Oscar Esparza

Orcid: 0000-0002-2593-0162

According to our database1, Oscar Esparza authored at least 68 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Evaluation of TCP Congestion Control Algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario.
Comput. Networks, February, 2024

2022
Data Marketplaces with a Free Sampling Service.
Proceedings of the IEEE International Conference on Services Computing, 2022

2016
On the Road to Secure and Privacy-Preserving IoT Ecosystems.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015

A model for revocation forecasting in public-key infrastructures.
Knowl. Inf. Syst., 2015

Multipath TCP Architecture for Infotainment Multimedia Applications in Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Evaluation of Cryptographic Capabilities for the Android Platform.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

2014
MHT-Based Mechanism for Certificate Revocation in VANETs.
Proceedings of the Wireless Networking for Moving Objects, 2014

RIAPPA: a Robust Identity Assignment Protocol for P2P overlays.
Secur. Commun. Networks, 2014

Vespa: Emulating Infotainment Applications in Vehicular Networks.
IEEE Pervasive Comput., 2014

Cross-layer packet scheduler for QoS support over Digital Video Broadcasting-Second Generation broadband satellite systems.
Int. J. Commun. Syst., 2014

A Simple Closed-Form Approximation for the Packet Loss Rate of a TCP Connection Over Wireless Links.
IEEE Commun. Lett., 2014

PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks.
Comput. Stand. Interfaces, 2014

Certificate Revocation List Distribution System for the KAD Network.
Comput. J., 2014

2013
VSPLIT: A Cross-Layer Architecture for V2I TCP Services Over 802.11.
Mob. Networks Appl., 2013

BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs.
J. Netw. Comput. Appl., 2013

Deploying Internet Protocol Security in satellite networks using Transmission Control Protocol Performance Enhancing Proxies.
Int. J. Satell. Commun. Netw., 2013

Performance evaluation of selected Transmission Control Protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS.
Int. J. Commun. Syst., 2013

Secure handoffs for V2I communications in 802.11 networks.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

Securing Identity Assignment Using Implicit Certificates in P2P Overlays.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012

QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems.
EURASIP J. Wirel. Commun. Netw., 2012

Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012

XPLIT: A cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM.
Comput. Networks, 2012

DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks.
Ad Hoc Networks, 2012

RAR: Risk Aware Revocation Mechanism for Vehicular Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Toward Revocation Data Handling Efficiency in VANETs.
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012

Analysis of Inter-RSU Beaconing Interference in VANETs.
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012

On the Self-similarity Nature of the Revocation Data.
Proceedings of the Information Security - 15th International Conference, 2012

Impact of the Revocation Service in PKI Prices.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs.
J. Netw. Comput. Appl., 2011

Adaptive Packet Scheduling for the Support of QoS over DVB-S2 Satellite Systems.
Proceedings of the Wired/Wireless Internet Communications, 2011

NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011

Analysis of TCP variants over a QoS DVB-S2 system.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

2010
PREON: An efficient cascade revocation mechanism for delegation paths.
Comput. Secur., 2010

RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010

2009
Certificate status validation in mobile ad hoc networks.
IEEE Wirel. Commun., 2009

Design and implementation of a lightweight online certificate validation service.
Telecommun. Syst., 2009

ad hoc networks.">A review of trust modeling in ad hoc networks.
Internet Res., 2009

PKIX Certificate Status in Hybrid MANETs.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Cross-layer architecture for TCP splitting in the return channel over satellite networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008

Surework: a super-peer reputation framework for p2p networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

2006
Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Gener. Comput., 2006

Secure brokerage mechanisms for mobile electronic commerce.
Comput. Commun., 2006

2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005

Analysis of peer-to-peer distributed reputation schemes.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

2004
Contribución a la protección de agentes móviles frente a hosts maliciosos. Detección de ataques y políticas de castigo.
PhD thesis, 2004

Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec., 2004

Reducing the Communication Overhead of an Offline Revocation Dictionary.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

Punishing manipulation attacks in mobile agent systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

CERVANTES - A Certificate Validation Test-Bed.
Proceedings of the Public Key Infrastructure, 2004

2003
E-MHT. An Efficient Protocol for Certificate Status Checking.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A Certificate Status Checking Protocol for the Authenticated Dictionary.
Proceedings of the Computer Network Security, 2003

Efficient Offline Certificate Revocation.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
Proceedings of the Web Engineering, International Conference, 2003

Protocols for Malicious Host Revocation.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation of Revocation Systems with a JAVA Test-bed.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...