Jordi Herrera-Joancomartí

Orcid: 0000-0002-4935-4681

According to our database1, Jordi Herrera-Joancomartí authored at least 85 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federify: A Verifiable Federated Learning Scheme Based on zkSNARKs and Blockchain.
IEEE Access, 2024

Decision Tree Based Inference of Lightning Network Client Implementations.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2024

2022
Apples and Oranges: On How to Measure Node Centrality in Payment Channel Networks.
IEEE Access, 2022

2020
A fair protocol for data trading based on Bitcoin transactions.
Future Gener. Comput. Syst., 2020

BArt: Trading digital contents through digital assets.
Concurr. Comput. Pract. Exp., 2020

On the Selection of the LN Client Implementation Parameters.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

2019
Improving Classification of Interlinked Entities Using Only the Network Structure.
Int. J. Softw. Eng. Knowl. Eng., 2019

LockDown: Balance Availability Attack against Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

On the Difficulty of Hiding the Balance of Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Cryptocurrency Networks: A New P2P Paradigm.
Mob. Inf. Syst., 2018

Bitcoin private key locked transactions.
Inf. Process. Lett., 2018

Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Monero - Privacy in the Blockchain.
IACR Cryptol. ePrint Arch., 2018

2017
k-Degree anonymity and edge selection: improving data utility in large networks.
Knowl. Inf. Syst., 2017

Double-spending Prevention for Bitcoin zero-confirmation transactions.
IACR Cryptol. ePrint Arch., 2017

Analysis of the Bitcoin UTXO set.
IACR Cryptol. ePrint Arch., 2017

A survey of graph-modification techniques for privacy-preserving on networks.
Artif. Intell. Rev., 2017

On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course.
Proceedings of the Technology Enhanced Assessment, 20th International Conference, 2017

Smart contracts based on blockchain for logistics management.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Reputation and Reward: Two Sides of the Same Bitcoin.
Sensors, 2016

Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

2015
Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks.
Proceedings of the Advanced Research in Data Privacy, 2015

A Summary of k k -Degree Anonymous Methods for Privacy-Preserving on Networks.
Proceedings of the Advanced Research in Data Privacy, 2015

Remarks on Peinado <i>et al.</i>'s Analysis of J3Gen.
Sensors, 2015

Anonymizing graphs: measuring quality for clustering.
Knowl. Inf. Syst., 2015

When users become sensors: can we trust their readings?
Int. J. Commun. Syst., 2015

An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
On the similarity of commercial EPC Gen2 pseudorandom number generators.
Trans. Emerg. Telecommun. Technol., 2014

The Bitcoin P2P Network.
Proceedings of the Financial Cryptography and Data Security, 2014

Research and Challenges on Bitcoin Anonymity.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
J3Gen: A PRNG for Low-Cost Passive RFID.
Sensors, 2013

OSN Crawling Schedulers and Their Implications on <i>k</i>-Plexes Detection.
Int. J. Intell. Syst., 2013

Evolutionary Algorithm for Graph Anonymization.
CoRR, 2013

Improving Relational Classification Using Link Prediction Techniques.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Improving Automatic Edge Selection for Relational Classification.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Analyzing the Impact of Edge Modifications on Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Crowdsensing Simulation Using ns-3.
Proceedings of the Citizen in Sensor Networks - Second International Workshop, 2013

An algorithm for <i>k</i>-degree anonymity on large networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Towards secure mobile P2P applications using JXME.
J. Internet Serv. Inf. Secur., 2012

Comparing Random-Based and k-Anonymity-Based Algorithms for Graph Anonymization.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

Classifying Online Social Network Users through the Social Graph.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents.
Proceedings of the Citizen in Sensor Networks - First International Workshop, 2012

2011
A Fair and Secure Cluster Formation Process for Ad Hoc Networks.
Wirel. Pers. Commun., 2011

A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
Wirel. Pers. Commun., 2011

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices.
Future Internet, 2011

Online Social Honeynets: Trapping Web Crawlers in OSN.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

2010
XML-based security for JXTA core protocols.
Int. J. Auton. Comput., 2010

JXTA resource access control by means of advertisement encryption.
Future Gener. Comput. Syst., 2010

Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.
Proceedings of the Financial Cryptography and Data Security, 2010

JXTA Security in Mobile Constrained Devices.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

OSN: When Multiple Autonomous Users Disclose Another Individual's Information.
Proceedings of the 3PGCIC 2010, 2010

2009
A survey on security in JXTA applications.
J. Syst. Softw., 2009

A Virtual Laboratory Structure for Developing Programming Labs.
Int. J. Emerg. Technol. Learn., 2009

Cryptographic Energy Costs Are Assumable in Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2009

Preserving user's privacy in web search engines.
Comput. Commun., 2009

Maintaining Unlinkability in Group Based P2P Environments.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

A Security Layer for JXTA Core Protocols.
Proceedings of the 2009 International Conference on Complex, 2009

2008
An Integrated Structure for a Virtual Networking Laboratory.
IEEE Trans. Ind. Electron., 2008

Collaborative group membership and access control for JXTA.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Persistent Interoperable Security for JXTA Advertisements.
Proceedings of the Second International Conference on Complex, 2008

2007
A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES).
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

An Interdomain PKI Model Based on Trust Lists.
Proceedings of the Public Key Infrastructure, 2007

Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.
Trans. Data Hiding Multim. Secur., 2006

A benchmark assessment of the WAUC watermarking audio algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Providing a collaborative mechanism for peer group access control.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

A Secure E-Exam Management System.
Proceedings of the The First International Conference on Availability, 2006

2005
Robust watermarking scheme based on the JPEG2000 standard.
J. Electronic Imaging, 2005

Influence of mark embedding strategies on lossless compression of ultraspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
An audio watermarking scheme robust against stereo attacks.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Robust Frequency Domain Audio Watermarking: A Tuning Analysis.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Secure Electronic Examination Protocol using Wireless Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

A Personal Authentication Scheme Using Mobile Technology.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A family of image watermarking schemes based on lossy compression.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.
Proceedings of the Communications and Multimedia Security, 2003

2000
Simple Collusion-Secure Fingerprinting Schemes for Images.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000

A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Spending Programs: A Tool for Flexible Micropayments.
Proceedings of the Information Security, Second International Workshop, 1999

1998
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents.
SIGMOD Rec., 1998

Efficient Smart-Card Based Anonymous Fingerprinting.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998


  Loading...