jet

Juan Tapiador

Associate Professor
Department of Computer Science
Universidad Carlos III de Madrid

Contact:  
Profiles:
















Publications

Papers in journals

  1. Picking on the Family: Disrupting Android Malware Triage by Forcing Misclassification
    A. Calleja, A. Martin, H.D. Menendez, J. Tapiador, D. Clark
    Expert Systems with Applications, To appear. [pdf] [doi]

  2. PRACIS: Privacy-preserving and Aggregatable Cybersecurity Information Sharing
    J.M. de Fuentes, L. Gonzalez-Manzano, J. Tapiador, P. Peris-Lopez
    Computers & Security, 69:127-141 (2017) [pdf] [doi]

  3. Real-time electrocardiogram streams for continuous authentication
    C. Camara, P. Peris-Lopez, L. Gonzalez-Manzano, J. Tapiador
    Applied Soft Computing, In press [pdf] [doi]

  4. A lightweight implementation of the Tav-128 hash function
    H. Martin, P. Peris-Lopez, E. San Millan, J. Tapiador
    IEICE Electronics Express 14(11), 20161255-20161255 (2017), [pdf] [doi]

  5. A Survey of Wearable Biometric Recognition Systems
    J. Blasco, T.M. Chen, J. Tapiador, P. Peris-Lopez
    ACM Computing Surveys 49(3), 43 (2016) [pdf] [doi]

  6. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs
    A.I. González-Tablas, JE Tapiador
    Sensors 16(5), 674 (2016) [pdf] [doi]

  7. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
    G. Suarez-Tangil, J.E. Tapiador, F. Lombardi, R. Di Pietro
    IEEE Transactions on Mobile Computing, 15(4):789-802 (2016) [pdf] [doi]

  8. A New TRNG based on Coherent Sampling with Self-timed Rings
    H. Martin, P. Peris-Lopez, J.E. Tapiador, E. San Millan
    IEEE Transactions on Industrial Informatics, 12(1):91-100 (2016) [pdf] [doi]

  9. A Non-invasive Multi-modal Human Identification System combining ECG, GSR and Airflow Biosignals
    C. Camara, P. Peris-Lopez, J.E. Tapiador, G. Suarez-Tangil
    Journal of Medical and Biological Engineering, 35(6):735-748 (2015) [pdf] [doi]

  10. Automatic generation of HTTP intrusion signatures by selective identification of anomalies
    P. Garcia-Teodoro, J.E. Diaz-Verdejo, J.E. Tapiador, R. Salazar-Hernandez
    Computers & Security, 55:159-174 (2015) [pdf] [doi]

  11. Human Identification Using Compressed ECG Signals
    C. Camara, P. Peris-Lopez, J.E. Tapiador
    Journal of Medical Systems, 39(11):148 (2015) [pdf] [doi]

  12. Probabilistic Yoking Proofs for Large Scale IoT Systems
    J.M. de Fuentes, P. Peris-Lopez, J.E. Tapiador, S. Pastrana
    Ad Hoc Networks, 32:43-52 (2015) [pdf] [doi]

  13. Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey
    C. Camara, P. Peris-Lopez, J.E. Tapiador
    Journal of Biomedical Informatics, 55:272-289 (2015) [pdf] [doi]

  14. Key-Recovery Attacks on KIDS, A Keyed Anomaly Detection System
    J.E. Tapiador, A Orfila, A. Ribagorda, B. Ramos
    IEEE Transactions on Dependable and Secure Computing, 12(3):212-325 (2015) [pdf] [doi]

  15. Power-aware Anomaly Detection in Smartphones: An Analysis of On-Platform versus Externalized Operation
    G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez, S. Pastrana
    Pervasive and Mobile Computing, 18:137-151 (2015) [pdf] [doi]

  16. DEFIDNET: A Framework For Optimal Allocation of Cyberdefenses in Intrusion Detection Networks
    S. Pastrana, J.E. Tapiador, A. Orfila, P. Peris-Lopez
    Computer Networks, 80:66-88 (2015) [pdf] [doi]

  17. Hindering Data Theft with Encrypted Data Trees
    J. Blasco, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil
    Journal of Systems and Software, 101:147-158 (2015) [pdf] [doi]

  18. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks
    P. Picazo, J.E. Tapiador, P. Peris-Lopez, G. Suarez-Tangil
    Sensors, 14(12):22619-22642 (2014) [pdf] [doi]

  19. Thwarting Obfuscated Malware via Differential Fault Analysis
    G. Suarez-Tangil, F. Lombardi, J.E. Tapiador, R. Di Pietro
    IEEE Computer, 47(6):24-31 (2014) [pdf] [doi]

  20. Evolution, Detection and Analysis of Malware in Smart Devices
    G. Suarez-Tangil, J.E. Tapiador, P. Peris, A. Ribagorda
    IEEE Communications Surveys & Tutorials, 16(2):961-987 (2014) [pdf] [doi]

  21. An Estimator for the ASIC Footprint Area of Lightweight Cryptographic Algorithms
    H. Martin, P. Peris, J.E. Tapiador, E. San Millan
    IEEE Transactions on Industrial Informatics, 10(2):1216-1225 (2014) [pdf] [doi]

  22. Weaknesses in New Ultralightweight RFID Authentication Protocol with Permutation - RAPP
    N. Bagheri, M. Safkhani, P. Peris, J.E. Tapiador
    Security and Communication Networks, 7(6):945–949 (2014) [pdf] [doi]

  23. Randomized Anagram Revisited
    S. Pastrana, A. Orfila, J.E. Tapiador, P. Peris
    Journal of Network and Computer Applications, 41:182-196 (2014) [pdf] [doi]

  24. Trustworthy Placements: Improving Quality and Resilience in Collaborative Attack Detection
    M. Gil, J.E. Tapiador, J.A. Clark, G. Martinez, A.F. Skarmeta
    Computer Networks, 58:70-86 (2014) [pdf] [doi]

  25. Dendroid: A Text Mining Approach to Analyzing and Classifying Code Structures in Android Malware Families
    G. Suarez-Tangil, J.E. Tapiador, P. Peris, J. Blasco
    Expert Systems With Applications, 41(4):1104-1117 (2014) [pdf] [doi]

  26. The Placement-Configuration Problem for Intrusion Detection Nodes in Wireless Sensor Networks
    J.E. Tapiador, J.A. Clark
    Computers & Electrical Engineering, 39(7):2306-2317 (2013) [pdf] [doi]

  27. Two RFID Standard-based Security Protocols for Healthcare Environments
    P. Picazo, N. Bagheri, P. Peris, J.E. Tapiador
    Journal of Medical Systems, 37(5):9962 (2013) [pdf] [doi]

  28. Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols
    H. Martin, E. San Millan, P. Peris, J.E. Tapiador
    IEEE Sensors Journal, 13(10):3537-3547 (2013) [pdf] [doi]

  29. Comments on "Security Improvement of an RFID Security Protocol of ISO/IEC WD 29167-6"
    N. Bagheri, M. Safkhani, P. Peris, J.E. Tapiador
    IEEE Communications Letters, 17(4):805-807 (2013) [pdf] [doi]

  30. Online Randomization Strategies to Obfuscate User Behavioral Patterns
    J.E. Tapiador, J.C. Hernandez-Castro, P. Peris
    Journal of Network and Systems Management, 20(4):561-578 (2012) [pdf] [doi]

  31. Bypassing Information Leakage Protection with Trusted Applications
    J. Blasco, J.C. Hernandez-Castro, J.E. Tapiador, A. Ribagorda
    Computers & Security, 31(4):557-568 (2012) [pdf] [doi]

  32. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol
    J.C. Hernandez-Castro, J.E. Tapiador, P. Peris, J.A. Clark, E.-G Talbi
    Int. J. Foundations of Computer Science, 23(2):543-553 (2012) [pdf] [doi]

  33. Masquerade Mimicry Attack Detection: A Randomized Approach
    J.E. Tapiador, J.A. Clark
    Computers & Security, 30:297-310 (2011) [pdf] [doi]

  34. Cryptanalysis of an EPC Class-1 Generation-2 Standard Compliant Authentication Protocol
    P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe
    Engineering Applications of Artificial Intelligence, 24(6):1061-1069 (2011) [pdf] [doi]

  35. Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
    P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, T. Li, Y. Li
    Computer Networks, 54(9):1502-1508 (2010) [pdf] [doi]

  36. Blind Steganalysis of MP3Stego
    J.C. Hernandez-Castro, J.E. Tapiador, E. Palomar, A. Romero
    Journal of Information Science and Engineering, 26(5):1787-1799 (2010) [pdf] [doi]

  37. Highly Entangled Multi-qubit States with Simple Algebraic Structure
    J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark, S. Stepney
    J. Phys. A: Math. Theor., 42 (2009) 415301 [pdf] [doi]

  38. Practical Attacks on a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard
    P. Peris, T. Li, J.C. Hernandez-Castro, J.M.E. Tapiador
    Computer Communications, 32(7-10):1185-1193 (2009) [pdf] [doi]

  39. An Ultralight Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    Journal of Information Science and Engineering, 25(1):33-57 (2009) [pdf] [doi]

  40. Cryptanalysis of a Novel Authentication Protocol Conforming EPC-C1G2 Standard
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    Computer Standards & Interfaces, 31(2):372-380 (2009) [pdf] [doi]

  41. LAMED - A PRNG for EPC Class-1 Generation-2 RFID Specification
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    Computer Standards & Interfaces, 31(1):88-97 (2009) [pdf] [doi]

  42. On the Distinguishability of Distance-bounded Permutations in Ordered Channels
    J.M.E. Tapiador, J.C. Hernandez-Castro, A. Alcaide, A. Ribagorda
    IEEE Transactions on Information Forensics and Security, 3(2):166-172 (2008) [pdf] [doi]

  43. Automated Synthesis of Multiparty Rational Exchange Security Protocols
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    International Transactions on Systems Science and Applications, 4(4):312-321 (2008)

  44. Automated Design of a Lightweight Block Cipher with Genetic Programming
    J. Polimon, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    International Journal of Knowledge-Based and Intelligent Engineering Systems, 12(1):3-14 (2008) [pdf] [doi]

  45. Cryptanalysis of Syverson's Rational Exchange Protocol
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    International Journal of Network Security, 7(2):190-195 (2008) [pdf] [doi]

  46. Automated Design of Cryptographic Hash Schemes by Evolving Highly Non-Linear Functions
    J.M.E. Tapiador, J.C. Hernandez-Castro, P. Peris, A. Ribagorda
    Journal of Information Science and Engineering, 24(5):1485-1504 (2008) [pdf] [doi]

  47. Secure Content Access and Replication in Pure P2P Networks
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    Computer Communications, 31(2):266-279 (2008) [pdf] [doi]

  48. Bayesian Rational Exchange
    J.M.E. Tapiador, A. Alcaide, J.C. Hernandez-Castro, A. Ribagorda
    International Journal of Information Security, 7(1):85-100 (2008) [pdf] [doi]

  49. Steganography in Games: A General Methodology and its Application to the Game of Go
    J.C. Hernandez-Castro, I. Blasco-Lopez, J.M.E. Tapiador, A. Ribagorda
    Computers & Security, 25(1):64-71 (2006) [pdf] [doi]

  50. Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    Computer Communications, 27(16):1569-1584 (2004) [pdf] [doi]

  51. Measuring Normality in HTTP Traffic for Anomaly-based Intrusion Detection
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    Computer Networks, 45(2):175-193 (2004) [pdf] [doi]

  52. NSDF: A Computer Network System Description Framework and its Application to Network Security
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    Computer Networks, 43(5):573-600 (2003) [pdf] [doi]


Papers in conferences and workshops
  1. A Runtime Monitoring System to Secure Browser Extensions
    R. Pardo, P. Picazo-Sanchez, G. Schneider, J. Tapiador
    HotSpot 2017 [pdf] [doi]

  2. TriFlow: Triaging Android Applications using Speculative Information Flows
    O. Mirzaei, G. Suarez-Tangil, J. Tapiador, J.M. de Fuentes
    ASIACCS 2017 [pdf] [doi]

  3. A Look into 30 Years of Malware Development from a Software Metrics Perspective
    A. Calleja, J. Tapiador, J. Caballero
    RAID 2016, LNCS 9854:325-345 [pdf] [doi]

  4. ADROIT: Android Malware Detection using Meta--information
    A. Martin, A. Calleja, H.D. Menendez, J. Tapiador, D. Camacho
    SSCI 2016 [pdf]

  5. AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
    S. Pastrana, J. Tapiador, G. Suarez-Tangil, J.E. Tapiador
    DIMVA 2016, LNCS 9721:58-77 [pdf] [doi]

  6. Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach
    G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez
    NSS 2015, LNCS 9408:63-77 [pdf] [doi]
    Best Paper Honorable Mention Award

  7. Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-based Protocols
    A. Calleja, P. Peris-Lopez, J.E. Tapiador
    WISTP 2015, LNCS 9311:36-51 [pdf] [doi]

  8. Hardware Trojans in TRNGs
    H. Martin, P. Peris-Lopez, J.E. Tapiador, E. San Millan, N. Sklavos
    TRUDEVICE 2015 [pdf]

  9. Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
    G. Suarez-Tangil, J.E. Tapiador, P. Peris-Lopez
    INSCRYPT 2014, LNCS 8957:496-515 [pdf] [doi]

  10. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models
    G. Suarez-Tangil, M. Conti, J.E. Tapiador, P. Peris-Lopez
    ESORICS 2014, LNCS 8712:183-201 [pdf] [doi]

  11. Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols
    M. Safkhani, N. Bagheri, P. Peris-Lopez, J.E. Tapiador
    ISCTURKEY 2014 [pdf]

  12. An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training
    J.L. Hernandez-Ardieta, D. Santos, P. Parra, J.E. Tapiador, P. Peris-Lopez, J. Lopez, G. Fernandez Navarrete
    Future Security 2014 [pdf]

  13. Information Sharing Models for Cooperative Cyberdefense
    J. Lopez Hernandez-Ardieta, J.E. Tapiador, G. Suarez-Tangil
    CYCON 2013, pp. 1-28 [pdf] doi]

  14. Decorrelating WSN Traffic Patterns with Maximally Uninformative Constrained Routing
    J.E. Tapiador, M. Srivatsa, J.A. Clark, J.A. McDermid
    WCNS 2011, LNCS 6827:207-218 [pdf] [doi]

  15. Information-Theoretic Detection of Masquerade Mimicry Attacks
    J.E. Tapiador, J.A. Clark
    NSS 2010, pp. 183-190 [pdf] [doi]

  16. Learning Autonomic Security Reconfiguration Policies
    J.E. Tapiador, J.A. Clark
    IEEE TSP 2010, pp. 902-909 [pdf] [doi]

  17. Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
    J.C. Hernandez-Castro, P. Peris, R.C.-W. Phan, J.E. Tapiador
    RFIDSec 2010, LNCS 6370:22-34 [pdf] [doi]

  18. Passive Cryptanalysis of an Ultralightweight Authentication Protocol of RFIDsec'10 Asia
    P. Peris, J.C.Hernandez-Castro, R.C.-W. Phan, J.E. Tapiador, T. Li
    RFIDSec 2010 [pdf]

  19. Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol
    J.C. Hernandez-Castro, P. Peris, R.C.-W. Phan, J.E. Tapiador, T. Li
    INSCRYPT 2010 [pdf]

  20. Risk Based Access Control with Uncertain and Time-dependent Sensitivity
    J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett
    SECRYPT 2010, pp. 5-13 [pdf]

  21. Fine-Grained Timing using Genetic Programming
    D.R. White, J.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark
    EuroGP 2010, LNCS 6021:325-336 [pdf] [doi]

  22. Security Flaws in a Recent Ultralightweight RFID Protocol
    P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe
    RFIDSec Asia 2010 [pdf]

  23. Cryptographic Puzzles and Distance-bounding Protocols: Practical Tools for RFID Security
    P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, E. Palomar, J.C.A. van der Lubbe
    IEEE RFID 2010, pp. 45-52 [pdf] [doi]

  24. Weaknesses in Two Recent Lightweight RFID Authentication Protocols
    P. Peris, J.C. Hernandez-Castro, J.E. Tapiador, J.C.A. van der Lubbe
    INSCRYPT 2009, LNCS 6151:383-392 [pdf] [doi]

  25. Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Enviroments
    P. Peris-Lopez, J.C. Hernandez-Castro, J.E. Tapiador, E. San Millan, J.C.A. van der Lubbe
    SEWCN 2009 (in conjunction with SecureComm 2009) [pdf] [doi]

  26. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
    S. Sen, J.A. Clark, J.E. Tapiador
    AdHocNets 2009, pp. 224--239 [pdf] [doi]

  27. A Multi-Objective Optimisation Approach to IDS Sensor Placement
    H. Chen, J.A. Clark, J.E. Tapiador, S.A. Shaikh, H. Chivers, P. Nobles
    CISIS 2009 [pdf]

  28. Effects of Cooperation-based Peer-to-Peer Authentication on System Performance
    E. Palomar, A. Ribagorda, J.E. Tapiador, J.C. Hernandez-Castro
    Workshop on Secure Multimedia Communication and Services (SECMCS'09), pp. 444-448 [pdf] [doi]

  29. Weaknesses in Two Recent Lightweight RFID Authentication Protocols
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, T. Li, and J.C.A. van der Lubbe
    RFIDSec 2009 [pdf]

  30. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations
    J.C. Hernandez-Castro, J.M.E. Tapiador, P. Peris-Lopez, T. Li, J.-J. Quisquater
    Int. Workshop on Coding and Cryptography 2009 [pdf]

  31. Evolving High-speed, Easy-to-understand Network Intrusion Detection Rules with Genetic Programming
    A. Orfila, J.M.E. Tapiador, A. Ribagorda
    EvoCOMNET 2009, LNCS 5484:93-98 [pdf] [doi]

  32. Metaheuristic Traceability Attack against SLMAP, an RFID Lightweight Authentication Protocol
    J.C. Hernandez-Castro, J.M.E. Tapiador, P. Peris-Lopez, John A. Clark, El-Ghazali Talbi
    ISPDP 2009, pp. 1-5 [pdf] [doi]

  33. Steganalysis of Hydan
    J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, M.A. Orellana
    SEC 2009, IFIP 297:132-142 [pdf] [doi]

  34. Advances on Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    WISA 2008, LNCS 5379:56-68 [pdf] [doi]

  35. Ayin - A Collision-free Function for Low-cost RFID Systems
    J.C. Hernandez-Castro, J.M.E. Tapiador, N. Veyrat-Charvillon, J.-J. Quisquater
    META 2008 [pdf]

  36. Non-Standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
    J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    MCO 2008, pp. 589-596 [pdf] [doi]

  37. Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard
    P. Peris, T. Li, L. Tong-Lee, J.C. Hernandez-Castro, J.M.E. Tapiador
    RFIDSec 2008 [pdf] [doi]

  38. Nature-inspired Synthesis of Rational Protocols
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    PPSN 2008, LNCS 5199:981-990 [pdf] [doi]

  39. CSteg: Talking in C Code
    J. Blasco, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    SECRYPT 2008, pp. 399-406 [pdf]

  40. On the Salsa20 Core Function
    J.C. Hernandez-Castro, J.M.E. Tapiador, J.-J. Quisquater
    FSE 2008, LNCS 5086:462-469 [pdf] [doi]

  41. Non-Linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-boxes
    J.M.E. Tapiador, J.A. Clark, J.C. Hernandez-Castro
    IMA Conf. Crypto and Coding 2007, LNCS 4887:99-117 [pdf] [doi]

  42. Bayesian Analysis of Secure P2P Sharing Protocols
    E. Palomar, A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro
    IS 2007 (OTM Workshops), LNCS 4804:1701-1717 [pdf] [doi]

  43. A Multi-party Rational Exchange Protocol
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    IS 2007 (OTM Workshops), LNCS 4805:42-43 [pdf] [doi]

  44. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    SECUBIQ 2007 (EUC Workshops), LNCS 4809:781-794 [pdf] [doi]

  45. Towards Automated Design of Multi-party Rational Exchange
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    RRS 2007, pp. 387-390 [pdf] [doi]

  46. A P2P File-Sharing Protocol based on Cryptographic Puzzles
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    DBISP2P 2007 [pdf]

  47. Cryptanalysis of a Novel Authentication Protocol Conforming EPC-C1G2 Standard
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    RFIDSec 2007 [pdf] [doi]

  48. Heuristic Search for Non-Linear Cryptanalytic Approximations
    J.M.E. Tapiador, J.C. Hernandez-Castro, J.A. Clark
    CEC 2007 [pdf] [doi]

  49. Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    PDMST 2007 (DEXA Workshps), pp. 779-783 [pdf] [doi]

  50. Solving the Simultaneously Scanning Problem Anonymously: Clumping Proofs for RFID Tags
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    SecPerU 2007, pp. 55-60 [pdf] [doi]

  51. EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID Tags
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    IS 2006 (OTM Workshops), LNCS 4277:352-361 [pdf] [doi]

  52. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    RFIDSec 2006 [pdf] [doi]

  53. Certificate-based Access Control in Pure P2P Networks
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    P2P 2006, pp. 177-184 [pdf] doi]

  54. A Protocol for Secure Content Distribution in Pure P2P Networks
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    PDMST 2006 (DEXA), pp. 712-716 [pdf] [doi]

  55. Lamar: A New Pseudorandom Number Generator Evolved by means of Genetic Programming
    C. Lamenca, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    PPSN 2006, LNCS 4193:850-859 [pdf] [doi]

  56. M2AP: A Minimalist Mutual Authentication Protocol for Low-cost RFID tags
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    UIC 2006, LNCS 4159:912-923 [pdf] [doi]

  57. Security in P2P Networks: Survey and Research Directions
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    EUC 2006, LNCS 4097:183-192 [pdf] [doi]

  58. RFID Systems: A Survey on Security Threats and Proposed Solutions
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    PWC 2006, LNCS 4217:159-170 [pdf] [doi]

  59. A P2P Content Authentication Protocol based on Byzantine Agreement
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    ETRICS 2006, LNCS 3995:60-72 [pdf] [doi]

  60. An Extended Model of Rational Exchange based on Dynamic Games of Imperfect Information
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    ETRICS 2006, LNCS 3995:396-408 [pdf] [doi]

  61. Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming
    J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda, B. Ramos
    CEC 2006, pp.192-199 [pdf] [doi]

  62. PIM-DM Cost Analysis in Loop-Free Topologies
    G. Macia, J.E. Diaz-Verdejo, J.M.E. Tapiador
    ISCC 2005, pp. 719-723 [pdf] [doi]

  63. Detection of Web-based Attacks through Markovian Protocol Parsing
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    ISCC 2005, pp. 457-462 [pdf] [doi]

  64. Attacks on Port-Knocking Authentication Mechanism
    A. Izquierdo, J. Torres, J.M.E. Tapiador, J.C. Hernandez
    ICCSA 2005, LNCS 3483:1292-1300 [pdf] [doi]

  65. A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
    A. Alcaide, J.M.E. Tapiador, A. Izquierdo, J.M. Sierra
    ICCSA 2005, LNCS 3483:1309-1318 [pdf] [doi]

  66. Integral Multimedia System for Non-Presential Teacher-Student Advisory through Internet
    J.L. Castro Lopez, P. Garcia-Teodoro, J.M.E. Tapiador, J.E. Diaz-Verdejo, J.M. Lopez-Soler, J.J. Ramos-Munoz
    ICEISTA 2004, pp. 268-273 [pdf]

  67. N3: A Geometrical Approach for Network Intrusion Detection at the Application Layer
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    ICCSA 2004, LNCS 3043:841-850 [pdf] [doi]

  68. SIPRE: A System for Non-presential Lab Teaching
    P. Garcia-Teodoro, J.E. Diaz-Verdejo, J.M.E. Tapiador, J.A. Prieto-Verdejo, A. Grijalba-Martinez, G. Fernandez-Perez
    ICNUE 2003 [pdf]

  69. Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection
    J.M.E. Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo
    IWIA 2003, pp. 3-12 [pdf] [doi]


Chapters in books

  1. Modelling Uncertain and Time-dependent Security Labels in MLS Systems
    J.A. Clark, J.E. Tapiador, J. McDermid, P.-C. Cheng, D. Agrawal, N. Ivanic, D. Sloggett
    In E-business and Telecommunications
    Communications in Computer and Information Science Vol. 222, pp. 158-171. Springer-Verlag, 2012.

  2. Security Threats in Mobile Ad Hoc Networks
    S. Şen, J.A. Clark, J.E. Tapiador
    In Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
    Auerbach Publications (CRC Press), 2010.

  3. Attacking RFID Systems P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    In Security in RFID and Sensor Networks, Chapter 2, pp. 29-48
    Auerbach Publications (CRC Press), 2009.

  4. Lightweight Cryptography for RFID Systems
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    In Security in RFID and Sensor Networks, Chapter 6, pp. 121-150
    Auerbach Publications (CRC Press), 2009.

  5. Secure Content Distribution in Pure Peer-to-Peer and Ad Hoc Networks
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    In Handbook of Research on Secure Multimedia Distribution, Chapter 20
    IGI Global, 2009.

  6. Trends, Problems and Misconceptions on Testing Network Intrusion Detection Systems Effectiveness
    A. Orfila, J.M.E. Tapiador, A. Ribagorda
    In Computer Security: Intrusion, Detection and Prevention. Chapter 3, pp. 51-62
    Nova Publishers, 2009.

  7. Game Theory and Cooperation Analysis
    A. Alcaide, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    In Cooperative Wireless Communication. Chapter 9, pp. 191-208
    Auerbach Publications (CRC Press), 2009.

  8. Cooperation-based Security in P2P and Mobile Ad Hoc Networks
    E. Palomar, J.M.E. Tapiador, J.C. Hernandez-Castro, A. Ribagorda
    In Cooperative Wireless Communication. Chapter 17, pp. 391-412
    Auerbach Publications (CRC Press), 2009.

  9. RFID Specification Revisited
    P. Peris, J.C. Hernandez-Castro, J.M.E. Tapiador, A. Ribagorda
    In The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems. Chapter 6, pp. 127-156
    Auerbach Publications (CRC Press), 2008.