Name
Affiliation
Papers
JULIO C. HERNANDEZ-CASTRO
Carlos III University of Madrid, Computer Science Department, Avda. Universidad 30, 28911, Leganés, Madrid,, Spain
54
Collaborators
Citations 
PageRank 
76
298
26.88
Referers 
Referees 
References 
665
1204
618
Search Limit
1001000
Title
Citations
PageRank
Year
Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators00.342020
A Roadmap For Improving The Impact Of Anti-Ransomware Research00.342019
Digital Image Tamper Detection Technique Based on Spectrum Analysis of CFA Artifacts.10.342018
Security Analysis of Contiki IoT Operating System.10.352018
Dismantling OpenPuff PDF steganography.00.342018
Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG.00.342018
Digital Images Authentication Technique Based on DWT, DCT and Local Binary Patterns.00.342018
Detecting discussion communities on vaccination in twitter.100.512017
Economic Analysis of Ransomware.10.412017
A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.50.452017
Earworms Make Bad Passwords: An Analysis of the Nokē Smart Lock Manual Override00.342017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.140.742017
Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators.00.342017
An Analysis of Bitcoin Laundry Services.60.472017
Pitfalls in Ultralightweight Authentication Protocol Designs.60.552016
Theia: a tool for the forensic analysis of mobile devices pictures.00.342016
A Survey of Security and Privacy Issues in ePassport Protocols.30.462016
Smartphone image acquisition forensics using sensor fingerprint30.422015
Forensic analysis of video steganography tools.10.352015
Steganalysis of OpenPuff through atomic concatenation of MP4 flags20.442015
Automatic detection of potentially illegal online sales of elephant ivory via data mining.00.342015
A Survey of Social Web Mining Applications for Disease Outbreak Detection.10.342014
Measuring Software Diversity, with Applications to Security.00.342013
A study on the false positive rate of Stegdetect.10.362013
Source smartphone identification using sensor pattern noise and wavelet transform40.462013
A secure distance-based RFID identification protocol with an off-line back-end database30.452012
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol30.422012
Online Randomization Strategies to Obfuscate User Behavioral Patterns40.392012
Weaknesses in another Gen2-based RFID authentication protocol.20.382012
Flaws on RFID grouping-proofs. Guidelines for future sound protocols421.432011
Cryptanalysis of Song's advanced smart card based password authentication protocol50.442011
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol160.852011
Vulnerability analysis of RFID protocols for tag ownership transfer180.792010
Lightweight Props On The Weak Security Of Epc Class-1 Generation-2 Standard40.422010
Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels120.632010
Blind Steganalysis of Mp3stego20.402010
Security Flaws in a Recent Ultralightweight RFID Protocol90.532009
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard130.632009
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments.00.342009
Weaknesses in two recent lightweight RFID authentication protocols110.582009
Secure content access and replication in pure P2P networks80.602008
Automated design of a lightweight block cipher with Genetic Programming40.492008
Bayesian rational exchange20.452008
Towards Automated Design of Multi-party Rational Exchange Security Protocols00.342007
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags261.282007
A multi-party rational exchange protocol00.342007
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security10.352007
Non-linear cryptanalysis revisited: heuristic search for approximations to S-boxes50.412007
Certificate-based Access Control in Pure P2P Networks70.522006
Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming110.942006
  • 1
  • 2