10.1016/j.jisa.2021.102934) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:92301)
[thumbnail of Preprint-InvestigatingTheImpactOfRansomwareSplashScreens.pdf] [thumbnail of 1-s2.0-S2214212621001526-main.pdf]

This list was generated on Sun Jan 16 19:53:36 2022 GMT.