Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Hao Mao
Peter Malec
Chunghwan Son
Berni Pirollo
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Awano, Yuji
Home
/
Author
/
JULIO C. HERNANDEZ-CASTRO
Author Info
Open Visualization
Name
Affiliation
Papers
JULIO C. HERNANDEZ-CASTRO
Carlos III University of Madrid, Computer Science Department, Avda. Universidad 30, 28911, Leganés, Madrid,, Spain
54
Collaborators
Citations
PageRank
76
298
26.88
Referers
Referees
References
665
1204
618
Search Limit
100
1000
Publications (54 rows)
Collaborators (76 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators
0
0.34
2020
A Roadmap For Improving The Impact Of Anti-Ransomware Research
0
0.34
2019
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.
1
0.34
2018
Security Analysis of Contiki IoT Operating System.
1
0.35
2018
Dismantling OpenPuff PDF steganography.
0
0.34
2018
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG.
0
0.34
2018
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.
0
0.34
2018
Detecting discussion communities on vaccination in twitter.
10
0.51
2017
Economic Analysis of Ransomware.
1
0.41
2017
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.
5
0.45
2017
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override
0
0.34
2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
14
0.74
2017
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators.
0
0.34
2017
An Analysis of Bitcoin Laundry Services.
6
0.47
2017
Pitfalls in Ultralightweight Authentication Protocol Designs.
6
0.55
2016
Theia: a tool for the forensic analysis of mobile devices pictures.
0
0.34
2016
A Survey of Security and Privacy Issues in ePassport Protocols.
3
0.46
2016
Smartphone image acquisition forensics using sensor fingerprint
3
0.42
2015
Forensic analysis of video steganography tools.
1
0.35
2015
Steganalysis of OpenPuff through atomic concatenation of MP4 flags
2
0.44
2015
Automatic detection of potentially illegal online sales of elephant ivory via data mining.
0
0.34
2015
A Survey of Social Web Mining Applications for Disease Outbreak Detection.
1
0.34
2014
Measuring Software Diversity, with Applications to Security.
0
0.34
2013
A study on the false positive rate of Stegdetect.
1
0.36
2013
Source smartphone identification using sensor pattern noise and wavelet transform
4
0.46
2013
A secure distance-based RFID identification protocol with an off-line back-end database
3
0.45
2012
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol
3
0.42
2012
Online Randomization Strategies to Obfuscate User Behavioral Patterns
4
0.39
2012
Weaknesses in another Gen2-based RFID authentication protocol.
2
0.38
2012
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
42
1.43
2011
Cryptanalysis of Song's advanced smart card based password authentication protocol
5
0.44
2011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol
16
0.85
2011
Vulnerability analysis of RFID protocols for tag ownership transfer
18
0.79
2010
Lightweight Props On The Weak Security Of Epc Class-1 Generation-2 Standard
4
0.42
2010
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
12
0.63
2010
Blind Steganalysis of Mp3stego
2
0.40
2010
Security Flaws in a Recent Ultralightweight RFID Protocol
9
0.53
2009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
13
0.63
2009
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.
0
0.34
2009
Weaknesses in two recent lightweight RFID authentication protocols
11
0.58
2009
Secure content access and replication in pure P2P networks
8
0.60
2008
Automated design of a lightweight block cipher with Genetic Programming
4
0.49
2008
Bayesian rational exchange
2
0.45
2008
Towards Automated Design of Multi-party Rational Exchange Security Protocols
0
0.34
2007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags
26
1.28
2007
A multi-party rational exchange protocol
0
0.34
2007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
1
0.35
2007
Non-linear cryptanalysis revisited: heuristic search for approximations to S-boxes
5
0.41
2007
Certificate-based Access Control in Pure P2P Networks
7
0.52
2006
Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming
11
0.94
2006
1
2
50 / page