Llorenç Huguet i Rotger

According to our database1, Llorenç Huguet i Rotger authored at least 45 papers between 1984 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography.
Comput. J., 2022

2020
Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services.
Comput. J., 2020

2019
Deployment and performance evaluation of mobile multicoupon solutions.
Int. J. Inf. Sec., 2019

A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board.
IEEE Access, 2019

2018
Optimistic protocol for certified electronic mail with verifiable TTP.
Comput. Stand. Interfaces, 2018

A survey on electronic coupons.
Comput. Secur., 2018

Anonymity in Secure Access to Integrated Touristic Services Including Payment.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

2015
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform.
Int. J. Inf. Sec., 2015

2013
Micropayment proposal with formal verification using coloured Petri nets and performance analysis on the Android platform.
Int. J. Bus. Intell. Data Min., 2013

Discrete logarithm like problems and linear recurring sequences.
Adv. Math. Commun., 2013

2012
Anonymity and Transferability for an Electronic Bank Check Scheme.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Micropayment scheme implementation on the Android platform with performance evaluation.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

2011
Cross-Layer Secrecy Design on TCP/IP and 802.11 for Energy Saving.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2009
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets.
Proceedings of the Security and Privacy in Communication Networks, 2009

No Author Based Selective Receipt in an Efficient Certified E-mail Protocol.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

2008
Replay Attack in a Fair Exchange Protocol.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2006
Solving Bao's Colluding Attack in Wang's Fair Payment Protocol.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol.
Proceedings of the The First International Conference on Availability, 2006

2005
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP.
Proceedings of the Trust, 2005

Certified e-Mail Protocol with Verifiable Third Party.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Optimality in Asynchronous Contract Signing Protocols.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

A Voting System with Trusted Verifiable Services.
Proceedings of the Computational Science and Its Applications, 2004

Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash.
Proceedings of the Computational Science and Its Applications, 2004

2003
An Efficient Anonymous Scheme for Secure Micropayments.
Proceedings of the Web Engineering, International Conference, 2003

A Fully Anonymous Electronic Payment Scheme for B2B.
Proceedings of the Web Engineering, International Conference, 2003

2002
A Realistic Protocol for Multi-party Certified Electronic Mail.
Proceedings of the Information Security, 5th International Conference, 2002

ITHAKI: Fair N-Transferable Anonymous Cash.
Proceedings of the ICEIS 2002, 2002

A Juridical Validation of a Contract Signing Protocol.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

2001
Efficient Optimistic N-Party Contract Signing Protocol.
Proceedings of the Information Security, 4th International Conference, 2001

2000
An Efficient Protocol for Certified Electronic Mail.
Proceedings of the Information Security, Third International Workshop, 2000

Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1995
Variations on Minimal Codewords in Linear Codes.
Proceedings of the Applied Algebra, 1995

1993
Bounds on generalized weights.
Proceedings of the Algebraic Coding, 1993

1992
Error correcting codes - theory and applications.
Prentice Hall, ISBN: 978-0-13-284894-7, 1992

1990
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures.
Comput. Secur., 1990

A cryptographic tool for programs protection.
Proceedings of the EUROCODE '90, 1990

1989
An Approximation Algorithm for the TSP.
Inf. Process. Lett., 1989

Full Secure Key Exchange and Authentication with no Previously Shared Secrets.
Proceedings of the Advances in Cryptology, 1989

1988
Concatenated coding schemes for HF channels.
Proceedings of the Coding Theory and Applications, 1988

On Completely Regular Propelinear Codes.
Proceedings of the Applied Algebra, 1988

1986
Characterization of Completely Regular Codes through P-Polynomial Association Schemes.
Proceedings of the Applied Algebra, 1986

From T(m) Triangular Graphs to Single-Error-Correcting Codes.
Proceedings of the Applied Algebra, 1986

1985
Pseudo-Triple-Sum-Sets and Association Schemes.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985

On S-Sum-Sets and Projective Codes.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985

1984
Association schemes and difference sets defined on two weight codes.
Proceedings of the Applied Algebra, 1984


  Loading...