Marc Domingo-Prieto

According to our database1, Marc Domingo-Prieto authored at least 16 papers between 2010 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Integrating secure mobile P2P systems and Wireless Sensor Networks.
PhD thesis, 2017

2016
Distributed PID-Based Scheduling for 6TiSCH Networks.
IEEE Commun. Lett., 2016

2014
Balancing Power Consumption in IoT Devices by Using Variable Packet Size.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Anonymously accessing JXTA community services through split message forwarding.
Math. Comput. Model., 2013

Bootstrapping smart cities through a self-sustainable model based on big data flows.
IEEE Commun. Mag., 2013

PlanetLab@UOC: A real lab over the Internet to experiment with distributed systems.
Comput. Appl. Eng. Educ., 2013

2012
Towards secure mobile P2P applications using JXME.
J. Internet Serv. Inf. Secur., 2012

JXTAnonym: An Anonymity Layer for JXTA Services Messaging.
IEICE Trans. Inf. Syst., 2012

jxSensor: A Sensor Network Integration Layer for JXTA.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
The Impact of Security on VoIP Call Quality.
J. Mobile Multimedia, 2011

Lightweight Security for JXME-Proxied Relay Authentication.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

An Anonymity Layer for JXTA Services.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
VoIP: making secure calls and maintaining high call quality.
Proceedings of the MoMM'2010, 2010

JXTA Security in Mobile Constrained Devices.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys.
Proceedings of the 3PGCIC 2010, 2010


  Loading...