Joan Borrell

Orcid: 0000-0001-6649-0450

According to our database1, Joan Borrell authored at least 54 papers between 1991 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Message anonymity on predictable opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2023

2020
Forwarding in Opportunistic Information-Centric Networks: An Optimal Stopping Approach.
IEEE Commun. Mag., 2020

2019
Hey, influencer! Message delivery to social central nodes in social opportunistic networks.
Comput. Commun., 2019

Efficient broadcast in opportunistic networks using optimal stopping theory.
Ad Hoc Networks, 2019

2018
Cryptocurrency Networks: A New P2P Paradigm.
Mob. Inf. Syst., 2018

2017
On the Applicability of Onion Routing on Predictable Delay-Tolerant Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Measuring QoS in an Aeronautical Opportunistic Network Architecture with Limited Access to a Satellite Communications Backhaul.
Mob. Inf. Syst., 2016

2015
Methodological evaluation of architectural alternatives for an aeronautical delay tolerant network.
Pervasive Mob. Comput., 2015

Implementation and evaluation of licklider transmission protocol (LTP) in ns-3.
Proceedings of the 2015 Workshop on ns-3, 2015

2014
Analyzing information propagation in a transoceanic aircraft delay tolerant network.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

2013
Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries.
Comput. Commun., 2013

Characterization of a transoceanic aircraft delay tolerant network.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Mobile-Agent Based Delay-Tolerant Network Architecture for Non-critical Aeronautical Data Communications.
Proceedings of the Distributed Computing and Artificial Intelligence, 2013

2012
Double multiagent architecture for dynamic triage of victims in emergency scenarios.
Prog. Artif. Intell., 2012

Towards efficient access control in a mobile agent based wireless sensor network.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Flexible secure inter-domain interoperability through attribute conversion.
Inf. Sci., 2011

Fuzzy Role-Based Access Control.
Inf. Process. Lett., 2011

Heterogeneous Multiagent Architecture for Dynamic Triage of Victims in Emergency Scenarios.
Proceedings of the Advances on Practical Applications of Agents and Multiagent Systems, 2011

Intra-role Progression in RBAC: An RPG-Like Access Control Scheme.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
An efficient and secure agent code distribution service.
Softw. Pract. Exp., 2010

Promoting the development of secure mobile agent applications.
J. Syst. Softw., 2010

Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents.
Comput. Commun., 2010

2009
Protecting mobile agents from external replay attacks.
J. Syst. Softw., 2009

Full mobile agent interoperability in an IEEE-FIPA context.
J. Syst. Softw., 2009

Agent mobility architecture based on IEEE-FIPA standards.
Comput. Commun., 2009

An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

2008
Securing dynamic itineraries for mobile agent applications.
J. Netw. Comput. Appl., 2008

Preventing Coordinated Attacks Via Distributed Alert Exchange
CoRR, 2008

Distributed Exchange of Alerts for the Detection of Coordinated Attacks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2007
FIPA-based Interoperable Agent Mobility Proposal
CoRR, 2007

FIPA-Based Interoperable Agent Mobility.
Proceedings of the Multi-Agent Systems and Applications V, 2007

2006
SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Protection of Components Based on a Smart-Card Enhanced Security Module.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Protecting Mobile Agent Loops.
Proceedings of the Mobility Aware Technologies and Applications, 2005

An XML Standards Based Authorization Framework for Mobile Agents.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Amapola: A Simple Infrastructure for Ubiquitous Computing.
Proceedings of the Intelligence in Communication Systems, 2005

Decoupling Components of an Attack Prevention System Using Publish/Subscribe.
Proceedings of the Intelligence in Communication Systems, 2005

Access control with safe role assignment for mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Protecting Mobile Agent Itineraries.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Secure Mobile Agents Applications: Implementation through Platform Services.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Agent Migration over FIPA ACL Messages.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Practical Mental Poker Without a TTP Based on Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2003

2002
Implementation of Secure Architectures for Mobile Agents in MARISM-A.
Proceedings of the Mobile Agents for Telecommunication Applications, 2002

Role-Based Access Control for E-commerce Sea-of-Data Applications.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Protecting General Flexible Itineraries of Mobile Agents.
Proceedings of the Information Security and Cryptology, 2001

Design of a trust model for a secure multi-agent marketplace.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
Efficient construction of vote-tags to allow open objection to the tally in electronic elections.
Inf. Process. Lett., 2000

1999
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes.
Proceedings of the Network and Distributed System Security Symposium, 1999

1997
Large scale elections by coordinating electoral colleges.
Proceedings of the Information Security in Research and Business, 1997

1996
An implementable secure voting scheme.
Comput. Secur., 1996

1995
A Fast Algorithm To Compute Irreducible and Primitive Polynomials in Finite Fields.
Math. Syst. Theory, 1995

1991
Improving the Time Complexity of the Computation of Irreducible and Primitive Polynomials in Finite Fields.
Proceedings of the Applied Algebra, 1991


  Loading...