School of Computing

Publications by Dr Julio Hernandez-Castro

Also view these in the Kent Academic Repository

Article
Osadchy, M. et al. (2017). No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation. IEEE Transactions on Information Forensics and Security [Online]. Available at: http://dx.doi.org/10.1109/TIFS.2017.2718479.
Roberts, D. and Hernandez-Castro, J. (2017). Bycatch and illegal wildlife trade on the dark web. Oryx [Online] 51:393-394. Available at: https://doi.org/10.1017/S0030605317000679.
Orozco, A. et al. (2016). Theia: a tool for the forensic analysis of mobile devices pictures. Computing [Online] 98:1251-1286. Available at: https://doi.org/10.1007/s00607-015-0482-5.
Avoine, G. et al. (2016). A Survey of Security and Privacy Issues in ePassport Protocols. ACM Computing Surveys [Online] 48:1-37. Available at: https://doi.org/10.1145/2825026.
Harrison, J., Roberts, D. and Hernandez-Castro, J. (2016). Assessing the extent and nature of wildlife trade on the dark web. Conservation Biology [Online] 30:900-904. Available at: http://dx.doi.org/10.1111/cobi.12707.
Bello, G., Hernandez-Castro, J. and Camacho, D. (2016). Detecting discussion communities on vaccination in twitter. Future Generation Computer Systems [Online] 66:125-136. Available at: http://dx.doi.org/10.1016/j.future.2016.06.032.
Barnes, D. and Hernandez-Castro, J. (2015). On the limits of engine analysis for cheating detection in chess. Computers and Security [Online] 48:58-73. Available at: http://dx.doi.org/10.1016/j.cose.2014.10.002.
Sandoval Orozco, A. et al. (2015). Smartphone image acquisition forensics using sensor fingerprint. Institute of Engineering and Technology, Computer Vision, [Online] 9:723-731. Available at: http://dx.doi.org/10.1049/iet-cvi.2014.0243.
Hernandez-Castro, J. and Roberts, D. (2015). Automatic detection of potentially illegal online sales of elephant ivory via data mining. PeerJ Computer Science [Online] 1:e10:1-11. Available at: http://dx.doi.org/10.7717/peerj-cs.10.
Sandoval Orozco, A. et al. (2015). Image source acquisition identification of mobile devices based on the use of features. Multimedia Tools and Applications [Online] 75:7087-7111. Available at: https://doi.org/10.1007/s11042-015-2633-2.
Bowles, S. and Hernandez-Castro, J. (2015). The first 10 years of the Trojan Horse defence. Computer Fraud & Security [Online] 2015:5-13. Available at: http://dx.doi.org/10.1016/S1361-3723(15)70005-9.
Sandoval Orozco, A. et al. (2014). Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications [Online] 74:4735-4763. Available at: http://dx.doi.org/10.1007/s11042-013-1837-6.
Hernandez-Castro, J. and Boiten, E. (2014). Cybercrime prevalence and impact in the UK. Computer Fraud & Security [Online] 2014:5-8. Available at: http://dx.doi.org/10.1016/S1361-3723(14)70461-0.
Safkhani, M. et al. (2014). Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics [Online] 259:571-577. Available at: http://dx.doi.org/10.1016/j.cam.2013.09.073.
Barrero, D. et al. (2014). A genetic tango attack against the DavidPrasad RFID ultralightweight authentication protocol. Expert Systems [Online] 31:9-19. Available at: http://dx.doi.org/10.1111/j.1468-0394.2012.00652.x.
Sandoval Orozco, A. et al. (2013). Source identification for mobile devices, based on wavelet transforms combined with sensor imperfections. Computing [Online] 96:829-841. Available at: http://dx.doi.org/10.1007/s00607-013-0313-5.
Khalil, O., Hernandez-Castro, J. and Asis, B. (2013). A study on the false positive rate of Stegdetect. Digital Investigation [Online] 9:235-245. Available at: http://dx.doi.org/10.1016/j.diin.2013.01.004.
Picazo Sanchez, P. et al. (2013). Cryptanalysis of the RNTS system. The Journal of Supercomputing [Online] 65:949-960. Available at: http://dx.doi.org/10.1007/s11227-013-0873-3.
Hernandez-Castro, J. et al. (2012). Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol. International Journal of Foundations of Computer Science [Online] 23:543-553. Available at: http://dx.doi.org/10.1142/S0129054112400278.
Tapiador, J., Hernandez-Castro, J. and Peris-Lopez, P. (2012). Online Randomization Strategies to Obfuscate User Behavioral Patterns. Journal of Network and Systems Management, [Online] 20:561-578. Available at: http://dx.doi.org/10.1007/s10922-012-9246-0.
Blasco Alis, J. et al. (2012). A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications [Online] 35:491-501. Available at: http://dx.doi.org/10.1016/j.jnca.2011.10.003.
Blasco Alis, J. et al. (2012). Bypassing information leakage protection with trusted applications. Computers and Security [Online] 31:557-568. Available at: http://dx.doi.org/10.1016/j.cose.2012.01.008.
Peris-Lopez, P. et al. (2012). A secure distance-based RFID identification protocol with an off-line back-end database. Personal and Ubiquitous Computing [Online] 16:351-365. Available at: http://dx.doi.org/10.1007/s00779-011-0396-y.
Peris-Lopez, P. et al. (2011). Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence [Online] 24:1061-1069. Available at: http://dx.doi.org/10.1016/j.engappai.2011.04.001.
Peris-Lopez, P. et al. (2011). Flaws on RFID grouping-proofs. Guidelines for future sound protocols. Journal of Network and Computer Applications [Online] 34:833-845. Available at: http://dx.doi.org/10.1016/j.jnca.2010.04.008.
Hernandez-Castro, J. et al. (2010). Blind Steganalysis of Mp3stego. Journal of Information Science and Engineering 26:1787-1799.
Peris-Lopez, P. et al. (2010). Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Networks [Online] 54:1502-1508. Available at: http://dx.doi.org/10.1016/j.comnet.2009.11.007.
Mitrokotsa, A. et al. (2010). Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters [Online] 14:121-123. Available at: http://dx.doi.org/10.1109/LCOMM.2010.02.091946.
Peris-Lopez, P., Li, T. and Hernandez-Castro, J. (2010). Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. IEICE Transactions on information and systems [Online] E93-D:518-527. Available at: http://dx.doi.org/10.1587/transinf.E93.D.518.
Peris-Lopez, P. et al. (2009). An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. Journal of Information Science and Engineering 25:33-57.
Peris-Lopez, P. et al. (2009). Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces [Online] 31:372-380. Available at: http://dx.doi.org/10.1016/j.csi.2008.05.012.
Peris-Lopez, P. et al. (2009). Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. Computer Communications [Online] 32:1185-1193. Available at: http://dx.doi.org/10.1016/j.comcom.2009.03.010.
Peris-Lopez, P. et al. (2009). LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards and Interfaces [Online] 31:88-97. Available at: http://dx.doi.org/10.1016/j.csi.2007.11.013.
Estevez Tapiador, J. et al. (2008). On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Transactions on Information Forensics and Security [Online] 3:166-172. Available at: http://dx.doi.org/10.1109/TIFS.2008.920724.
Alcaide, A. et al. (2008). Bayesian rational exchange. International Journal of Information Security [Online] 7:85-100. Available at: http://dx.doi.org/10.1007/s10207-007-0039-5.
Polimon, J. et al. (2008). Automated design of a lightweight block cipher with Genetic Programming. International Journal of Knowledge-based and Intelligent Engineering Systems - Genetic Programming An Emerging Engineering Too 12:3-14.
Hernandez-Castro, J. et al. (2008). Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. Journal of Information Science and Engineering 24:1485-1504.
Palomar, E. et al. (2008). Secure content access and replication in pure P2P networks. Computer Communications [Online] 31:266-279. Available at: http://dx.doi.org/10.1016/j.comcom.2007.08.015.
Alcaide, A. et al. (2008). Cryptanalysis of Syverson's Rational Exchange Protocol. International Journal of Network Security 7:151-156.
Conference or workshop item
de Balthasar, T. and Hernandez-Castro, J. (2017). An Analysis of Bitcoin Laundry Services. in: NordSec2017 - Nordic Conference on Secure IT Systems. Springer-Verlag Berlin.
Bello Orgaz, G., Hernandez-Castro, J. and Camacho, D. (2015). A Survey of Social Web Mining Applications for Disease Outbreak Detection. Available at: http://link.springer.com/chapter/10.1007/978-3-319-10422-5_36.
Corripio, J. et al. (2013). Source Smartphone Identification Using Sensor Pattern Noise and Wavelet Transform. in: The 5th International Conference on Imaging for Crime Detection and Prevention.. Available at: http://www.icdp-conf.org/.
Internet publication
Hernandez-Castro, J. and Boiten, E. (2015). UK has little to be proud of as survey reveals sorry state of European cybersecurity [Internet only]. Available at: https://theconversation.com/uk-has-little-to-be-proud-of-as-survey-reveals-sorry-state-of-european-cybersecurity-37505.
Boiten, E. and Hernandez-Castro, J. (2014). Targeted 'malvertising' reveals move towards more sophisticated hacks [Internet only]. Available at: https://theconversation.com/targeted-malvertising-reveals-move-towards-more-sophisticated-hacks-33294.
Boiten, E. and Hernandez-Castro, J. (2014). Can you really be identified on Tor or is that just what the cops want you to believe? [Internet only]. Available at: https://theconversation.com/can-you-really-be-identified-on-tor-or-is-that-just-what-the-cops-want-you-to-believe-29430.
Hernandez-Castro, J., Boiten, E. and Barnoux, M. (2014). Second Kent Cyber Security Survey [Internet only]. Available at: http://www.kent.ac.uk/news/stories/Cybercrime_survey2/2014.
Hernandez-Castro, J. and Boiten, E. (2013). First Kent Cyber Security Survey [Internet only]. Available at: http://www.cyber.kent.ac.uk/Survey1.pdf.
Total publications in KAR: 47 [See all in KAR]

School of Computing, University of Kent, Canterbury, Kent, CT2 7NF

Enquiries: +44 (0)1227 824180 or contact us.

Last Updated: 23/10/2017