Oscar Esparza

According to our database1, Oscar Esparza authored at least 64 papers between 2003 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 



On csauthors.net:


On the Road to Secure and Privacy-Preserving IoT Ecosystems.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive and Mobile Computing, 2015

A model for revocation forecasting in public-key infrastructures.
Knowl. Inf. Syst., 2015

Multipath TCP Architecture for Infotainment Multimedia Applications in Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Evaluation of Cryptographic Capabilities for the Android Platform.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

MHT-Based Mechanism for Certificate Revocation in VANETs.
Proceedings of the Wireless Networking for Moving Objects, 2014

RIAPPA: a Robust Identity Assignment Protocol for P2P overlays.
Security and Communication Networks, 2014

Vespa: Emulating Infotainment Applications in Vehicular Networks.
IEEE Pervasive Computing, 2014

Cross-layer packet scheduler for QoS support over Digital Video Broadcasting-Second Generation broadband satellite systems.
Int. J. Communication Systems, 2014

A Simple Closed-Form Approximation for the Packet Loss Rate of a TCP Connection Over Wireless Links.
IEEE Communications Letters, 2014

PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks.
Computer Standards & Interfaces, 2014

Certificate Revocation List Distribution System for the KAD Network.
Comput. J., 2014

VSPLIT: A Cross-Layer Architecture for V2I TCP Services Over 802.11.
MONET, 2013

BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mobile Information Systems, 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs.
J. Network and Computer Applications, 2013

Deploying Internet Protocol Security in satellite networks using Transmission Control Protocol Performance Enhancing Proxies.
Int. J. Satellite Communications Networking, 2013

Performance evaluation of selected Transmission Control Protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS.
Int. J. Communication Systems, 2013

Secure handoffs for V2I communications in 802.11 networks.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

Securing Identity Assignment Using Implicit Certificates in P2P Overlays.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Information Forensics and Security, 2012

QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems.
EURASIP J. Wireless Comm. and Networking, 2012

Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012

XPLIT: A cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM.
Computer Networks, 2012

DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks.
Ad Hoc Networks, 2012

RAR: Risk Aware Revocation Mechanism for Vehicular Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Toward Revocation Data Handling Efficiency in VANETs.
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012

Analysis of Inter-RSU Beaconing Interference in VANETs.
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012

On the Self-similarity Nature of the Revocation Data.
Proceedings of the Information Security - 15th International Conference, 2012

Impact of the Revocation Service in PKI Prices.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wireless Communications and Mobile Computing, 2011

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs.
J. Network and Computer Applications, 2011

Adaptive Packet Scheduling for the Support of QoS over DVB-S2 Satellite Systems.
Proceedings of the Wired/Wireless Internet Communications, 2011

NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011

Analysis of TCP variants over a QoS DVB-S2 system.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

PREON: An efficient cascade revocation mechanism for delegation paths.
Computers & Security, 2010

RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Computer Networks, 2010

Certificate status validation in mobile ad hoc networks.
IEEE Wireless Commun., 2009

Design and implementation of a lightweight online certificate validation service.
Telecommunication Systems, 2009

ad hoc networks.">A review of trust modeling in ad hoc networks.
Internet Research, 2009

PKIX Certificate Status in Hybrid MANETs.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

H-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electronic Commerce Research, 2008

Surework: a super-peer reputation framework for p2p networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Generation Comput., 2006

Secure brokerage mechanisms for mobile electronic commerce.
Computer Communications, 2006

Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005

Analysis of peer-to-peer distributed reputation schemes.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec., 2004

Reducing the Communication Overhead of an Offline Revocation Dictionary.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

Punishing manipulation attacks in mobile agent systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

CERVANTES - A Certificate Validation Test-Bed.
Proceedings of the Public Key Infrastructure, 2004

E-MHT. An Efficient Protocol for Certificate Status Checking.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A Certificate Status Checking Protocol for the Authenticated Dictionary.
Proceedings of the Computer Network Security, 2003

Efficient Offline Certificate Revocation.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
Proceedings of the Web Engineering, International Conference, 2003

Protocols for Malicious Host Revocation.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation of Revocation Systems with a JAVA Test-bed.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Proceedings of the Applied Cryptography and Network Security, 2003