scispace - formally typeset
J

Julio C. Hernandez-Castro

Researcher at University of Kent

Publications -  152
Citations -  3434

Julio C. Hernandez-Castro is an academic researcher from University of Kent. The author has contributed to research in topics: Authentication & Authentication protocol. The author has an hindex of 24, co-authored 141 publications receiving 2993 citations. Previous affiliations of Julio C. Hernandez-Castro include Carlos III Health Institute & Complutense University of Madrid.

Papers
More filters
Book ChapterDOI

M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags

TL;DR: In this paper, the authors proposed a lightweight mutual authentication protocol for low-cost RFID tags that offers an adequate security level for certain applications, which could be implemented even in the most limited lowcost tags as it only needs around 300 gates.
Book ChapterDOI

EMAP: an efficient mutual-authentication protocol for low-cost RFID tags

TL;DR: This work proposes an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.
Book ChapterDOI

Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol

TL;DR: Gossamer is presented, a new protocol inspired by the recently published SASI scheme that is designed to avoid the problems of the past and is examined in some deep its security and performance.
Book ChapterDOI

RFID systems: a survey on security threats and proposed solutions

TL;DR: The present article surveys the most important technical security challenges of RFID systems, addressing both the functional aspects and the security risks and threats associated to its use.
Journal ArticleDOI

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation

TL;DR: This paper introduces DeepCAPTCHA, a new and secure CAPTCHA scheme based on adversarial examples, an inherit limitation of the current DL networks, and implements a proof of concept system, which shows that the scheme offers high security and good usability compared with the best previously existing CAPTCHAs.