Jordi Herrera-Joancomartí

According to our database1, Jordi Herrera-Joancomartí authored at least 75 papers between 1998 and 2018.

Collaborative distances :
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Cryptocurrency Networks: A New P2P Paradigm.
Mobile Information Systems, 2018

Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies.
IACR Cryptology ePrint Archive, 2018

Monero - Privacy in the Blockchain.
IACR Cryptology ePrint Archive, 2018

2017
k-Degree anonymity and edge selection: improving data utility in large networks.
Knowl. Inf. Syst., 2017

Double-spending Prevention for Bitcoin zero-confirmation transactions.
IACR Cryptology ePrint Archive, 2017

Analysis of the Bitcoin UTXO set.
IACR Cryptology ePrint Archive, 2017

A Fair Protocol for Data Trading Based on Bitcoin Transactions.
IACR Cryptology ePrint Archive, 2017

A survey of graph-modification techniques for privacy-preserving on networks.
Artif. Intell. Rev., 2017

Smart contracts based on blockchain for logistics management.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Reputation and Reward: Two Sides of the Same Bitcoin.
Sensors, 2016

Bitcoin Private Key Locked Transactions.
IACR Cryptology ePrint Archive, 2016

Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

2015
Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks.
Proceedings of the Advanced Research in Data Privacy, 2015

A Summary of k k -Degree Anonymous Methods for Privacy-Preserving on Networks.
Proceedings of the Advanced Research in Data Privacy, 2015

Remarks on Peinado et al.'s Analysis of J3Gen.
Sensors, 2015

Anonymizing graphs: measuring quality for clustering.
Knowl. Inf. Syst., 2015

When users become sensors: can we trust their readings?
Int. J. Communication Systems, 2015

An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
On the similarity of commercial EPC Gen2 pseudorandom number generators.
Trans. Emerging Telecommunications Technologies, 2014

The Bitcoin P2P Network.
Proceedings of the Financial Cryptography and Data Security, 2014

Research and Challenges on Bitcoin Anonymity.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
J3Gen: A PRNG for Low-Cost Passive RFID.
Sensors, 2013

OSN Crawling Schedulers and Their Implications on k-Plexes Detection.
Int. J. Intell. Syst., 2013

Evolutionary Algorithm for Graph Anonymization.
CoRR, 2013

Improving Relational Classification Using Link Prediction Techniques.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2013

Improving Automatic Edge Selection for Relational Classification.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Analyzing the Impact of Edge Modifications on Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Crowdsensing Simulation Using ns-3.
Proceedings of the Citizen in Sensor Networks - Second International Workshop, 2013

An algorithm for k-degree anonymity on large networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Towards secure mobile P2P applications using JXME.
J. Internet Serv. Inf. Secur., 2012

Comparing Random-Based and k-Anonymity-Based Algorithms for Graph Anonymization.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

Classifying Online Social Network Users through the Social Graph.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents.
Proceedings of the Citizen in Sensor Networks - First International Workshop, 2012

2011
A Fair and Secure Cluster Formation Process for Ad Hoc Networks.
Wireless Personal Communications, 2011

A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags.
Wireless Personal Communications, 2011

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices.
Future Internet, 2011

Online Social Honeynets: Trapping Web Crawlers in OSN.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

2010
XML-based security for JXTA core protocols.
Int. J. Auton. Comp., 2010

JXTA resource access control by means of advertisement encryption.
Future Generation Comp. Syst., 2010

Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.
Proceedings of the Financial Cryptography and Data Security, 2010

JXTA Security in Mobile Constrained Devices.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

OSN: When Multiple Autonomous Users Disclose Another Individual's Information.
Proceedings of the 3PGCIC 2010, 2010

2009
A survey on security in JXTA applications.
Journal of Systems and Software, 2009

A Virtual Laboratory Structure for Developing Programming Labs.
iJET, 2009

Cryptographic Energy Costs Are Assumable in Ad Hoc Networks.
IEICE Transactions, 2009

Preserving user's privacy in web search engines.
Computer Communications, 2009

Maintaining Unlinkability in Group Based P2P Environments.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

A Security Layer for JXTA Core Protocols.
Proceedings of the 2009 International Conference on Complex, 2009

2008
An Integrated Structure for a Virtual Networking Laboratory.
IEEE Trans. Industrial Electronics, 2008

Collaborative group membership and access control for JXTA.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Persistent Interoperable Security for JXTA Advertisements.
Proceedings of the Second International Conference on Complex, 2008

2007
A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES).
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

An Interdomain PKI Model Based on Trust Lists.
Proceedings of the Public Key Infrastructure, 2007

Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.
, 2006

A benchmark assessment of the WAUC watermarking audio algorithm.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Providing a collaborative mechanism for peer group access control.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

A Secure E-Exam Management System.
Proceedings of the The First International Conference on Availability, 2006

2005
Robust watermarking scheme based on the JPEG2000 standard.
J. Electronic Imaging, 2005

Influence of mark embedding strategies on lossless compression of ultraspectral images.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
An audio watermarking scheme robust against stereo attacks.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Robust Frequency Domain Audio Watermarking: A Tuning Analysis.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Secure Electronic Examination Protocol using Wireless Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

A Personal Authentication Scheme Using Mobile Technology.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A family of image watermarking schemes based on lossy compression.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression.
Proceedings of the Communications and Multimedia Security, 2003

2000
Simple Collusion-Secure Fingerprinting Schemes for Images.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000

A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Spending Programs: A Tool for Flexible Micropayments.
Proceedings of the Information Security, Second International Workshop, 1999

1998
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents.
SIGMOD Record, 1998

Efficient Smart-Card Based Anonymous Fingerprinting.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998


  Loading...