default search action
Juan Tapiador
Person information
- affiliation: Charles III University of Madrid, Spain
- affiliation (2009 - 2011): University of York, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Julien Gamba, Álvaro Feal, Eduardo Blázquez, Vinuri Bandara, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez:
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild. IEEE Trans. Dependable Secur. Comput. 21(4): 1801-1816 (2024) - [c70]José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Savvas Zannettou, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador:
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. ICWSM 2024: 1082-1095 - [i19]José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador:
Did I Vet You Before? Assessing the Chrome Web Store Vetting Process through Browser Extension Similarity. CoRR abs/2406.00374 (2024) - [i18]Mila Dalla Preda, Serge Egelman, Anna Maria Mandalari, Volker Stocker, Juan Tapiador, Narseo Vallina-Rodriguez:
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112). Dagstuhl Reports 14(3): 52-74 (2024) - 2023
- [j64]David Nevado Catalán, Sergio Pastrana, Narseo Vallina-Rodriguez, Juan Tapiador:
An analysis of fake social media engagement services. Comput. Secur. 124: 103013 (2023) - [j63]Eduardo Blázquez, Juan Tapiador:
Kunai: A static analysis framework for Android apps. SoftwareX 22: 101370 (2023) - [j62]Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez:
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. IEEE Trans. Software Eng. 49(4): 2964-2979 (2023) - [c69]José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador:
Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. EuroS&P 2023: 832-846 - [c68]Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David R. Choffnes, Narseo Vallina-Rodriguez:
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes. IMC 2023: 437-456 - [c67]José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador:
Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. TMA 2023: 1-10 - [c66]Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez:
Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem. USENIX Security Symposium 2023: 2115-2132 - [i17]José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador:
Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. CoRR abs/2302.00598 (2023) - [i16]José Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador:
Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API. CoRR abs/2305.11506 (2023) - [i15]José Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador:
Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem. CoRR abs/2306.14497 (2023) - 2022
- [j61]Javier Yuste, Eduardo G. Pardo, Juan Tapiador:
Optimization of code caves in malware binaries to evade machine learning detectors. Comput. Secur. 116: 102643 (2022) - [j60]Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi:
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. J. Comput. Secur. 30(6): 851-876 (2022) - [c65]Aniketh Girish, Vijay Prakash, Serge Egelman, Joel Reardon, Juan Tapiador, Danny Yuxing Huang, Srdjan Matic, Narseo Vallina-Rodriguez:
Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods. StudentWorkshop@CoNEXT 2022: 26-28 - [c64]Aniketh Girish, Juan Tapiador, Srdjan Matic, Narseo Vallina-Rodriguez:
Towards an extensible privacy analysis framework for smart homes. IMC 2022: 754-755 - [i14]Kaspar Hageman, Álvaro Feal, Julien Gamba, Aniketh Girish, Jakob Bleier, Martina Lindorfer, Juan Tapiador, Narseo Vallina-Rodriguez:
Mixed Signals: Analyzing Software Attribution Challenges in the Android Ecosystem. CoRR abs/2211.13104 (2022) - 2021
- [j59]Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis:
A year in lockdown: how the waves of COVID-19 impact internet traffic. Commun. ACM 64(7): 101-108 (2021) - [j58]Álvaro Feal, Pelayo Vallina, Julien Gamba, Sergio Pastrana, Antonio Nappa, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador:
Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting. IEEE Trans. Netw. Serv. Manag. 18(2): 1334-1349 (2021) - [c63]David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador:
The Stress as Adversarial Factor for Cyber Decision Making. ARES 2021: 101:1-101:10 - [c62]Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi:
PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes. ESORICS (1) 2021: 86-109 - [c61]David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador:
Framework Proposal to Measure the Stress as Adversarial Factor on Cyber Decision Making. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 517-536 - [c60]Eduardo Blázquez, Sergio Pastrana, Álvaro Feal, Julien Gamba, Platon Kotzias, Narseo Vallina-Rodriguez, Juan Tapiador:
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem. SP 2021: 1606-1622 - [i13]Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi:
POW-HOW: An enduring timing side-channel to evadeonline malware sandboxes. CoRR abs/2109.02979 (2021) - 2020
- [j57]Pablo Picazo-Sanchez, Juan Tapiador, Gerardo Schneider:
After you, please: browser extensions order attacks and countermeasures. Int. J. Inf. Sec. 19(6): 623-638 (2020) - [c59]Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis:
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. Internet Measurement Conference 2020: 1-18 - [c58]Pelayo Vallina, Victor Le Pochat, Álvaro Feal, Marius Paraschiv, Julien Gamba, Tim Burke, Oliver Hohlfeld, Juan Tapiador, Narseo Vallina-Rodriguez:
Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services. Internet Measurement Conference 2020: 598-618 - [c57]Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez:
An Analysis of Pre-installed Android Software. SP 2020: 1039-1055 - [i12]Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis:
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. CoRR abs/2008.10959 (2020)
2010 – 2019
- 2019
- [j56]Omid Mirzaei, José María de Fuentes, Juan E. Tapiador, Lorena González-Manzano:
AndrODet: An adaptive Android obfuscation detector. Future Gener. Comput. Syst. 90: 240-261 (2019) - [j55]Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez, Juan Tapiador, Gerardo Schneider:
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors. Future Gener. Comput. Syst. 96: 283-296 (2019) - [j54]Alejandro Calleja, Juan Tapiador, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. IEEE Trans. Inf. Forensics Secur. 14(12): 3175-3190 (2019) - [c56]Omid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini:
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. AsiaCCS 2019: 307-314 - [c55]Sergio Pastrana, Alice Hutchings, Daniel R. Thomas, Juan Tapiador:
Measuring eWhoring. Internet Measurement Conference 2019: 463-477 - [i11]Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador, Narseo Vallina-Rodriguez:
An Analysis of Pre-installed Android Software. CoRR abs/1905.02713 (2019) - [i10]Pablo Picazo-Sanchez, Juan Tapiador, Gerardo Schneider:
After You, Please: Browser Extensions Order Attacks and Countermeasures. CoRR abs/1908.02205 (2019) - 2018
- [j53]Carmen Camara, Pedro Peris-Lopez, Lorena González-Manzano, Juan E. Tapiador:
Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 68: 784-794 (2018) - [j52]Lara Ortiz-Martin, Pablo Picazo-Sanchez, Pedro Peris-Lopez, Juan E. Tapiador:
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals. Entropy 20(2): 94 (2018) - [j51]Alejandro Calleja, Alejandro Martín, Héctor D. Menéndez, Juan E. Tapiador, David Clark:
Picking on the family: Disrupting android malware triage by forcing misclassification. Expert Syst. Appl. 95: 113-126 (2018) - [c54]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. Internet Measurement Conference 2018: 293-307 - [i9]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. CoRR abs/1810.07780 (2018) - [i8]Alejandro Calleja, Juan E. Tapiador, Juan Caballero:
The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development. CoRR abs/1811.06888 (2018) - 2017
- [j50]José María de Fuentes, Lorena González-Manzano, Juan E. Tapiador, Pedro Peris-Lopez:
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. Comput. Secur. 69: 127-141 (2017) - [j49]Honorio Martín, Pedro Peris-López, Enrique San Millán, Juan E. Tapiador:
A lightweight implementation of the Tav-128 hash function. IEICE Electron. Express 14(11): 20161255 (2017) - [c53]Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes:
TriFlow: Triaging Android Applications using Speculative Information Flows. AsiaCCS 2017: 640-651 - 2016
- [j48]Jorge Blasco, Thomas M. Chen, Juan E. Tapiador, Pedro Peris-Lopez:
A Survey of Wearable Biometric Recognition Systems. ACM Comput. Surv. 49(3): 43:1-43:35 (2016) - [j47]Ana Isabel González-Tablas Ferreres, Juan E. Tapiador:
Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs. Sensors 16(5): 674 (2016) - [j46]Honorio Martín, Pedro Peris-Lopez, Juan E. Tapiador, Enrique San Millán:
A New TRNG Based on Coherent Sampling With Self-Timed Rings. IEEE Trans. Ind. Informatics 12(1): 91-100 (2016) - [j45]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware. IEEE Trans. Mob. Comput. 15(4): 789-802 (2016) - [c52]Sergio Pastrana, Juan E. Tapiador, Guillermo Suarez-Tangil, Pedro Peris-López:
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices. DIMVA 2016: 58-77 - [c51]Alejandro Calleja, Juan E. Tapiador, Juan Caballero:
A Look into 30 Years of Malware Development from a Software Metrics Perspective. RAID 2016: 325-345 - [c50]Alejandro Martín, Alejandro Calleja, Héctor D. Menéndez, Juan E. Tapiador, David Camacho:
ADROIT: Android malware detection using meta-information. SSCI 2016: 1-8 - 2015
- [j44]José María de Fuentes, Pedro Peris-Lopez, Juan E. Tapiador, Sergio Pastrana:
Probabilistic yoking proofs for large scale IoT systems. Ad Hoc Networks 32: 43-52 (2015) - [j43]Sergio Pastrana, Juan E. Tapiador, Agustín Orfila, Pedro Peris-Lopez:
DEFIDNET: A framework for optimal allocation of cyberdefenses in Intrusion Detection Networks. Comput. Networks 80: 66-88 (2015) - [j42]Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Juan E. Tapiador, Rolando Salazar-Hernández:
Automatic generation of HTTP intrusion signatures by selective identification of anomalies. Comput. Secur. 55: 159-174 (2015) - [j41]Carmen Camara, Pedro Peris-Lopez, Juan E. Tapiador:
Security and privacy issues in implantable medical devices: A comprehensive survey. J. Biomed. Informatics 55: 272-289 (2015) - [j40]Carmen Camara, Pedro Peris-Lopez, Juan E. Tapiador:
Human Identification Using Compressed ECG Signals. J. Medical Syst. 39(11): 148:1-148:10 (2015) - [j39]Jorge Blasco Alís, Juan E. Tapiador, Pedro Peris-Lopez, Guillermo Suarez-Tangil:
Hindering data theft with encrypted data trees. J. Syst. Softw. 101: 147-158 (2015) - [j38]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Sergio Pastrana:
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive Mob. Comput. 18: 137-151 (2015) - [j37]Juan E. Tapiador, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos:
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. IEEE Trans. Dependable Secur. Comput. 12(3): 312-325 (2015) - [c49]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. NSS 2015: 63-77 - [c48]Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador:
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. WISTP 2015: 36-51 - 2014
- [j36]Manuel Gil Pérez, Juan E. Tapiador, John A. Clark, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Trustworthy placements: Improving quality and resilience in collaborative attack detection. Comput. Networks 58: 70-86 (2014) - [j35]Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro:
Thwarting Obfuscated Malware via Differential Fault Analysis. Computer 47(6): 24-31 (2014) - [j34]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Arturo Ribagorda:
Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Commun. Surv. Tutorials 16(2): 961-987 (2014) - [j33]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Jorge Blasco Alís:
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families. Expert Syst. Appl. 41(4): 1104-1117 (2014) - [j32]Sergio Pastrana, Agustín Orfila, Juan E. Tapiador, Pedro Peris-Lopez:
Randomized Anagram revisited. J. Netw. Comput. Appl. 41: 182-196 (2014) - [j31]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. Secur. Commun. Networks 7(6): 945-949 (2014) - [j30]Pablo Picazo-Sanchez, Juan E. Tapiador, Pedro Peris-López, Guillermo Suarez-Tangil:
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks. Sensors 14(12): 22619-22642 (2014) - [j29]Honorio Martín, Pedro Peris-Lopez, Juan E. Tapiador, Enrique San Millán:
An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms. IEEE Trans. Ind. Informatics 10(2): 1216-1225 (2014) - [c47]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez:
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. Inscrypt 2014: 496-515 - [c46]Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez:
Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models. ESORICS (1) 2014: 183-201 - 2013
- [j28]Juan E. Tapiador, John A. Clark:
The placement-configuration problem for intrusion detection nodes in wireless sensor networks. Comput. Electr. Eng. 39(7): 2306-2317 (2013) - [j27]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6". IEEE Commun. Lett. 17(4): 805-807 (2013) - [j26]Pablo Picazo-Sanchez, Nasour Bagheri, Pedro Peris-Lopez, Juan E. Tapiador:
Two RFID Standard-based Security Protocols for Healthcare Environments. J. Medical Syst. 37(5): 9962 (2013) - [c45]Jorge L. Hernandez-Ardieta, Juan E. Tapiador, Guillermo Suarez-Tangil:
Information sharing models for cooperative cyber defence. CyCon 2013: 1-28 - 2012
- [j25]Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. Comput. Secur. 31(4): 557-568 (2012) - [j24]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. Int. J. Found. Comput. Sci. 23(2): 543-553 (2012) - [j23]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez:
Online Randomization Strategies to Obfuscate User Behavioral Patterns. J. Netw. Syst. Manag. 20(4): 561-578 (2012) - [i7]Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador:
Cryptanalysis of RAPP, an RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2012: 702 (2012) - 2011
- [j22]Juan E. Tapiador, John A. Clark:
Masquerade mimicry attack detection: A randomised approach. Comput. Secur. 30(5): 297-310 (2011) - [j21]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Jan C. A. van der Lubbe:
Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6): 1061-1069 (2011) - [c44]Juan E. Tapiador, Mudhakar Srivatsa, John A. Clark, John A. McDermid:
Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing. Networking Workshops 2011: 207-218 - [i6]Juan E. Tapiador, Julio C. Hernandez-Castro, Pedro Peris-Lopez, John A. Clark:
Cryptanalysis of Song's advanced smart card based password authentication protocol. CoRR abs/1111.2744 (2011) - 2010
- [j20]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Yingjiu Li:
Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Networks 54(9): 1502-1508 (2010) - [j19]Julio C. Hernandez-Castro, Juan E. Tapiador, Esther Palomar, Angel Romero-Gonzalex:
Blind Steganalysis of Mp3stego. J. Inf. Sci. Eng. 26(5): 1787-1799 (2010) - [c43]Juan E. Tapiador, John A. Clark:
Learning Autonomic Security Reconfiguration Policies. CIT 2010: 902-909 - [c42]Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li:
Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Inscrypt 2010: 427-442 - [c41]David Robert White, Juan E. Tapiador, Julio César Hernández Castro, John A. Clark:
Fine-Grained Timing Using Genetic Programming. EuroGP 2010: 325-336 - [c40]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Modelling Uncertain and Time-Dependent Security Labels in MLS Systems. ICETE (Selected Papers) 2010: 158-171 - [c39]Juan E. Tapiador, John A. Clark:
Information-Theoretic Detection of Masquerade Mimicry Attacks. NSS 2010: 183-190 - [c38]Julio César Hernández Castro, Pedro Peris-Lopez, Raphael C.-W. Phan, Juan M. Estévez-Tapiador:
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol. RFIDSec 2010: 22-34 - [c37]John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13
2000 – 2009
- 2009
- [j18]Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Comput. Commun. 32(7-10): 1185-1193 (2009) - [j17]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j16]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j15]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c36]Sevil Sen, John A. Clark, Juan E. Tapiador:
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks. ADHOCNETS 2009: 224-239 - [c35]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe:
Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Inscrypt 2009: 383-392 - [c34]Hao Chen, John A. Clark, Juan E. Tapiador, Siraj A. Shaikh, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. CISIS 2009: 101-108 - [c33]Agustín Orfila, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. EvoWorkshops 2009: 93-98 - [c32]Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro Peris-Lopez, John A. Clark, El-Ghazali Talbi:
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. IPDPS 2009: 1-5 - [c31]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. SEC 2009: 132-142 - [c30]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe:
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments. SEWCN 2009: 25-35 - [i5]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. CoRR abs/0906.4618 (2009) - [i4]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Jan C. A. van der Lubbe:
Security Flaws in a Recent Ultralightweight RFID Protocol. CoRR abs/0910.2115 (2009) - 2008
- [j14]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. Comput. Commun. 31(2): 266-279 (2008) - [j13]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008) - [j12]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of Syverson's Rational Exchange Protocol. Int. J. Netw. Secur. 7(2): 151-156 (2008) - [j11]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) - [j10]Javier Polimón, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Automated design of a lightweight block cipher with Genetic Programming. Int. J. Knowl. Based Intell. Eng. Syst. 12(1): 3-14 (2008) - [j9]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda:
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Trans. Inf. Forensics Secur. 3(2): 166-172 (2008) - [c29]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. FSE 2008: 462-469 - [c28]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008: 589-596 - [c27]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Nature-Inspired Synthesis of Rational Protocols. PPSN 2008: 981-990 - [c26]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008: 399-406 - [c25]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68 - [i3]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations. CoRR abs/0811.4257 (2008) - [i2]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of the RSA-CEGD protocol. CoRR abs/0812.0686 (2008) - 2007
- [c24]Juan M. Estévez-Tapiador, Julio César Hernández Castro, John A. Clark:
Heuristic search for non-linear cryptanalytic approximations. IEEE Congress on Evolutionary Computation 2007: 3561-3568 - [c23]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. DEXA Workshops 2007: 779-783 - [c22]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794 - [c21]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Towards Automated Design of Multi-party Rational Exchange Security Protocols. Web Intelligence/IAT Workshops 2007: 387-390 - [c20]Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro:
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. IMACC 2007: 99-117 - [c19]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A Multi-party Rational Exchange Protocol. OTM Workshops (1) 2007: 42-43 - [c18]Esther Palomar, Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro:
Bayesian Analysis of Secure P2P Sharing Protocols. OTM Conferences (2) 2007: 1701-1717 - [c17]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SECPerU 2007: 55-60 - 2006
- [j8]Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. Comput. Secur. 25(1): 64-71 (2006) - [j7]Juan M. Estévez-Tapiador:
Book Review: Practical Intrusion Prevention. IEEE Distributed Syst. Online 7(6) (2006) - [c16]Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho, Benjamín Ramos Álvarez:
Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming. IEEE Congress on Evolutionary Computation 2006: 192-199 - [c15]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A Protocol for Secure Content Distribution in Pure P2P Networks. DEXA Workshops 2006: 712-716 - [c14]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A P2P Content Authentication Protocol Based on Byzantine Agreement. ETRICS 2006: 60-72 - [c13]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. ETRICS 2006: 396-408 - [c12]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Security in P2P Networks: Survey and Research Directions. EUC Workshops 2006: 183-192 - [c11]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170 - [c10]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361 - [c9]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Certificate-based Access Control in Pure P2P Networks. Peer-to-Peer Computing 2006: 177-184 - [c8]Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. PPSN 2006: 850-859 - [c7]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923 - 2005
- [c6]Antonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador, Julio César Hernández Castro:
Attacks on Port Knocking Authentication Mechanism. ICCSA (4) 2005: 1292-1300 - [c5]Almudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra:
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. ICCSA (4) 2005: 1309-1318 - [c4]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Detection of Web-Based Attacks through Markovian Protocol Parsing. ISCC 2005: 457-462 - [c3]Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Juan M. Estévez-Tapiador:
PIM-DM Cost Analysis in Loop Free Topologies. ISCC 2005: 719-723 - [i1]Juan M. Estévez-Tapiador, Almudena Alcaide:
Unfairness of a protocol for certified delivery. IACR Cryptol. ePrint Arch. 2005: 40 (2005) - 2004
- [j6]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Measuring normality in HTTP traffic for anomaly-based intrusion detection. Comput. Networks 45(2): 175-193 (2004) - [j5]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Anomaly detection methods in wired networks: a survey and taxonomy. Comput. Commun. 27(16): 1569-1584 (2004) - [j4]Juan M. Estévez-Tapiador:
Moving Web Services to the Secure Side. IEEE Distributed Syst. Online 5(1) (2004) - [j3]Juan M. Estévez-Tapiador:
The Emergence of Cyber-Terrorism. IEEE Distributed Syst. Online 5(10) (2004) - [c2]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. ICCSA (1) 2004: 841-850 - 2003
- [j2]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
NSDF: a computer network system description framework and its application to network security. Comput. Networks 43(5): 573-600 (2003) - [j1]Juan M. Estévez-Tapiador:
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). IEEE Distributed Syst. Online 4(10) (2003) - [c1]Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. IWIA 2003: 3-12
Coauthor Index
aka: Julio C. Hernandez-Castro
aka: Pedro Peris-López
aka: Arturo Ribagorda Garnacho
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint