|
Search the dblp DataBase
Julio César Hernández Castro:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2006, pp:712-716 [Conf]
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:396-408 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:60-72 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:183-192 [Conf]
- César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi
Evolving hash functions by means of genetic programming. [Citation Graph (0, 0)][DBLP] GECCO, 2006, pp:1861-1862 [Conf]
- Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda
Genetic Cryptoanalysis of Two Rounds TEA. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (3), 2002, pp:1024-1031 [Conf]
- Carlos Javier Hernández Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra
On MARS's s-boxes Strength against Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2003, pp:79-83 [Conf]
- Julio César Hernández Castro, José María Sierra, André Seznec
The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:960-967 [Conf]
- Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:812-820 [Conf]
- Antonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador, Julio César Hernández Castro
Attacks on Port Knocking Authentication Mechanism. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2005, pp:1292-1300 [Conf]
- José María Sierra, Julio César Hernández, Almudena Alcaide, Joaquín Torres Márquez
Validating the Use of BAN LOGIC. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:851-858 [Conf]
- José María Sierra, Julio César Hernández, Eva Ponce, Jaime Manera
Marketing on Internet Communications Security for Online Bank Transactions. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2005, pp:1301-1308 [Conf]
- José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda
Protection of Multiagent Systems. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2003, pp:123-128 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP] PWC, 2006, pp:159-170 [Conf]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:374-377 [Conf]
- David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra
Robust New Method in Frequency Domain Watermarking. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:166-182 [Conf]
- Julio César Hernández Castro, Pedro Isasi, Cristóbal Luque del Arco-Calderón
Finding Efficient Nonlinear Functions by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP] KES, 2003, pp:1192-1198 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:352-361 [Conf]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2006, pp:177-184 [Conf]
- Cristóbal Luque del Arco-Calderón, Pedro Isasi Viñuela, Julio César Hernández Castro
Forecasting Time Series by Means of Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP] PPSN, 2004, pp:1061-1070 [Conf]
- César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela
Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. [Citation Graph (0, 0)][DBLP] PPSN, 2006, pp:818-827 [Conf]
- Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP] PPSN, 2006, pp:850-859 [Conf]
- Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García
Filtering spam at e-mail server level with improved CRM114. [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:207-216 [Conf]
- José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP] WOSIS, 2004, pp:305-313 [Conf]
- Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] UIC, 2006, pp:912-923 [Conf]
- Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Project WebOracle: Developing an advanced web server security assesment tool. [Citation Graph (0, 0)][DBLP] WebNet, 2001, pp:526-529 [Conf]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Search Engines as a security thread. [Citation Graph (0, 0)][DBLP] WebNet, 2001, pp:530-533 [Conf]
- Julio César Hernández Castro
Guest Editorial. [Citation Graph (0, 0)][DBLP] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
- Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho
Steganography in games: A general methodology and its application to the game of Go. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:1, pp:64-71 [Journal]
- Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
Search Engines as a Security Threat. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:10, pp:25-30 [Journal]
- José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda
Low computational cost integrity for block ciphers. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2004, v:20, n:5, pp:857-863 [Journal]
- Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda
The strict avalanche criterion randomness test. [Citation Graph (0, 0)][DBLP] Mathematics and Computers in Simulation, 2005, v:68, n:1, pp:1-7 [Journal]
- Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2007, pp:779-783 [Conf]
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2007, pp:42-43 [Conf]
- Esther Palomar, Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro
Bayesian Analysis of Secure P2P Sharing Protocols. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1701-1717 [Conf]
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]
Fine-Grained Timing Using Genetic Programming. [Citation Graph (, )][DBLP]
On the Salsa20 Core Function. [Citation Graph (, )][DBLP]
Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP]
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP]
Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP]
Steganalysis of Hydan. [Citation Graph (, )][DBLP]
CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP]
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]
Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP]
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP]
Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA. [Citation Graph (, )][DBLP]
Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography. [Citation Graph (, )][DBLP]
Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP]
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP]
Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP]
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks [Citation Graph (, )][DBLP]
Search in 0.026secs, Finished in 0.030secs
|