Julio César Hernández Castro
Orcid: 0000-0002-6432-5328Affiliations:
- University of Kent, Canterbury, UK
- Charles III University of Madrid, Madrid, Spain (former)
According to our database1,
Julio César Hernández Castro
authored at least 172 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., April, 2024
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection.
J. Univers. Comput. Sci., 2024
A Metric to Assess the Reliability of Crowd-sourced SUS Scores: A Case Study on the PoPLar Authentication Tool.
Proceedings of the 2024 European Symposium on Usable Security, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
2023
Further analysis of the statistical independence of the NIST SP 800-22 randomness tests.
Appl. Math. Comput., December, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party Applications.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Security and Artificial Intelligence, 2022
IEEE Trans. Inf. Forensics Secur., 2022
J. Inf. Secur. Appl., 2022
Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2).
Entropy, 2022
Appl. Math. Comput., 2022
Responding to Targeted Stealthy Attacks on Android Using Timely-Captured Memory Dumps.
IEEE Access, 2022
Proceedings of the International Conference on Deep Learning, 2022
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022
2021
J. Netw. Comput. Appl., 2021
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone.
IEEE Access, 2021
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators.
ACM Trans. Priv. Secur., 2020
Proceedings of the Security and Trust Management - 16th International Workshop, 2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the Secure IT Systems, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Sensors, 2018
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
Sensors, 2018
Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification.
Proceedings of the Security Standardisation Research - 4th International Conference, 2018
Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks, 2018
2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Inf. Forensics Secur., 2017
Future Gener. Comput. Syst., 2017
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Evolutionary generation and degeneration of randomness to assess the indepedence of the Ent test battery.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017
2016
IEEE Trans. Mob. Comput., 2016
Image source acquisition identification of mobile devices based on the use of features.
Multim. Tools Appl., 2016
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptol. ePrint Arch., 2016
Expert Syst. Appl., 2016
ACM Comput. Surv., 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
2015
Automatic detection of potentially illegal online sales of elephant ivory via data mining.
PeerJ Comput. Sci., 2015
IET Comput. Vis., 2015
Digit. Investig., 2015
Comput. Secur., 2015
2014
Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol.
J. Comput. Appl. Math., 2014
A genetic tango attack against the David-Prasad RFID ultra-lightweight authentication protocol.
Expert Syst. J. Knowl. Eng., 2014
Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections.
Computing, 2014
Proceedings of the Intelligent Distributed Computing VIII, 2014
2013
Proceedings of the 5th International Conference on Imaging for Crime Detection and Prevention, 2013
2012
A secure distance-based RFID identification protocol with an off-line back-end database.
Pers. Ubiquitous Comput., 2012
J. Netw. Syst. Manag., 2012
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol.
Int. J. Found. Comput. Sci., 2012
Comput. Secur., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
2011
J. Netw. Comput. Appl., 2011
Cryptanalysis of Cho <i>et al.</i>'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.
Eng. Appl. Artif. Intell., 2011
CoRR, 2011
On the Strength of Egglue and Other Logic CAPTCHAs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011
Proceedings of the 17th IEEE International On-Line Testing Symposium (IOLTS 2011), 2011
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
IEICE Trans. Inf. Syst., 2010
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels.
IEEE Commun. Lett., 2010
Comput. Networks, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Proceedings of the Genetic Programming, 13th European Conference, 2010
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng., 2009
Comput. Stand. Interfaces, 2009
Comput. Stand. Interfaces, 2009
CoRR, 2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Comput. Commun., 2009
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Int. J. Knowl. Based Intell. Eng. Syst., 2008
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng., 2008
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR, 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
CSteg: Talking in C Code - Steganography of C Source Code in Text.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Parallel Problem Solving from Nature, 2008
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
Proceedings of the Modelling, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags.
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
Proceedings of the IEEE Congress on Evolutionary Computation, 2007
2006
Comput. Secur., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Parallel Problem Solving from Nature, 2006
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Personal Wireless Communications, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
New Gener. Comput., 2005
New Gener. Comput., 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Inf. Secur. J. A Glob. Perspect., 2004
Hiding Data in Games.
J. Int. Comput. Games Assoc., 2004
Future Gener. Comput. Syst., 2004
Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography.
Comput. Intell., 2004
Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA.
Comput. Intell., 2004
Secure Communications in Multi-Agent Systems Protecting KQML.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Parallel Problem Solving from Nature, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
On the design of state-of-the-art pseudorandom number generators by means of genetic programming.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004
2003
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science and Its Applications, 2003
2002
Proceedings of the Computational Science - ICCS 2002, 2002
2001
Cryptologia, 2001
Search Engines as a security thread.
Proceedings of WebNet 2001, 2001
Project WebOracle: Developing an advanced web server security assesment tool.
Proceedings of WebNet 2001, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Proceedings of the Cryptography and Coding, 2001