The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Julio César Hernández Castro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Protocol for Secure Content Distribution in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:712-716 [Conf]
  2. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:396-408 [Conf]
  3. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A P2P Content Authentication Protocol Based on Byzantine Agreement. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:60-72 [Conf]
  4. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:183-192 [Conf]
  5. César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi
    Evolving hash functions by means of genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:1861-1862 [Conf]
  6. Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda
    Genetic Cryptoanalysis of Two Rounds TEA. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2002, pp:1024-1031 [Conf]
  7. Carlos Javier Hernández Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra
    On MARS's s-boxes Strength against Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:79-83 [Conf]
  8. Julio César Hernández Castro, José María Sierra, André Seznec
    The SAC Test: A New Randomness Test, with Some Applications to PRNG Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:960-967 [Conf]
  9. Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda
    Security Issues in Network File Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:812-820 [Conf]
  10. Antonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador, Julio César Hernández Castro
    Attacks on Port Knocking Authentication Mechanism. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1292-1300 [Conf]
  11. José María Sierra, Julio César Hernández, Almudena Alcaide, Joaquín Torres Márquez
    Validating the Use of BAN LOGIC. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:851-858 [Conf]
  12. José María Sierra, Julio César Hernández, Eva Ponce, Jaime Manera
    Marketing on Internet Communications Security for Online Bank Transactions. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1301-1308 [Conf]
  13. José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda
    Protection of Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:123-128 [Conf]
  14. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    RFID Systems: A Survey on Security Threats and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:159-170 [Conf]
  15. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
    Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:374-377 [Conf]
  16. David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra
    Robust New Method in Frequency Domain Watermarking. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:166-182 [Conf]
  17. Julio César Hernández Castro, Pedro Isasi, Cristóbal Luque del Arco-Calderón
    Finding Efficient Nonlinear Functions by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:1192-1198 [Conf]
  18. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:352-361 [Conf]
  19. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Certificate-based Access Control in Pure P2P Networks. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2006, pp:177-184 [Conf]
  20. Cristóbal Luque del Arco-Calderón, Pedro Isasi Viñuela, Julio César Hernández Castro
    Forecasting Time Series by Means of Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    PPSN, 2004, pp:1061-1070 [Conf]
  21. César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela
    Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:818-827 [Conf]
  22. Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. [Citation Graph (0, 0)][DBLP]
    PPSN, 2006, pp:850-859 [Conf]
  23. Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García
    Filtering spam at e-mail server level with improved CRM114. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:207-216 [Conf]
  24. José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda
    Secure Communications in Multi-Agent Systems Protecting KQML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:305-313 [Conf]
  25. Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda
    M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:912-923 [Conf]
  26. Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Project WebOracle: Developing an advanced web server security assesment tool. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:526-529 [Conf]
  27. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a security thread. [Citation Graph (0, 0)][DBLP]
    WebNet, 2001, pp:530-533 [Conf]
  28. Julio César Hernández Castro
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  29. Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho
    Steganography in games: A general methodology and its application to the game of Go. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:1, pp:64-71 [Journal]
  30. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos
    Search Engines as a Security Threat. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:10, pp:25-30 [Journal]
  31. José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda
    Low computational cost integrity for block ciphers. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:5, pp:857-863 [Journal]
  32. Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda
    The strict avalanche criterion randomness test. [Citation Graph (0, 0)][DBLP]
    Mathematics and Computers in Simulation, 2005, v:68, n:1, pp:1-7 [Journal]
  33. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:779-783 [Conf]
  34. Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    A Multi-party Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2007, pp:42-43 [Conf]
  35. Esther Palomar, Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro
    Bayesian Analysis of Secure P2P Sharing Protocols. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1701-1717 [Conf]

  36. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]


  37. Fine-Grained Timing Using Genetic Programming. [Citation Graph (, )][DBLP]


  38. On the Salsa20 Core Function. [Citation Graph (, )][DBLP]


  39. Towards Automated Design of Multi-party Rational Exchange Security Protocols. [Citation Graph (, )][DBLP]


  40. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP]


  41. Nature-Inspired Synthesis of Rational Protocols. [Citation Graph (, )][DBLP]


  42. Steganalysis of Hydan. [Citation Graph (, )][DBLP]


  43. CSteg: Talking in C Code - Steganography of C Source Code in Text. [Citation Graph (, )][DBLP]


  44. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]


  45. Heuristic search for non-linear cryptanalytic approximations. [Citation Graph (, )][DBLP]


  46. Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. [Citation Graph (, )][DBLP]


  47. Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA. [Citation Graph (, )][DBLP]


  48. Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography. [Citation Graph (, )][DBLP]


  49. Secure content access and replication in pure P2P networks. [Citation Graph (, )][DBLP]


  50. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations [Citation Graph (, )][DBLP]


  51. Cryptanalysis of the RSA-CEGD protocol [Citation Graph (, )][DBLP]


  52. Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.422secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002