dblp.uni-trier.dewww.uni-trier.de

Juan M. Estévez-Tapiador

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
43EEAgustín Orfila, Juan M. Estévez-Tapiador, Arturo Ribagorda: Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. EvoWorkshops 2009: 93-98
42EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009)
2008
41EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater: On the Salsa20 Core Function. FSE 2008: 462-469
40EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008: 589-596
39EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Nature-Inspired Synthesis of Rational Protocols. PPSN 2008: 981-990
38EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68
37EEJulio César Hernández Castro, Juan M. Estévez-Tapiador, Pedro Peris-Lopez, Jean-Jacques Quisquater: Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations CoRR abs/0811.4257: (2008)
36EEJuan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda: Cryptanalysis of the RSA-CEGD protocol CoRR abs/0812.0686: (2008)
35EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Secure content access and replication in pure P2P networks. Computer Communications 31(2): 266-279 (2008)
34EEJuan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda: On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security 3(2): 166-172 (2008)
33EEJuan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda: Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008)
32EEJuan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda: Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008)
31EEJavier Polimón, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Automated design of a lightweight block cipher with Genetic Programming. KES Journal 12(1): 3-14 (2008)
2007
30EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. DEXA Workshops 2007: 779-783
29EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794
28EEJuan M. Estévez-Tapiador, Julio César Hernández Castro, John A. Clark: Heuristic search for non-linear cryptanalytic approximations. IEEE Congress on Evolutionary Computation 2007: 3561-3568
27EEJuan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro: Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. IMA Int. Conf. 2007: 99-117
26EEEsther Palomar, Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro: Bayesian Analysis of Secure P2P Sharing Protocols. OTM Conferences (2) 2007: 1701-1717
25EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A Multi-party Rational Exchange Protocol. OTM Workshops (1) 2007: 42-43
24EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Towards Automated Design of Multi-party Rational Exchange Security Protocols. Web Intelligence/IAT Workshops 2007: 387-390
2006
23EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A Protocol for Secure Content Distribution in Pure P2P Networks. DEXA Workshops 2006: 712-716
22EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. ETRICS 2006: 396-408
21EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: A P2P Content Authentication Protocol Based on Byzantine Agreement. ETRICS 2006: 60-72
20EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Security in P2P Networks: Survey and Research Directions. EUC Workshops 2006: 183-192
19EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361
18EECarlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. PPSN 2006: 850-859
17EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170
16EEEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda: Certificate-based Access Control in Pure P2P Networks. Peer-to-Peer Computing 2006: 177-184
15EEPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda: M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923
14EEJulio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho: Steganography in games: A general methodology and its application to the game of Go. Computers & Security 25(1): 64-71 (2006)
13EEJuan M. Estévez-Tapiador: Book Review: Practical Intrusion Prevention. IEEE Distributed Systems Online 7(6): (2006)
2005
12EEAntonio Izquierdo Manzanares, Joaquín Torres Márquez, Juan M. Estévez-Tapiador, Julio César Hernández Castro: Attacks on Port Knocking Authentication Mechanism. ICCSA (4) 2005: 1292-1300
11EEAlmudena Alcaide, Juan M. Estévez-Tapiador, Antonio Izquierdo, José María Sierra: A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol. ICCSA (4) 2005: 1309-1318
10EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: Detection of Web-Based Attacks through Markovian Protocol Parsing. ISCC 2005: 457-462
9EEGabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Juan M. Estévez-Tapiador: PIM-DM Cost Analysis in Loop Free Topologies. ISCC 2005: 719-723
2004
8EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer. ICCSA (1) 2004: 841-850
7EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: Anomaly detection methods in wired networks: a survey and taxonomy. Computer Communications 27(16): 1569-1584 (2004)
6EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: Measuring normality in HTTP traffic for anomaly-based intrusion detection. Computer Networks 45(2): 175-193 (2004)
5EEJuan M. Estévez-Tapiador: Moving Web Services to the Secure Side. IEEE Distributed Systems Online 5(1): (2004)
4EEJuan M. Estévez-Tapiador: The Emergence of Cyber-Terrorism. IEEE Distributed Systems Online 5(10): (2004)
2003
3EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection. IWIA 2003: 3-12
2EEJuan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo: NSDF: a computer network system description framework and its application to network security. Computer Networks 43(5): 573-600 (2003)
1EEJuan M. Estévez-Tapiador: Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). IEEE Distributed Systems Online 4(10): (2003)

Coauthor Index

1Almudena Alcaide [11] [22] [24] [25] [26] [33] [34] [36] [39]
2Ignacio Blasco-Lopez [14]
3Julio César Hernández Castro [12] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42]
4John A. Clark (John Andrew Clark) [27] [28]
5Jesús E. Díaz-Verdejo [2] [3] [6] [7] [8] [9] [10]
6Pedro Garcia-Teodoro [2] [3] [6] [7] [8] [10]
7Antonio Izquierdo [11]
8Carlos Lamenca-Martinez [18]
9Gabriel Maciá-Fernández [9]
10Antonio Izquierdo Manzanares [12]
11Joaquín Torres Márquez [12]
12Agustín Orfila [43]
13Esther Palomar [16] [20] [21] [23] [26] [30] [35]
14Pedro Peris-Lopez [15] [17] [19] [29] [32] [37] [38] [42]
15Javier Polimón [31]
16Jean-Jacques Quisquater [37] [41]
17Arturo Ribagorda (Arturo Ribagorda Garnacho) [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [29] [30] [31] [32] [33] [34] [35] [36] [38] [39] [40] [42] [43]
18José María Sierra [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)