| 2009 |
| 43 | EE | Agustín Orfila,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming.
EvoWorkshops 2009: 93-98 |
| 42 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification.
J. Inf. Sci. Eng. 25(1): 33-57 (2009) |
| 2008 |
| 41 | EE | Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Jean-Jacques Quisquater:
On the Salsa20 Core Function.
FSE 2008: 462-469 |
| 40 | EE | Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol.
MCO 2008: 589-596 |
| 39 | EE | Almudena Alcaide,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Nature-Inspired Synthesis of Rational Protocols.
PPSN 2008: 981-990 |
| 38 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol.
WISA 2008: 56-68 |
| 37 | EE | Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Pedro Peris-Lopez,
Jean-Jacques Quisquater:
Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
CoRR abs/0811.4257: (2008) |
| 36 | EE | Juan M. Estévez-Tapiador,
Almudena Alcaide,
Julio César Hernández Castro,
Arturo Ribagorda:
Cryptanalysis of the RSA-CEGD protocol
CoRR abs/0812.0686: (2008) |
| 35 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Secure content access and replication in pure P2P networks.
Computer Communications 31(2): 266-279 (2008) |
| 34 | EE | Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Almudena Alcaide,
Arturo Ribagorda:
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels.
IEEE Transactions on Information Forensics and Security 3(2): 166-172 (2008) |
| 33 | EE | Juan M. Estévez-Tapiador,
Almudena Alcaide,
Julio César Hernández Castro,
Arturo Ribagorda:
Bayesian rational exchange.
Int. J. Inf. Sec. 7(1): 85-100 (2008) |
| 32 | EE | Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Pedro Peris-Lopez,
Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions.
J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) |
| 31 | EE | Javier Polimón,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
Automated design of a lightweight block cipher with Genetic Programming.
KES Journal 12(1): 3-14 (2008) |
| 2007 |
| 30 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security.
DEXA Workshops 2007: 779-783 |
| 29 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks.
EUC Workshops 2007: 781-794 |
| 28 | EE | Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
John A. Clark:
Heuristic search for non-linear cryptanalytic approximations.
IEEE Congress on Evolutionary Computation 2007: 3561-3568 |
| 27 | EE | Juan M. Estévez-Tapiador,
John A. Clark,
Julio César Hernández Castro:
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes.
IMA Int. Conf. 2007: 99-117 |
| 26 | EE | Esther Palomar,
Almudena Alcaide,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro:
Bayesian Analysis of Secure P2P Sharing Protocols.
OTM Conferences (2) 2007: 1701-1717 |
| 25 | EE | Almudena Alcaide,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
A Multi-party Rational Exchange Protocol.
OTM Workshops (1) 2007: 42-43 |
| 24 | EE | Almudena Alcaide,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Towards Automated Design of Multi-party Rational Exchange Security Protocols.
Web Intelligence/IAT Workshops 2007: 387-390 |
| 2006 |
| 23 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
A Protocol for Secure Content Distribution in Pure P2P Networks.
DEXA Workshops 2006: 712-716 |
| 22 | EE | Almudena Alcaide,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information.
ETRICS 2006: 396-408 |
| 21 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
A P2P Content Authentication Protocol Based on Byzantine Agreement.
ETRICS 2006: 60-72 |
| 20 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Security in P2P Networks: Survey and Research Directions.
EUC Workshops 2006: 183-192 |
| 19 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags.
OTM Workshops (1) 2006: 352-361 |
| 18 | EE | Carlos Lamenca-Martinez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming.
PPSN 2006: 850-859 |
| 17 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions.
PWC 2006: 159-170 |
| 16 | EE | Esther Palomar,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro,
Arturo Ribagorda:
Certificate-based Access Control in Pure P2P Networks.
Peer-to-Peer Computing 2006: 177-184 |
| 15 | EE | Pedro Peris-Lopez,
Julio César Hernández Castro,
Juan M. Estévez-Tapiador,
Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags.
UIC 2006: 912-923 |
| 14 | EE | Julio César Hernández Castro,
Ignacio Blasco-Lopez,
Juan M. Estévez-Tapiador,
Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go.
Computers & Security 25(1): 64-71 (2006) |
| 13 | EE | Juan M. Estévez-Tapiador:
Book Review: Practical Intrusion Prevention.
IEEE Distributed Systems Online 7(6): (2006) |
| 2005 |
| 12 | EE | Antonio Izquierdo Manzanares,
Joaquín Torres Márquez,
Juan M. Estévez-Tapiador,
Julio César Hernández Castro:
Attacks on Port Knocking Authentication Mechanism.
ICCSA (4) 2005: 1292-1300 |
| 11 | EE | Almudena Alcaide,
Juan M. Estévez-Tapiador,
Antonio Izquierdo,
José María Sierra:
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol.
ICCSA (4) 2005: 1309-1318 |
| 10 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
Detection of Web-Based Attacks through Markovian Protocol Parsing.
ISCC 2005: 457-462 |
| 9 | EE | Gabriel Maciá-Fernández,
Jesús E. Díaz-Verdejo,
Juan M. Estévez-Tapiador:
PIM-DM Cost Analysis in Loop Free Topologies.
ISCC 2005: 719-723 |
| 2004 |
| 8 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer.
ICCSA (1) 2004: 841-850 |
| 7 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
Anomaly detection methods in wired networks: a survey and taxonomy.
Computer Communications 27(16): 1569-1584 (2004) |
| 6 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
Measuring normality in HTTP traffic for anomaly-based intrusion detection.
Computer Networks 45(2): 175-193 (2004) |
| 5 | EE | Juan M. Estévez-Tapiador:
Moving Web Services to the Secure Side.
IEEE Distributed Systems Online 5(1): (2004) |
| 4 | EE | Juan M. Estévez-Tapiador:
The Emergence of Cyber-Terrorism.
IEEE Distributed Systems Online 5(10): (2004) |
| 2003 |
| 3 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection.
IWIA 2003: 3-12 |
| 2 | EE | Juan M. Estévez-Tapiador,
Pedro Garcia-Teodoro,
Jesús E. Díaz-Verdejo:
NSDF: a computer network system description framework and its application to network security.
Computer Networks 43(5): 573-600 (2003) |
| 1 | EE | Juan M. Estévez-Tapiador:
Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin).
IEEE Distributed Systems Online 4(10): (2003) |