2023
- Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, and Nicola Dragoni, editors.
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers, volume 13619 of Lecture Notes in Computer Science, Springer International Publishing, 2023.
URL: https://link.springer.com/10.1007/978-3-031-25734-6, doi:10.1007/978-3-031-25734-6.
[BibTeX▼]
2022
- Daniela Córdova-Pintado, Adrián Sánchez-Carmona, and Ramon Martí.
Paving the way towards delivering messages based on user interests in oppnets.
In 18th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2022, Thessaloniki, Greece, October 10-12, 2022, 190–197. IEEE, October 2022.
URL: https://doi.org/10.1109/WiMob55322.2022.9941602, doi:10.1109/WiMob55322.2022.9941602.
[BibTeX▼] - Vicenç Torra, Edgar Galván, and Guillermo Navarro-Arribas.
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization.
International Journal of Information Security, 21(6):1349–1359, December 2022.
URL: https://doi.org/10.1007/s10207-022-00614-6 (visited on 2022-10-24), doi:10.1007/s10207-022-00614-6.
[abstract▼] [BibTeX▼] - Joaquin Garcia-Alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, and Miguel Soriano, editors.
Data Privacy Management, Cryptocurrencies and Blockchain Technology, volume 13140 of Lecture Notes in Computer Science, Springer Nature, 2022.
URL: https://link.springer.com/book/10.1007/978-3-030-93944-1, doi:10.1007/978-3-030-93944-1.
[BibTeX▼]
2021
- Anna Maria Vegni, Carlos Borrego, and Valeria Loscri.
Moves: a memory-based vehicular social forwarding technique.
Computer Networks, 197:108324, 2021.
[BibTeX▼] - Carlos Borrego, Enrique Hemández-Orallo, Pietro Manzoni, and Anna Maria Vegni.
Lapse: a machine learning message forwarding approach based on node centrality estimation in sparse dynamic networks.
In 2021 Wireless Days (WD), 1–6. IEEE, 2021.
[BibTeX▼] - Miguel Carpio, Sergi Robles, Adrián Sánchez, and Carlos Borrego.
Market equity for car-sharing applications using homomorphic encryption and opportunistic networking.
In 2021 Wireless Days (WD), 1–5. IEEE, 2021.
[BibTeX▼] - Edgar Galván, Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, and Vicenç Torra.
Agents in a privacy-preserving world.
Transactions on Data Privacy, 14(1):53–63, 2021.
URL: http://www.tdp.cat/issues21/abs.a419a21.php.
[BibTeX▼] - Vicenç Torra, Mariam Taha, and Guillermo Navarro-Arribas.
The space of models in machine learning: using markov chains to model transitions.
Progress in Artificial Intelligence, April 2021.
URL: https://doi.org/10.1007/s13748-021-00242-6, doi:10.1007/s13748-021-00242-6.
[BibTeX▼]
2020
- Ramani Sagar, Rutvij Jhaveri, and Carlos Borrego.
Applications in security and evasions in machine learning: a survey.
Electronics, 9(1):97, 2020.
[BibTeX▼] - Maria del Carmen de Toro and Carlos Borrego.
A software-defined networking approach for congestion control in opportunistic networking.
In 34th International Conference on Information Networking (ICOIN 2020). 2020.
[BibTeX▼] - Carlos Borrego, Marica Amadeo, Antonella Molinaro, Paulo Mendes, Rute C Sofia, Naercio Magaia, and Joan Borrell.
Forwarding in opportunistic information-centric networks: an optimal stopping approach.
IEEE Communications Magazine, 58(5):56–61, 2020.
[BibTeX▼] - Enrique Hernández-Orallo, Carlos Borrego, Pietro Manzoni, Johann M Marquez-Barja, Juan Carlos Cano, and Carlos T Calafate.
Optimising data diffusion while reducing local resources consumption in opportunistic mobile crowdsensing.
Pervasive and Mobile Computing, 67:101201, 2020.
[BibTeX▼] - Diego Freire, Sergi Robles, and Carlos Borrego.
Towards a methodology for the development of routing algorithms in opportunistic networks.
arXiv preprint arXiv:2009.01532, 2020.
[BibTeX▼] - Luis E. Oleas Chavez, Cristina Pérez-Solà, and Jordi Herrera-Joancomart\'ı.
On the selection of the LN client implementation parameters.
In Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers, volume 12484 of Lecture Notes in Computer Science, 305–318. Springer, 2020.
URL: https://doi.org/10.1007/978-3-030-66172-4\_20, doi:10.1007/978-3-030-66172-4\_20.
[BibTeX▼] - Cristina Pérez-Solà and Jordi Herrera-Joancomartí.
Bart: trading digital contents through digital assets.
Concurrency and Computation: Practice and Experience, 32(12):e5490, 2020.
e5490 cpe.5490.
URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5490, arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.5490, doi:10.1002/cpe.5490.
[abstract▼] [BibTeX▼] - Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joaquin Garcia-Alfaro.
Lockdown: balance availability attack against lightning network channels.
In Joseph Bonneau and Nadia Heninger, editors, Financial Cryptography and Data Security, Lecture Notes in Computer Science, 245–263. Springer International Publishing, 2020.
doi:10.1007/978-3-030-51280-4_14.
[BibTeX▼] - Sema Kayapinar Kaya, Guillermo Navarro-Arribas, and Vicenç Torra.
Dynamic features spaces and machine learning: open problems and synthetic data sets.
In Van-Nam Huynh, Tomoe Entani, Chawalit Jeenanunta, Masahiro Inuiguchi, and Pisal Yenradee, editors, Integrated Uncertainty in Knowledge Modelling and Decision Making, Lecture Notes in Computer Science, 125–136. Springer International Publishing, 2020.
doi:10.1007/978-3-030-62509-2_11.
[BibTeX▼] - Depeng Chen, Carlos Borrego, and Guillermo Navarro-Arribas.
A privacy-preserving routing protocol using mix networks in opportunistic networks.
Electronics, 9(11):1754, 2020.
doi:10.3390/electronics9111754.
[BibTeX▼] - Vicenç Torra and Guillermo Navarro-Arribas.
Fuzzy meets privacy: a short overview.
In Cengiz Kahraman, Sezi Cevik Onar, Basar Oztaysi, Irem Ucal Sari, Selcuk Cebi, and A. Cagri Tolga, editors, Intelligent and Fuzzy Techniques: Smart and Innovative Solutions. INFUS 2020, Advances in Intelligent Systems and Computing, 3–9. Springer International Publishing, 2020.
doi:10.1007/978-3-030-51156-2_1.
[BibTeX▼] - Vicenç Torra, Guillermo Navarro-Arribas, and Edgar Galván.
Explaining recurrent machine learning models: integral privacy revisited.
In Josep Domingo-Ferrer and Krishnamurty Muralidhar, editors, Privacy in Statistical Databases, Lecture Notes in Computer Science, 62–73. Springer International Publishing, 2020.
doi:10.1007/978-3-030-57521-2_5.
[BibTeX▼]
2019
- Carlos Borrego, Joan Borrell, and Sergi Robles.
Efficient broadcast in opportunistic networks using optimal stopping theory.
Ad Hoc Networks, 88:5–17, 2019.
[BibTeX▼] - Carlos Borrego, Joan Borrell, and Sergi Robles.
Hey, influencer! message delivery to social central nodes in social opportunistic networks.
Computer Communications, 137:81–91, 2019.
[BibTeX▼] - Zhiyuan Li, Junlei Bi, and Carlos Borrego.
Exploiting temporal and spatial regularities for content dissemination in opportunistic social network.
Wireless Communications and Mobile Computing, 2019.
[BibTeX▼] - Carlos Borrego, Enrique Hernández-Orallo, and Naercio Magaia.
General and mixed linear regressions to estimate inter-contact times and contact duration in opportunistic networks.
Ad Hoc Networks, 93:101927, 2019.
[BibTeX▼] - Francesco Chiti, Romano Fantacci, Francesca Nizzi, Laura Pierucci, and Carlos Borrego.
A distributed token passing protocol for time constrained data gathering in vanets.
Electronics, 8(8):823, 2019.
[BibTeX▼] - Carlos Borrego, Marica Amadeo, Antonella Molinaro, and Rutvij H Jhaveri.
Privacy-preserving forwarding using homomorphic encryption for information-centric wireless ad hoc networks.
IEEE Communications Letters, 23(10):1708–1711, 2019.
[BibTeX▼] - Enrique Hernandez-Orallo, Carlos Borrego, Carlos Tavares Calafate, and Juan-Carlos Cano.
Using local expiration timers to reduce buffer utilisation when using epidemic diffusion.
In 2019 IEEE Global Communications Conference (GLOBECOM), 1–6. IEEE, 2019.
[BibTeX▼] - D. Chen, G. Navarro-Arribas, C. Pérez-Solà, and J. Borrell.
Message anonymity on predictable opportunistic networks.
Journal of Ambient Intelligence and Humanized Computing, 2019.
URL: https://link.springer.com/article/10.1007/s12652-019-01393-0, doi:10.1007/s12652-019-01393-0.
[BibTeX▼] - Depeng Chen, Guillermo Navarro-Arribas, Cristina Pérez-Solà, and Joan Borrell.
A review of message anonymity on predictable opportunistic networks.
In Actas de las V Jornadas Nacionales de Investigacióon en Ciberseguridad (JNIC 2019), 316–317. Cáceres, Spain, June 2019. Universidad de Extremadura. Servicio de Publicaciones.
URL: https://2019.jnic.es/Actas_JNIC2019.pdf#section.0.53.
[BibTeX▼] - Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, and Joaquin Garcia-Alfaro.
On the difficulty of hiding the balance of lightning network channels.
In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, Asia CCS '19, 602–612. New York, NY, USA, 2019. ACM.
URL: http://doi.acm.org/10.1145/3321705.3329812, doi:10.1145/3321705.3329812.
[BibTeX▼] - F. Zola, C. Pérez-Solà, J. E. Zubia, M. Eguimendia, and J. Herrera-Joancomartí.
Kriptosare.gen, a dockerized bitcoin testbed: analysis of server performance.
In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), volume, 1–5. June 2019.
doi:10.1109/NTMS.2019.8763809.
[abstract▼] [BibTeX▼] - C. Pérez-Solà, S. Delgado-Segura, G. Navarro-Arribas, and J. Herrera-Joancomartí.
Another coin bites the dust: an analysis of dust in utxo-based cryptocurrencies.
Royal Society Open Science, 6(1):180817, 2019.
URL: https://royalsocietypublishing.org/doi/abs/10.1098/rsos.180817, arXiv:https://royalsocietypublishing.org/doi/pdf/10.1098/rsos.180817, doi:10.1098/rsos.180817.
[abstract▼] [BibTeX▼] - Cristina Pérez-Solà and Jordi Herrera-Joancomartí.
Improving classification of interlinked entities using only the network structure.
Int'l Journal of Software Engineering and Knowledge Engineering, 29(1):63–91, 2019.
URL: https://www.worldscientific.com/doi/10.1142/S0218194019500049, doi:https://doi.org/10.1142/S0218194019500049.
[BibTeX▼] - Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomartí.
Analysis of the bitcoin utxo set.
In Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, and Massimiliano Sala, editors, Financial Cryptography and Data Security, 78–91. Berlin, Heidelberg, 2019. Springer Berlin Heidelberg.
doi:10.1007/978-3-662-58820-8_6.
[abstract▼] [BibTeX▼]
2018
- Sergi Robles, Sandra Miguel, Marta Fuentes, Adrián Sánchez-Carmona, and Jordi Pons.
The TOP gamification platform as a change agent in the acquisition of the competences attributed to the Degree in Computer Engineering.
In Actes del X Congrés Internacional de Docència Universitària i Innovació (CIDUI 2018). January 2018.
[BibTeX▼] - Adrián Sánchez-Carmona, Frédéric Guidec, Pascale Launay, Yves Mahéo, and Sergi Robles.
Filling in the missing link between simulation and application in opportunistic networking.
Journal of Systems and Software, 142:57–72, 2018.
doi:10.1016/j.jss.2018.04.025.
[BibTeX▼] - Jose Grimaldo and Ramon Martí.
Performance comparison of routing protocols in vanets under black hole attack in panama city.
In 2018 International Conference on Electronics, Communications and Computers (CONIELECOMP), 126–132. IEEE, 2018.
doi:10.1109/CONIELECOMP.2018.8327187.
[BibTeX▼] - Naercio Magaia, Carlos Borrego, Paulo Rogério Pereira, and Miguel Correia.
Eprivo: an enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks.
IEEE Transactions on Vehicular Technology, 67(11):11154–11168, 2018.
[BibTeX▼] - V. Torra, A. Jonsson, G. Navarro-Arribas, and J. Salas.
Synthetic generation of spatial graphs.
International Journal of Intelligent Systems, 33(12):2364–2378, 2018.
JCR2018SCI: 7.229 (Q1).
URL: https://onlinelibrary.wiley.com/doi/full/10.1002/int.22034, doi:10.1002/int.22034.
[BibTeX▼] - V. Torra and G. Navarro-Arribas.
Probabilistic metric spaces for privacy by design machine learning algorithms: modeling database changes.
In Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM 2018, CBT 2018, volume 11025 of Lecture Notes in Computer Science. Springer, 2018.
URL: https://link.springer.com/chapter/10.1007/978-3-030-00305-0_30, doi:10.1007/978-3-030-00305-0_30.
[BibTeX▼] - Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomartí.
Double-spending prevention for bitcoin zero-confirmation transactions.
International Journal of Information Security, Nov 2018.
URL: https://doi.org/10.1007/s10207-018-0422-4, doi:10.1007/s10207-018-0422-4.
[abstract▼] [BibTeX▼] - Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, and Guillermo Navarro-Arribas.
Bitcoin private key locked transactions.
Information Processing Letters, 140:37 – 41, 2018.
URL: http://www.sciencedirect.com/science/article/pii/S0020019018301698, doi:https://doi.org/10.1016/j.ipl.2018.08.004.
[BibTeX▼] - Cristina Pérez-Solà, Jordi Herrera-Joancomartí, and Helena Rifà-Pous.
On improving automated self-assessment with moodle quizzes: experiences from a cryptography course.
In Eric Ras and Ana Elena Guerrero Roldán, editors, Technology Enhanced Assessment, 176–189. Cham, 2018. Springer International Publishing.
[abstract▼] [BibTeX▼] - Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, and Joan Borrell.
Cryptocurrency networks: a new P2P paradigm.
Mobile Information Systems, 2018.
doi:10.1155/2018/2159082.
[BibTeX▼]
2017
- Adrián Sánchez-Carmona, Sergi Robles, and Jordi Pons.
A gamification experience to improve engineering students' performance through motivation.
Journal of Technology and Science Education, 7(2):150–161, 2017.
doi:10.1016/j.jss.2018.04.025.
[BibTeX▼] - Carlos Borrego, Gerard Garcia, and Sergi Robles.
Softwarecast: a code-based delivery manycast scheme in heterogeneous and opportunistic ad hoc networks.
Ad Hoc Networks, 55:72–86, 2017.
[BibTeX▼] - Carlos Borrego, Adrián Sánchez-Carmona, Zhiyuan Li, and Sergi Robles.
Explore and wait: a composite routing-delivery scheme for relative profile-casting in opportunistic networks.
Computer Networks, 123:51–63, 2017.
[BibTeX▼] - Carlos Borrego, Cristina Fernández, Ian Blanes, and Sergi Robles.
Room escape at class: escape games activities to facilitate the motivation and learning in computer science.
JOTSE, 7(2):162–171, 2017.
[BibTeX▼] - Naercio Magaia, Carlos Borrego, Paulo Pereira, and Miguel Correia.
Privo: a privacy-preserving opportunistic routing protocol for delay tolerant networks.
In 2017 IFIP Networking Conference (IFIP Networking) and Workshops, 1–9. IEEE, 2017.
[BibTeX▼] - Adrián Sánchez-Carmona, Carlos Borrego, Sergi Robles, and Gerard Garcia-Vandellós.
Two birds, one stone: using mobility behavioral profiles both as destinations and as a routing tool.
Journal of Network and Computer Applications, 99:58–72, 2017.
[BibTeX▼] - Vicenç Torra, Guillermo Navarro-Arribas, David Sanchez-Charles, and Victor Muntés-Mulero.
Provenance and privacy.
In Vicenç Torra, Yasuo Narukawa, Aoi Honda, and Sozo Inoue, editors, Modeling Decisions for Artificial Intelligence: 14th International Conference, MDAI 2017, Kitakyushu, Japan, October 18-20, 2017, Proceedings, 3–11. Springer International Publishing, 2017.
URL: https://link.springer.com/chapter/10.1007/978-3-319-67422-3_1, doi:10.1007/978-3-319-67422-3_1.
[abstract▼] [BibTeX▼] - D. Chen, G. Navarro-Arribas, and J. Borrell.
On the applicability of onion routing on predictable delay-tolerant networks.
In 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 575–578. Oct 2017.
doi:10.1109/LCN.2017.17.
[BibTeX▼] - V. Torra, D. Abril, and G. Navarro-Arribas.
Fuzzy meets privacy.
In The 14th International Conference on Modeling Decisions for Artificial Intelligence. USB Proceedings., 108–117. Kitakyushu, Japan (October 18 - 20, 2017), 2017.
[BibTeX▼] - Néstor Álvarez-Díaz, Jordi Herrera-Joancomartí, and Pino Caballero-Gil.
Smart contracts based on blockchain for logistics management.
In Proceedings of the 1st International Conference on Internet of Things and Machine Learning, IML '17, 73:1–73:8. New York, NY, USA, 2017. ACM.
URL: http://doi.acm.org/10.1145/3109761.3158384, doi:10.1145/3109761.3158384.
[BibTeX▼] - Joan Pahisa-Solé and Jordi Herrera-Joancomartí.
Testing an AAC system that transforms pictograms into natural language with persons with cerebral palsy.
Assistive Technology, 0(0):1–9, 2017.
PMID: 29045194.
URL: https://doi.org/10.1080/10400435.2017.1393844, arXiv:https://doi.org/10.1080/10400435.2017.1393844, doi:10.1080/10400435.2017.1393844.
[BibTeX▼] - Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, and Jordi Herrera-Joancomartí.
A fair protocol for data trading based on Bitcoin transactions.
Future Generation Computer Systems, 2017.
URL: http://www.sciencedirect.com/science/article/pii/S0167739X17318344, doi:https://doi.org/10.1016/j.future.2017.08.021.
[BibTeX▼] - Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra.
A survey of graph-modification techniques for privacy-preserving on networks.
Artificial Intelligence Review, 47(3):341–366, 2017.
URL: http://dx.doi.org/10.1007/s10462-016-9484-8, doi:10.1007/s10462-016-9484-8.
[abstract▼] [BibTeX▼] - Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra.
K-degree anonymity and edge selection: improving data utility in large networks.
Knowledge and Information Systems, 50(2):447–474, 2017.
URL: http://dx.doi.org/10.1007/s10115-016-0947-7, doi:10.1007/s10115-016-0947-7.
[abstract▼] [BibTeX▼]
2016
- Rubén Martínez-Vidal, Ramon Martí, Cormac J Sreenan, and Joan Borrell.
Measuring qos in an aeronautical opportunistic network architecture with limited access to a satellite communications backhaul.
Mobile Information Systems, 2016.
URL: https://doi.org/10.1155/2016/7601316, doi:10.1155/2016/7601316.
[BibTeX▼] - Adrián Sánchez-Carmona, Sergi Robles, and Carlos Borrego.
Privhab+: a secure geographic routing protocol for dtn.
Computer Communications, 78:56–73, 2016.
[BibTeX▼] - Adrián Sánchez-Carmona, Sergi Robles, and Carlos Borrego.
Identity-based access control for pro-active message's dtn.
Security and Communication Networks, 9(14):2323–2337, 2016.
[BibTeX▼] - C Borrego, C Fernández, S Robles, and I Blanes.
Room escape en las aulas: actividades de juegos de escape para facilitar la motivación y el aprendizaje de las ciencias de la computación.
Revista del Congrés Internacional de Docència Universitària i Innovació, 3:1–7, 2016.
[BibTeX▼] - V. Torra and G. Navarro-Arribas.
Integral privacy.
In S. Foresti and G. Persiano, editors, Cryptology and Network Security, CANS 2016, volume 20052 of Lecture Notes in Computer Science, 661–669. Springer, 2016.
URL: https://link.springer.com/chapter/10.1007/978-3-319-48965-0_44, doi:10.1007/978-3-319-48965-0_44.
[BibTeX▼] - A. Antunez-Veas and G. Navarro-Arribas.
Onion routing in deterministic delay tolerant networks.
In Joaquin Garcia-Alfaro, Evangelos Kranakis, and Guillaume Bonfante, editors, Foundations and Practice of Security, number 9482 in Lecture Notes in Computer Science, 303–310. Springer International Publishing, 2016.
URL: http://link.springer.com/chapter/10.1007/978-3-319-30303-1_21, doi:10.1007/978-3-319-30303-1_21.
[abstract▼] [BibTeX▼] - Jordi Herrera-Joancomartí and Cristina Pérez-Solà.
Privacy in bitcoin transactions: new challenges from blockchain scalability solutions.
In Vicenç Torra, Yasuo Narukawa, Guillermo Navarro-Arribas, and Cristina Yañez, editors, Modeling Decisions for Artificial Intelligence, 26–44. Cham, 2016. Springer International Publishing.
URL: http://dx.doi.org/10.1007/978-3-319-45656-0_3, doi:10.1007/978-3-319-45656-0_3.
[abstract▼] [BibTeX▼] - Sergi Delgado-Segura, Cristian Tanas, and Jordi Herrera-Joancomartí.
Reputation and reward: two sides of the same bitcoin.
Sensors, 16(6):776, 2016.
URL: http://www.mdpi.com/1424-8220/16/6/776, doi:10.3390/s16060776.
[abstract▼] [BibTeX▼] - Cristian Tanas, Sergi Delgado-Segura, and Jordi Herrera-Joancomartí.
An integrated reward and reputation mechanism for mcs preserving users' privacy.
In Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri, editors, Data Privacy Management, and Security Assurance, 83–99. Cham, 2016. Springer International Publishing.
[abstract▼] [BibTeX▼]
2015
- Rubén Martínez-Vidal, Ramon Martí, Cormac J Sreenan, and Joan Borrell.
Methodological evaluation of architectural alternatives for an aeronautical delay tolerant network.
Pervasive and Mobile Computing, 23:139–155, 2015.
URL: https://www.sciencedirect.com/science/article/pii/S1574119215001194, doi:https://doi.org/10.1016/j.pmcj.2015.06.012.
[BibTeX▼] - Adrián Sánchez-Carmona, Sergi Robles, and Carlos Borrego.
Endeavouring to be in the good books. awarding dtn network use for acknowledging the reception of bundles.
Computer Networks, 83:149–166, 2015.
[BibTeX▼] - Adrián Sánchez-Carmona, Sergi Robles, and Carlos Borrego.
Privhab: a multiagent secure georouting protocol for podcast distribution on disconnected areas.
In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 1697–1698. International Foundation for Autonomous Agents and Multiagent Systems, 2015.
[BibTeX▼] - Adrián Sánchez-Carmona, Sergi Robles, and Carlos Borrego.
Podcast distribution on gwanda using privhab: a multiagent secure georouting protocol.
Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability, pages 29–37, 2015.
[BibTeX▼] - Carlos Borrego, Sergi Robles, Angela Fabregues, and Adrián Sánchez-Carmona.
A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking.
Computer Networks, 87:59–77, 2015.
[BibTeX▼] - G. Navarro-Arribas and V. Torra, editors.
Advanced Research in Data Privacy.
Volume 567 of Studies in Computational Intelligence.
Springer International Publishing, 2015.
ISBN 978-3-319-09884-5.
doi:10.1007/978-3-319-09885-2.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Spherical microaggregation: anonymizing sparse vector spaces.
Computers & Security, 49(0):28–44, 2015.
URL: http://www.sciencedirect.com/science/article/pii/S0167404814001679, doi:10.1016/j.cose.2014.11.005.
[BibTeX▼] - D. Abril, V. Torra, and G. Navarro-Arribas.
Supervised learning using a symmetric bilinear form for record linkage.
Information Fusion, 26:144–153, 2015.
URL: http://www.sciencedirect.com/science/article/pii/S1566253514001286, doi:10.1016/j.inffus.2014.11.004.
[BibTeX▼] - Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra.
Anonymizing graphs: measuring quality for clustering.
Knowledge and Information Systems, 44(3):507–528, 2015.
URL: http://dx.doi.org/10.1007/s10115-014-0774-7, doi:10.1007/s10115-014-0774-7.
[BibTeX▼] - Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, and Joan Melià -Seguí.
Remarks on Peinado et al.'s analysis of J3Gen.
Sensors, 15(3):6217–6220, 2015.
URL: http://www.mdpi.com/1424-8220/15/3/6217, doi:10.3390/s150306217.
[BibTeX▼]
2014
- Ruben Martínez-Vidal, Ramon Martí, and Joan Borrell.
Analyzing information propagation in a transoceanic aircraft delay tolerant network.
In 39th Annual IEEE Conference on Local Computer Networks, 116–123. IEEE, 2014.
doi:10.1109/LCN.2014.6925763.
[BibTeX▼] - Carlos Borrego, Sergio Castillo, and Sergi Robles.
Striving for sensing: taming your mobile code to share a robot sensor network.
Information Sciences, 277:338–357, 2014.
[BibTeX▼] - Gerard García Vandellós, Sergi Robles Martínez, Adrián Sánchez Carmona, and Carlos Borrego.
Information system for supporting location-based routing protocols.
In RECSI XIII: Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información. Alicante, 2-5 de septiembre de 2014, 203–208. Servicio de Publicaciones, 2014.
[BibTeX▼] - V. Torra and G. Navarro-Arribas.
Data privacy.
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 4(4):269–280, 2014.
URL: http://onlinelibrary.wiley.com/doi/10.1002/widm.1129/abstract, doi:10.1002/widm.1129.
[BibTeX▼] - G. Navarro-Arribas and V. Torra.
Rank swapping for stream data.
In Vicenç Torra, Yasuo Narukawa, and Yasunori Endo, editors, Modeling Decisions for Artificial Intelligence, volume 8825 of Lecture Notes in Artificial Intelligence, 217–226. Springer International Publishing, 2014.
URL: http://link.springer.com/chapter/10.1007/978-3-319-12054-6_19, doi:10.1007/978-3-319-12054-6_19.
[BibTeX▼] - J. Jiménez, G. Navarro-Arribas, and V. Torra.
Jpeg-based microdata protection.
In Josep Domingo-Ferrer, editor, Privacy in Statistical Databases, volume 8744 of Lecture Notes in Computer Science, 117–129. Springer International Publishing, 2014.
URL: http://link.springer.com/chapter/10.1007/978-3-319-11257-2_10, doi:10.1007/978-3-319-11257-2_10.
[BibTeX▼] - J. Cucurull, S. Guasch, A. Escala, G. Navarro-Arribas, and V. Acin.
Qr steganography - a threat to new generation electronic voting systems.
In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, 484–491. SciTePress, 2014.
doi:10.5220/0005120404840491.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Aprendizaje supervisado para el enlace de registros a traves de la media ponderada.
In Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información, 281–284. Publicaciones Universidad de Alicante, 2014.
[BibTeX▼] - Cristina Pérez-Solà and Jordi Herrera-Joancomartí.
Bitcoin y el problema de los generales bizantinos.
In R. Álvarez, J. Climent, F. Ferrández, F. Martínez, L. Tortosa, J. Vicent, and A. Zamora, editors, Actas de la XIII Reunión Española de Criptología y Seguridad de la Información (RECSI 2014), volume, 241–246. Campus de San Vicente, s/n, 03690 San Vicente del Raspeig, Septiembre 2014. Publicaciones Universidad de Alicante.
[BibTeX▼] - Joan Melià -Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí.
On the similarity of commercial epc gen2 pseudorandom number generators.
Transactions on Emerging Telecommunications Technologies, 25(2):151–154, 2014.
URL: http://dx.doi.org/10.1002/ett.2600, doi:10.1002/ett.2600.
[BibTeX▼]
2013
- Rubén Martínez-Vidal, Ramon Martí, and Joan Borrell.
Characterization of a transoceanic aircraft delay tolerant network.
In 38th Annual IEEE Conference on Local Computer Networks, 565–572. IEEE, 2013.
doi:10.1109/LCN.2013.6761292.
[BibTeX▼] - Abraham Martín-Campillo, Jon Crowcroft, Eiko Yoneki, and Ramon Martí.
Evaluating opportunistic networks in disaster scenarios.
Journal of Network and computer applications, 36(2):870–880, 2013.
URL: https://www.sciencedirect.com/science/article/pii/S1084804512002275, doi:https://doi.org/10.1016/j.jnca.2012.11.001.
[BibTeX▼] - Carlos Borrego and Sergi Robles.
A store-carry-process-and-forward paradigm for intelligent sensor grids.
Information Sciences, 222:113–125, 2013.
[BibTeX▼] - S. N. Foley and G. Navarro-Arribas.
A bloom filter based model for decentralized authorization.
International Journal of Intelligent Systems, 28(6):565–582, 2013.
URL: http://onlinelibrary.wiley.com/doi/10.1002/int.21593/abstract (visited on 2013-07-18), doi:10.1002/int.21593.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, D. Abril, and V. Torra.
Dynamic anonymous index for confidential data.
In Data Privacy Management, volume 8247 of Lecture Notes in Computer Science, 362–368. 2013.
CORE(2013) B.
URL: http://link.springer.com/chapter/10.1007/978-3-642-54568-9_23, doi:10.1007/978-3-642-54568-9_23.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Vector space model anonymization.
In Artificial Intelligence Research and Development (Proceedings of the 16th International Conference of the Catalan Association for Artificial Intelligence), volume 256 of Frontiers in Artificial Intelligence and Applications, 141–150. 2013.
ISBN 978-1-61499-319-3 (print) | 978-1-61499-320-9 (online), DOI 10.3233/978-1-61499-320-9-141.
doi:10.3233/978-1-61499-320-9-141.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Towards a private vector space model for confidential documents.
In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, 944–945. New York, NY, USA, 2013. ACM.
URL: http://doi.acm.org/10.1145/2480486.2480543 (visited on 2013-07-18), doi:10.1145/2480362.2480543.
[abstract▼] [BibTeX▼] - Joan Melià -Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí.
J3Gen: a PRNG for low-cost passive RFID.
Sensors, 13(3):3816–3830, 2013.
URL: http://www.mdpi.com/1424-8220/13/3/3816, doi:10.3390/s130303816.
[BibTeX▼] - Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra.
An algorithm for k-degree anonymity on large networks.
In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM '13, 671–675. New York, NY, USA, 2013. ACM.
URL: http://doi.acm.org/10.1145/2492517.2492643, doi:10.1145/2492517.2492643.
[BibTeX▼] - Cristian Tanas and Jordi Herrera-Joancomartí.
When users become sensors: can we trust their readings?
International Journal of Communication Systems, 28(4):601–614, 2013.
URL: https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.2689, arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1002/dac.2689, doi:10.1002/dac.2689.
[abstract▼] [BibTeX▼] - Cristina Pérez-Solà and Jordi Herrera-Joancomartí.
OSN crawling schedulers and their implications on k-plexes detection.
International Journal of Intelligent Systems, 28(6):583–605, 2013.
URL: http://dx.doi.org/10.1002/int.21594, doi:10.1002/int.21594.
[abstract▼] [BibTeX▼] - Cristina Pérez-Solà and Jordi Herrera-Joancomartí.
Classifying online social network users through the social graph.
In Foundations and Practice of Security, volume 7743 of Lecture Notes in Computer Science, 115–131. Springer Berlin Heidelberg, 2013.
URL: http://dx.doi.org/10.1007/978-3-642-37119-6_8, doi:10.1007/978-3-642-37119-6_8.
[BibTeX▼]
2012
- Rubén Martınez-Vidal, M Carmen de Toro, Ramon Martı, and Joan Borrell.
Esquema de gestion de claves criptográficas tolerante a retrasos e interrupciones en entornos aeronáuticos.
In U. Zurutuza, R. Uribeetxeberria, and I. Arenaza-Nuño, editors, Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012), volume. Sept 2012. Arrasate - Mondragon, Mondragon Uniberstsitatea.
[BibTeX▼] - Estanislao Mercadal, Sergi Robles, Ramon Martí, Cormac J Sreenan, and Joan Borrell.
Double multiagent architecture for dynamic triage of victims in emergency scenarios.
Progress in Artificial Intelligence, 1(2):183–191, 2012.
URL: https://doi.org/10.1007/s13748-012-0016-8, doi:10.1007/s13748-012-0016-8.
[BibTeX▼] - Abraham Martín-Campillo and Ramon Martí.
Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios.
Computer Communications, 35(14):1715–1724, 2012.
URL: https://www.sciencedirect.com/science/article/pii/S0140366412001636, doi:https://doi.org/10.1016/j.comcom.2012.04.028.
[BibTeX▼] - Adrián Sánchez-Carmona, Carlos Borrego, Sergi Robles, and Jordi Andújar.
Control de acceso para mensajes pro-activos en redes dtn.
Proceedings of XII Reunión Española sobre Criptologıa y Seguridad de la Información, 2012.
[BibTeX▼] - G. Navarro-Arribas and V. Torra.
Information fusion in data privacy: a survey.
Information Fusion, 13(4):235–244, 2012.
ISSN 1566-2535, JCR2012SCI: 2.262 (Q1). Choosen as the number 6th article in the Top 25 Hottest Articles of the Information Fusion Journal in 2012.
URL: http://www.sciencedirect.com/science/article/pii/S1566253512000024, doi:10.1016/j.inffus.2012.01.001.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Improving record linkage with supervised learning for disclosure risk assessment.
Information Fusion, 13(4):274–284, 2012.
doi:10.1016/j.inffus.2011.05.001.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Choquet integral for record linkage.
Annals of Operations Research, 195(1):97–110, 2012.
URL: http://dx.doi.org/10.1007/s10479-011-0989-x, doi:10.1007/s10479-011-0989-x.
[BibTeX▼] - G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca.
User $k$-anonymity for privacy preserving data mining of query logs.
Information Processing and Management, 48(3):476–487, 2012.
URL: http://www.sciencedirect.com/science/article/pii/S0306457311000057, doi:10.1016/j.ipm.2011.01.004.
[BibTeX▼] - C. Martínez-García, G. Navarro-Arribas, and J. Borrell.
Intra-role progression in rbac: an rpg-like access control scheme.
In Data Privacy Management and Autonomous Spontaneus Security, volume 7122 of Lecture Notes in Computer Science, 221–234. Springer Berlin / Heidelberg, 2012.
URL: http://dx.doi.org/10.1007/978-3-642-28879-1_15, doi:10.1007/978-3-642-28879-1_15.
[BibTeX▼] - E. Mercadal, G. Navarro-Arribas, S.N. Foley, and J. Borrell.
Towards efficient access control in a mobile agent based wireless sensor network.
In 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 1–4. 2012.
doi:10.1109/CRISIS.2012.6378940.
[BibTeX▼] - C. Garrigues, H. Rifà-Pous, and G. Navarro-Arribas.
Fully distributed cooperative spectrum sensing for cognitive radio networks.
In Actas XII Reunión Española sobre Criptología y Seguridad de la Información, 327–332. Servicio Editorial de Mondragon Unibertsitatea, July 2012.
ISBN 978-84-615-9933-2.
[BibTeX▼] - E. Mercadal, A. Freijó, G. Navarro-Arribas, and J. Borrell.
Gestión eficiente de permisos en redes de sensores inalámbricos.
In Actas XII Reunión Española sobre Criptología y Seguridad de la Información, 321–326. Servicio Editorial de Mondragon Unibertsitatea, July 2012.
ISBN 978-84-615-9933-2.
[BibTeX▼] - Cristian Tanas, Cristina Pérez-Solà, and Jordi Herrera-Joancomartí.
Security and privacy challenges in smart sensor networks.
In U. Zurutuza, R. Uribeetxeberria, and I. Arenaza-Nuño, editors, Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012), volume, 423–428. Septiembre 2012. Arrasate - Mondragon, Mondragon Uniberstsitatea.
[BibTeX▼] - Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra.
Algoritmos genéticos para la anonimización de grafos.
In U. Zurutuza, R. Uribeetxeberria, and I. Arenaza-Nuño, editors, Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012), volume, 243–248. Septiembre 2012. Arrasate - Mondragon, Mondragon Uniberstsitatea.
[BibTeX▼] - Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, and Josep Prieto-Blázquez.
Towards secure mobile P2P applications using JXME.
Journal of Internet Services and Information Security (JISIS), 2(1/2):1–21, 2 2012.
[BibTeX▼]
2011
- Abraham Martín-Campillo, Ramon Martí, Eiko Yoneki, and Jon Crowcroft.
Electronic triage tag and opportunistic networks in disasters.
In Proceedings of the Special Workshop on Internet and Disasters, SWID '11, 1–10. New York, NY, USA, 2011. Association for Computing Machinery.
URL: https://doi.org/10.1145/2079360.2079366, doi:10.1145/2079360.2079366.
[BibTeX▼] - Estanislao Mercadal, Sergi Robles, Ramon Martí, Cormac J Sreenan, and Joan Borrell.
Heterogeneous multiagent architecture for dynamic triage of victims in emergency scenarios.
Springer, Berlin, Heidelberg, 2011.
ISBN 978-3-642-19875-5.
doi:10.1007/978-3-642-19875-5_31.
[BibTeX▼] - C. Martínez-García, G. Navarro-Arribas, S.N. Foley, V. Torra, and J. Borrell.
Flexible security inter-domain interoperability through attribute conversion.
Information Sciences, 181(16):3491–3507, August 2011.
URL: http://www.sciencedirect.com/science/article/pii/S0020025511001976, doi:10.1016/j.ins.2011.04.023.
[BibTeX▼] - A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra.
Semantic microaggregation for the anonymization of query logs using the open directory project.
SORT - Statistics and Operations Research Transactions, pages 41–58, 2011.
ISSN 1696-2281, eISSN 2013-8830, JCR2009SCI: 0.368 (Q4), JCR2010SCI: 0.250 (Q4).
[BibTeX▼] - C. Martínez-García, G. Navarro-Arribas, and J. Borrell.
Fuzzy role-based access control.
Information Processing Letters, 111(10):483–487, April 2011.
ISSN 0020-0190, JCR2009SCI: 0.764 (Q3), JCR2010SCI: 0.612 (Q4).
doi:doi:10.1016/j.ipl.2011.02.010.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
On the declassification of confidential documents.
In Modeling Decisions for Artificial Intelligence, MDAI 2011, volume 6820 of Lecture Notes in Artificial Intelligence, 235–246. Springer Berlin / Heidelberg, 2011.
ISSN 0302-9743, CORE(2008) B, CORE(2013) B.
URL: http://dx.doi.org/10.1007/978-3-642-22589-5_22, doi:10.1007/978-3-642-22589-5_22.
[BibTeX▼] - A. Erola, J. Castellà-Roca, G. Navarro-Arribas, and V. Torra.
Semantic microaggregation for the anonymization of query logs.
In Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, 127–137. Springer Berlin / Heidelberg, 2011.
ISSN 0302-9743, CORE(2008) C, CORE(2013) B.
URL: https://link.springer.com/chapter/10.1007%2F978-3-642-15838-4_12, doi:10.1007/978-3-642-15838-4_12.
[BibTeX▼] - D. Abril, V. Torra, and G. Navarro-Arribas.
Supervised learning using mahalanobis distance for record linkage.
In Proceedings of 6th International Summer School on Aggregation Operators (AGOP 2011), 223–228. July 2011.
ISBN 978-1-4477-7019-0.
[BibTeX▼] - V. Torra, D. Abril, and G. Navarro-Arribas.
Fuzzy methods for database protection.
In 7th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-2011), 439–443. 2011.
Series: Advances in Intelligent Systems Research, Atlantis Press ISBN 978-90-78677-00-0. DOI doi:10.2991/eusflat.2011.143, Aix-les-Bains, France.
doi:10.2991/eusflat.2011.143.
[BibTeX▼] - V. Torra, D. Abril, and G. Navarro-Arribas.
Supervised learning approach for distance based record linkage as disclosure risk evaluation.
In Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality. Tarragona, Spain, October 2011.
[BibTeX▼] - Joan Melia-Segui, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomarti.
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags.
In IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, volume, 3820 –3825. nov. 2011.
doi:10.1109/IECON.2011.6119932.
[BibTeX▼] - Joan Melià-Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí.
Practical eavesdropping of control data from EPC Gen2 queries with a programmable RFID toolkit.
Hakin9, 6(9):14–19, Set. 2011.
[BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
Computational and energy costs of cryptographic algorithms on handheld devices.
Future Internet, 3(1):31–48, 2011.
URL: http://www.mdpi.com/1999-5903/3/1/31/, doi:10.3390/fi3010031.
[BibTeX▼] - Joan Melià -Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí.
A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags.
Wireless Personal Communications, 59:27–42, 2011.
10.1007/s11277-010-0187-1.
URL: http://dx.doi.org/10.1007/s11277-010-0187-1.
[abstract▼] [BibTeX▼] - Helena Rifà -Pous and Jordi Herrera-Joancomartí.
A fair and secure cluster formation process for ad hoc networks.
Wireless Personal Communications, 56:625–636, 2011.
10.1007/s11277-010-9994-7.
URL: http://dx.doi.org/10.1007/s11277-010-9994-7.
[abstract▼] [BibTeX▼]
2010
- Abraham Martín-Campillo, Carles Martínez-García, Jordi Cucurull, Ramon Martí, Sergi Robles, and Joan Borrell.
Mobile agents in healthcare, a distributed intelligence approach.
Volume 309.
Springer, Berlin, Heidelberg, 2010.
ISBN 978-3-642-14463-9.
[BibTeX▼] - Carlos Borrego and Sergi Robles.
Mobile agent virtual organisation to improve relative information in grid services.
In 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 45–49. IEEE, 2010.
[BibTeX▼] - V. Torra, G. Navarro-Arribas, and D. Abril.
Supervised learning for database integration through weighted means and OWA operators.
Control and Cybernetics, 39(4):1011–1026, 2010.
[BibTeX▼] - J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, J. Borrell, and G. Suades.
Fragment transfer protocol: an IEEE-FIPA based efficient transfer protocol for mobile agents.
Computer Communications, 33(18):2203–2214, December 2010.
doi:10.1016/j.comcom.2010.08.005.
[BibTeX▼] - G. Navarro-Arribas and V. Torra.
Privacy-preserving data-mining through micro-aggregation for web-based e-commerce.
Internet Research, 20(3):366–384, 2010.
doi:10.1108/10662241011050759.
[BibTeX▼] - J. Cucurull, G. Navarro-Arribas, R. Martí, S. Robles, and J. Borrell.
An efficient and secure agent code distribution service.
Software: Practice and Experience, 40(4):363–386, 2010.
doi:10.1002/spe.963.
[BibTeX▼] - C. Garrigues, S. Robles, J. Borrell, and G. Navarro-Arribas.
Promoting the development of secure mobile agent applications.
Journal of Systems and Software, 83(6):959–971, June 2010.
doi:10.1016/j.jss.2009.11.001.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Towards semantic microaggregation of categorical data for confidential documents.
In Modeling Decisions for Artificial Intelligence, MDAI 2010, volume 6408 of Lecture Notes in Artificial Intelligence, 266–276. 2010.
ISSN 0302-9743, CORE(2008) B, CORE(2013) B.
URL: https://link.springer.com/chapter/10.1007/978-3-642-16292-3_26, doi:10.1007/978-3-642-16292-3_26.
[BibTeX▼] - D. Abril, G. Navarro-Arribas, and V. Torra.
Towards privacy preserving information retrieval through semantic microaggregation.
In Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on, 296–299. 2010.
ISBN 978-0-7695-4191-4, CORE(2008) C, CORE(2013) B, CiteSeer VIP(2007) 0.02 (376/581), York University, Toronto, Canada.
doi:10.1109/WI-IAT.2010.132.
[BibTeX▼] - I. Cano, G. Navarro-Arribas, and V. Torra.
Last results on constrained microaggregation.
In III Simposio Sobre Lógica Fuzzy y Soft Computing, CEDI 2010. 2010.
[BibTeX▼] - G. Navarro-Arribas, V. Torra, A. Erola, and J. Castellà-Roca.
Microagregación para el $k$-anonimato en registros de buscadores web.
In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, 135–140. Publicacions URV, 2010.
[BibTeX▼] - C. Martínez-García, G. Navarro-Arribas, and J. García-Alfaro.
Despliegue de políticas condicionadas para la protección de atributos en negociadores móviles.
In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, 171–175. Publicacions URV, 2010.
[BibTeX▼] - C. Martínez-García, A. Martín-Campillo, G. Navarro-Arribas, R. Martí, and J. Borrell.
Control de acceso interoperable para la mejora en la cooperación entre grupos de emergencias.
In RECSI 2010. XI Reunión Española sobre Criptología y Seguridad de la Información, 241–246. Publicacions URV, 2010.
[BibTeX▼] - V. Torra, G. Navarro-Arribas, and D. Abril.
On the applications of aggregation operators in data privacy.
In Integrated Uncertainty Management and Applications, volume 68 of Advances in Soft Computing, 479–488. Springer, 2010.
Ishikawa, Japan (9-11 April, 2010).
doi:10.1007/978-3-642-11960-6_44.
[BibTeX▼] - Apol.lonia Martínez Nadal, Jordi Herrera-Joancomartí, and Cristina Pérez-solà.
Análisis técnico-jurídico del proceso de iniciativa legislativa popular con recogida de firmas digitales en españa.
Revista de derecho y tecnología, 11:191–216, 2010.
[BibTeX▼] - Cristina Peréz-Solà and Jordi Herrera-Joancomartí.
OSN: when multiple autonomous users disclose another individual's information.
P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on, 0:471–476, 2010.
doi:http://doi.ieeecomputersociety.org/10.1109/3PGCIC.2010.80.
[BibTeX▼] - Marc Domingo-Prieto, Joan Arnedo Moreno, and Jordi Herrera-Joancomartí.
Security analysis of JXME-proxyless version.
In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), 301–306. Tarragona, 2010.
[BibTeX▼] - Joan Melià, Joaquin García-Alfaro, and Jordi Herrera-Joancomartí.
Clasificación de las amenazas a la seguridad en sistemas RFID - EPC gen2.
In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), 211–216. Tarragona, 2010.
[BibTeX▼] - Cristina Pérez-solà, Apol.lonia Martínez Nadal, and Jordi Herrera-Joancomartí.
El proceso de iniciativa legislativa popular por medio de firmas digitales.
In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), 123–128. Tarragona, 2010.
[BibTeX▼] - J. Melià-Seguí, J. Garcia-Alfaro, and J. Herrera-Joancomartí.
Rfid epc-gen2 for postal applications: a security and privacy survey.
In 2010 IEEE International Conference on RFID-Technology and Applications, volume, 118–123. June 2010.
doi:10.1109/RFID-TA.2010.5529872.
[BibTeX▼] - Marc Domingo-Prieto, Joan Arnedo Moreno, and Jordi Herrera-Joancomartí.
JXTA security in mobile constrained devices.
In Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA), 139–144. IEEE Computer Society, 2010.
doi:10.1109/WAINA.2010.178.
[BibTeX▼] - J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomarti.
Analysis and improvement of a pseudorandom number generator for epc gen2 tags.
In Proceedings of the 14th international conference on Financial cryptograpy and data security, FC'10, 34–46. Berlin, Heidelberg, 2010. Springer-Verlag.
URL: http://dl.acm.org/citation.cfm?id=1894863.1894867.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
XML-based security for JXTA core protocols.
International Journal of Autonomic Computing (IJAC), 1(4):447–469, December 2010.
URL: http://dx.doi.org/10.1504/IJAC.2010.037517, doi:10.1504/IJAC.2010.037517.
[BibTeX▼] - Joan Arnedo-Moreno and Jordi Herrera-Joancomartí.
JXTA resource access control by means of advertisement encryption.
Future Generation Computer Systems, 26(1):21 – 28, 2010.
doi:10.1016/j.future.2009.05.023.
[BibTeX▼]
2009
- Abraham Martín-Campillo, Ramon Martí, Sergi Robles, and Carles Martínez-García.
Mobile agents for critical medical information retrieving from the emergency scene.
In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009), 30–39. Springer, Berlin, Heidelberg, Springer, 2009.
URL: https://doi.org/10.1007/978-3-642-00487-2\_4, doi:10.1007/978-3-642-00487-2\_4.
[BibTeX▼] - Ramon Martí, Sergi Robles, Abraham Martín-Campillo, and J Cucurull.
Providing early resource allocation during emergencies: the mobile triage tag.
Journal of Network and Computer Applications, 32(6):1167–1182, 2009.
URL: https://www.sciencedirect.com/science/article/pii/S1084804509000769, doi:https://doi.org/10.1016/j.jnca.2009.05.006.
[BibTeX▼] - Carlos Borrego and Sergi Robles.
Relative information in grid information service and grid monitoring using mobile agents.
In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009), 150–158. Springer, Berlin, Heidelberg, 2009.
[BibTeX▼] - J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, and J. Borrell.
Full mobile agent interoperability in an ieee-fipa context.
Journal of Systems and Software, 82(12):1927–1940, December 2009.
doi:10.1016/j.jss.2009.06.038.
[BibTeX▼] - J. Cucurull, R. Martí, G. Navarro-Arribas, S. Robles, B. Overeinder, and J. Borrell.
Agent mobility architecture based on IEEE-FIPA standards.
Computer Communications, 32(4):712–729, March 2009.
doi:10.1016/j.comcom.2008.11.038.
[abstract▼] [BibTeX▼] - V. Torra, I. Cano, and G. Navarro-Arribas.
Dealing with edit constraints in microdata protection: microaggregation.
In Joint UNECE/Eurostat Work Session on Statistical Data Confidentiality. Bilbao, Spain (2-4 December, 2009), December 2009.
[BibTeX▼] - I. Cano, G. Navarro-Arribas, and V. Torra.
A new framework to automate constrained microaggregation.
In Proceeding of the ACM first international workshop on Privacy and anonymity for very large databases (Conference on Information and Knowledge Management), 1–8. Hong Kong, China, November 2009. ACM.
Keynote, ISBN 978-1-60558-804-9, CIKM CORE(2008) A, CIKM CORE(2013) A, CIKM CiteSeer VIP(2007) 0.05 (152/581).
doi:10.1145/1651449.1651451.
[BibTeX▼] - G. Navarro-Arribas and V. Torra.
Tree-based microaggregation for the anonymization of search logs.
In IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, volume 3, 155–158. Milano, Italy, September 2009. IEEE Computer Society.
ISBN 978-0-7695-3801-3, CORE(2008) C, CORE(2013) B, CiteSeer VIP(2007) 0.02 (376/581).
doi:10.1109/WI-IAT.2009.251.
[BibTeX▼] - G. Navarro-Arribas and V. Torra.
Towards microaggregation of log files for web usage mining in B2C e-commerce.
In The 28th North American Fuzzy Information Processing Society Annual Conference (NAFIPS2009), 1–6. Cincinnati, OH, USA (14-17 June 2009), June 2009. IEEE Press.
ISBN 978-1-4244-4577-6, CORE(2008) C, CORE(2013) C.
doi:10.1109/NAFIPS.2009.5156452.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas and J. Garcia-Alfaro.
A policy-based approach for the management of web browser resources to prevent anonymity attacks in Tor.
In Emerging Challenges for Security, Privacy, and Trust. International Information Security Conference (SEC-2009), volume 297 of IFIP AICT, 164–175. Cyprus, Greece (18-20 May, 2009), May 2009. Springer Verlag.
CORE(2013) B.
doi:10.1007/978-3-642-01244-0_15.
[BibTeX▼] - C. Martínez-García, G. Navarro-Arribas, J. Borrell, and A. Martín-Campillo.
An access control scheme for multi-agent systems over multi-domain environments.
In 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, volume 55 of Advances in Intelligent and Soft Computing, 401–410. Salamanca, Spain (25-27 March 2009), 2009. Springer Verlag.
ISSN 1867-5662, CORE(2008) C, CORE(2013) C.
doi:10.1007/978-3-642-00487-2_43.
[BibTeX▼] - Jordi Castellà-Roca, Alexandre Viejo, and Jordi Herrera-Joancomartí.
Preserving user's privacy in web search engines.
Computer Communications, 32:1541–1551, 2009.
doi:10.1016/j.comcom.2009.05.009.
[abstract▼] [BibTeX▼] - Jordi Herrera-Joancomartí and D. Megías.
Watermarking in the encrypted domain.
In Actas del V Congreso Iberoamericano de Seguridad Informática CIBSI-09, 202–212. Montevideo, Uruguay, 2009.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
Maintaining unlinkability in group based p2p environments.
In 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 140–145. Los Alamitos, CA, USA, 2009. IEEE Computer Society.
doi:10.1109/WETICE.2009.24.
[abstract▼] [BibTeX▼] - Joan Arnedo-Moreno and Jordi Herrera-Joancomartí.
A security layer for JXTA core protocols.
In Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC), 463–468. Los Alamitos, CA, USA, 2009. IEEE Computer Society.
doi:10.1109/CISIS.2009.24.
[BibTeX▼] - Joan Arnedo-Moreno and Jordi Herrera-Joancomartí.
A survey on security in JXTA applications.
Journal of Systems and Software, 82(9):1513 – 1525, 2009.
SI: QSIC 2007.
doi:10.1016/j.jss.2009.04.037.
[BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
Cryptographic energy costs are assumable in ad hoc networks.
IEICE Transactions on Information and Systems, E92.D(5):1194–1196, 2009.
doi:10.1587/transinf.E92.D.1194.
[BibTeX▼] - Josep Prieto-Blazquez, Jordi Herrera-Joancomartí, and Ana-Elena Guerrero-Roldán.
A virtual laboratory structure for developing programming labs.
International Journal of Emerging Technologies in Learning (iJET), 4(S1):47–52, 2009.
URL: http://dblp.uni-trier.de/db/journals/ijet/ijet4.html#Prieto-BlazquezHG09.
[BibTeX▼]
2008
- A Martín-Campillo, S Robles, R Martí, and C Garrigues.
Historial clínico distribuido y seguro para situaciones de emergencias.
In Actas de la X Reunión Española de Criptología y Seguridad de la Información, 503–512. 2008.
[BibTeX▼] - J. Garcia-Alfaro and G. Navarro-Arribas.
Prevención de ataques de \emph Cross-Site Scripting en aplicaciones web.
In Luis Hernández-Encinas and Angel Martín-del-Rey, editors, Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, 369–377. Salamanca, Spain, September 2008.
[BibTeX▼] - C. Martinez-Garcia, G. Navarro-Arribas, J. Borrell, and A. Martin-Campillo.
Sistema impreciso de control de acceso basado en la conversión cuantificada de atributos para escenarios de interoperabilidad.
In Luis Hernández-Encinas and Angel Martín-del-Rey, editors, Actas de la X Reunión Española sobre Criptología y Seguridad de la Información, 357–367. Salamanca, Spain, September 2008.
[BibTeX▼] - Josep Prieto-Blázquez and Jordi Herrera-Joancomartí.
A virtual laboratory structure for computer engineering education.
X The International Symposium on Computers in Education, 2008. Salamanca (Spain), 1():S11:1–6, October 2008.
[BibTeX▼] - Josep Prieto-Blázquez, Ivan García-Torà, Jordi Herrera-Joancomartí, and Anna Guerrero-Roldán.
Virtual laboratory ontology for engineering education.
Frontiers in Education, 2008. FIE 2008. 38th Annual. Saratoga (EEUU), 1():S2F–1 Vol. 1, October 2008.
doi:10.1109/FIE.2008.4720470.
[BibTeX▼] - Josep Prieto-Blázquez, Joan Arnedo-Moreno, and Jordi Herrera-Joancomartí.
An integrated structure for a virtual networking laboratory.
Industrial Electronics, IEEE Transactions on, 55(6):2334–2342, June 2008.
doi:10.1109/TIE.2008.921231.
[BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
A forwarding cooperation protocol for plain and cluster-based ad hoc networks.
Journal of Communications Software and Systems (JCOMSS), 4(1):3–12, March 2008.
[BibTeX▼] - Xavier Domenech, Jordi Herrera-Joancomartí, and David Megias.
Prevención de ataques de desincronización en esquemas de watermarking de audio.
In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), 551–556. Salamanca, 2008.
[BibTeX▼] - Guillermo Navarro, Joaquin Garcia-Alfaro, Oriol Mula, and Jordi Herrera-Joancomartí.
Gestión de recursos de un navegador web para prevenir ataques contra la privacidad en TOR.
In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), 629–638. Salamanca, 2008.
[BibTeX▼] - Joan Melià, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí.
Analisis de seguridad y Privacidad para sistemas EPC-RFID.
In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), 639–646. Salamanca, 2008.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
JXTA security in basic peer operations.
In Actas de la IX Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), 405–414. Salamanca, 2008.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
Persistent interoperable security for JXTA.
In Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008, 354–359. IEEEPress, 2008.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
Collaborative group membership and access control for JXTA.
In Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, volume, 159–166. IEEE Computer Society, Jan. 2008.
doi:10.1109/COMSWA.2008.4554399.
[BibTeX▼]
2007
- Joan Borrell, Cristina Fernández, Fernando García, Ramon Martí, Jordi Pons i Sala, and Sergi Robles.
Portfolios virtuales basados en wiki para evaluación continua y evaluación por compañeros.
In Martín Llamas Nistal, Carlos Vaz de Carvalho, and Carlos Rueda Artunduaga, editors, TICAI 2006: TICs para el Aprendizaje de la Ingeniería, 45–52. Universidade de Vigo, 2007.
[BibTeX▼] - J. Garcia-Alfaro and G. Navarro-Arribas.
Prevention of cross-site scripting attacks on current web applications.
In On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, volume 4804 of Lecture Notes in Computer Science, 1770–1784. Springer Berlin / Heidelberg, nov 2007.
ISSN 0302-9743, CiteSeer VIP(2007) 0.01 (472/581).
doi:10.1007/978-3-540-76843-2.
[abstract▼] [BibTeX▼] - J. Garcia-Alfaro and G. Navarro-Arribas.
A survey on detection techniques to prevent cross-site scripting attacks on current web applications.
In Critical Information Infrastructures Security, volume 5141 of Lecture Notes in Computer Science, 287–298. Malaga, Spain (3-5 October, 2007), 2007.
(acceptance rate: 38%), ISSN 0302-9743, CORE(2008) C, CORE(2013) C.
doi:10.1007/978-3-540-89173-4_24.
[abstract▼] [BibTeX▼] - J. Cucurull, R. Marti, S. Robles, J. Borrell, and G. Navarro-Arribas.
Fipa-based interoperable agent mobility.
In Multi-Agent Systems and Applications V (CEEMAS 2007), volume 4696 of Lecture Notes in Artificial Intelligence, 319–321. Leipzig, Germany (September 25-27, 2007), September 2007. Springer Berlin / Heidelberg.
(acceptance rate: 34 %), ISSN 0302-9743, CiteSeer VIP(2007) 0.01 (462/581).
URL: https://link.springer.com/chapter/10.1007/978-3-540-75254-7_37, doi:10.1007/978-3-540-75254-7_37.
[abstract▼] [BibTeX▼] - M.C. de Toro, S. Robles, R. Martí, G. Navarro-Arribas, and J. Borrell.
Hacia una solución global para servicios médicos en situaciones de emergencia.
In Actas del II Simposio sobre Seguridad Informática del Congreso Español de Informática, 217–224. Zaragoza, Spain (11-14 September, 2007), September 2007. Thomson.
[BibTeX▼] - Helena Rifà-Pous, Joan Vila-Canals, and Jordi Herrera-Joancomartí.
Coste de los protocolos de seguridad en redes manet.
In Actas del II Simposio sobre Seguridad Informática [SSI'2007]. ISBN: 978-84-9732-607-0, 127–134. Zaragoza, España, 2007.
[BibTeX▼] - Joan Arnedo Moreno and Jordi Herrera-Joancomartí.
Resolución de escenarios en control de acceso a grupo en entornos distribuidos.
In CEDI: Simposio sobre seguridad informática, 119–126. Zaragoza, España, 2007.
[BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
A forwarding spurring protocol for multihop ad hoc networks (furies).
In Next Generation Teletraffic and Wired/Wireless Advanced Networking, Proceedings, volume 4712 of LNCS, 281–293. SPRINGER-VERLAG BERLIN, 2007.
7th International Conference on Next Generation Teletraffic and Wire/Wireless Advanced Networking, St Petersburg, RUSSIA, SEP 10-14, 2007.
doi:10.1007/978-3-540-74833-5_24.
[abstract▼] [BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
An interdomain pki model based on trust lists.
In EuroPKI, LNCS 4582, 49–64. Springer, June 2007.
doi:10.1007/978-3-540-73408-6_4.
[BibTeX▼] - Helena Rifà-Pous and Jordi Herrera-Joancomartí.
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol.
In Communication Networks and Services Research (CNSR), 372–380. Los Alamitos, CA, USA, 2007. IEEE Computer Society.
doi:10.1109/CNSR.2007.57.
[BibTeX▼]
2006
- Joan Borrell, Ramon Martí, Guillermo Navarro, Jordi Pons, and Sergi Robles.
Noves experiències d'avaluació usant wikis: grups nombrosos i avaluació per companys.
In Actes del 4rt Congrés Internacional de Docència Universitària i Innovació. 2006.
[BibTeX▼] - P. Vieira-Marques, S. Robles, J. Cucurull, R. Cruz-Correia, G. Navarro-Arribas, and R. Martí.
Secure integration of distributed medical data using mobile agents.
IEEE Intelligent Systems, 21(6):47–54, November-December 2006.
doi:10.1109/MIS.2006.120.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell.
Smartcop a smart card based access control for the protection of network security components.
In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, volume 4277 of Lecture Notes in Computer Science, 415–424. Montpellier, France (October 29 - November 3, 2006), October 2006. OTM 2006, Springer Verlag.
ISSN 0302-9743, CiteSeer VIP(2007) 0.01 (472/581).
doi:10.1007/11915034_65.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, J. Castella-Roca, G. Navarro-Arribas, and J. Borrell.
Protection of components based on a smart-card enhanced security module.
In Javier Lopez, editor, Critical Information Infrastructures Security, volume 4347 of Lecture Notes in Computer Science, 128–139. Samos, Greece (August 31 - September 1, 2006), September 2006. CRITIS 2006, Springer Verlag.
(acceptance rate: 38%), ISSN 0302-9743, CORE(2008) C, CORE(2008) C.
doi:10.1007/11962977_11.
[abstract▼] [BibTeX▼] - J. Ametller, J. Cucurull, R. Martí, G. Navarro-Arribas, and S. Robles.
Enabling mobile agents interoperability through fipa standards.
In M. Klusch, M. Rovatsos, and T. R. Payne, editors, Cooperative Information Agents X, volume 4149 of Lecture Notes in Artificial Intelligence, 388–401. Edinburgh, UK (September 11-13, 2006), September 2006. CIA 2006, Springer Verlag.
ISSN 0302-9743.
doi:10.1007/11839354_28.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas and J. Borrell.
An XML standards based authorization framework for mobile agents.
In Mike Burmester and Alec Yasinsac, editors, Secure Mobile Ad-hoc Networks and Sensors, volume 4075 of Lecture Notes in Computer Science, 54–66. Singapore, September 2006. Springer Verlag.
(acceptance rate: 36%), ISSN 0302-9743.
doi:10.1007/11801412_6.
[BibTeX▼] - G. Navarro-Arribas and S. N. Foley.
Aproximando saml con medidas de similitud.
In J. Borrell and J. Herrera, editors, Actas de la IX Reunión Española de Criptología y Seguridad de la Información, 238–263. Barcelona, Spain, July 2006. RECSI 2006.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, J. Castella-Roca, and G. Navarro-Arribas.
Protección de componentes y dispositivos de seguridad mediante un control de acceso basado en kernel.
In J. Borrell and J. Herrera, editors, Actas de la IX Reunión Española de Criptología y Seguridad de la Información, 773–787. Barcelona, Spain, July 2006. RECSI 2006.
[abstract▼] [BibTeX▼]
2005
- Joan Borrell, Cristina Fernández, Fernando García, Ramon Martí, Jordi Pons, and Sergi Robles.
Wikibased virtual portfolios for continuous evaluation and co-evaluation.
In International Conference on Engineering and Computer Education, volume 37. 2005.
[BibTeX▼] - Borja Richart, Ramon Martí, Jaime Delgado, Abdul Hamid Sadka, and Peter Sweeney.
Definition of protocols for secure anonymous purchase.
In Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services-(icas-isns' 05), 34–34. IEEE, 2005.
doi:10.1109/ICAS-ICNS.2005.39.
[BibTeX▼] - G. Navarro-Arribas, J.A. Ortega-Ruiz, J Ametller, and S Robles.
Distributed authorization framework for mobile agents.
In T. Magendanz, K. Ahmed, and I. Venieris, editors, Mobility Aware Technologies and Applications, volume 3744 of Lecture Notes in Computer Science, 127–136. Montreal, Canada, October 2005. Springer.
SCI-JCR(2005): 0.4 (Q4), ISSN 0302-9743.
doi:10.1007/11569510_13.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas and S. N. Foley.
Approximating saml using similarity based imprecision.
In Intelligence in Communication Systems (IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005), volume 190 of IFIP International Federation for Information Processing Series, 77–86. Montréal, Canada, October 2005. Springer.
URL: http://www.springerlink.com/content/x8v850808l1626h5/, doi:10.1007/0-387-32015-6_18.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell.
Acaps: an access control mechanism to protect the components of an attack prevention system.
Journal of Computer Science and Network Security, 5(11):87–94, November 2005.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, J Peñalver, J. Ametller, J. A. Ortega-Ruiz, J. García-Alfaro, and J. Borrell.
Amapola: a simple infrastructure for ubiquitous computing.
In Intelligence in Communication Systems (IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005), volume 190 of IFIP International Federation for Information Processing Series, 77–86. Montréal, Canada, October 2005. Springer.
URL: http://www.springerlink.com/content/c086q346th268t72/, doi:10.1007/0-387-32015-6_8.
[abstract▼] [BibTeX▼] - J. García, F. Cuppens, F. Autrel, J. Castellà-Roca, J. Borrell, G. Navarro-Arribas, and J.A. Ortega-Ruiz.
Protecting on-line casinos against fraudulent player drop-out.
In International Conference on Information Technology, volume I, 500–506. Nevada, USA, April 2005. IEEE Computer Society Press.
ISBN 0-7695-2315-3, CORE(2008) C, CORE(2013) C.
doi:10.1109/ITCC.2005.232.
[abstract▼] [BibTeX▼] - J. Castellà-Roca, G. Navarro-Arribas, J.A. Ortega-Ruiz, and J. García.
Digital chips for an on-line casino.
In International Conference on Information Technology, volume I, 494–499. Nevada, USA, April 2005. IEEE Computer Society Press.
ISBN 0-7695-2315-3, CORE(2008) C, CORE(2013) C.
doi:10.1109/ITCC.2005.130.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell.
Mechanisms for attack protection on a prevention framework.
In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology, 137–140. Las Palmas de G.C., Spain, October 2005. IEEE Press.
ISBN 0-7803-9245-0.
doi:10.1109/CCST.2005.1594872.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas and J. A. Ortega-Ruiz.
Secure agent-based management for pervasive computing.
In Proceedings of the 39th Annual IEEE International Carnahan Conference on Security Technology, 133–136. Las Palmas de G.C., Spain, October 2005. IEEE Press.
ISBN 0-7803-9245-0.
doi:10.1109/CCST.2005.1594864.
[abstract▼] [BibTeX▼] - S. Castillo, J. García-Alfaro, G. Navarro-Arribas, and J. Borrell.
Protección de componentes en una plataforma para la prevención de ataques coordinados.
In In Proceedings of the first Spanish Conference on Informatics (CEDI 2005), Information Security Symposium, 265–272. Granada, Spain, September 2005.
ISBN 84-9732-447-1.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, J. Borrell, J.A. Ortega-Ruiz, and S. Robles.
Access control with safe role assignment for mobile agents.
In F. Dignum, V. Dignum, S. Koenig, S. Kraus, M.P. Singh, and M. Wooldridge, editors, Proceedings of the Fourth International Joint Conference on Autonomous agents and Multi Agent Systems (AAMAS), volume 3, 1235–1236. Utrecht, The Netherlands, July 2005. ACM Press.
ISBN 1-59593-094-9, CORE(2008) A, CORE(2013) A*, CiteSeer VIP(2007) 0.02 (361/581).
doi:http://doi.acm.org/10.1145/1082473.1082710.
[abstract▼] [BibTeX▼]
2004
- Juan C Sánchez, Xavier Perramon, Ramon Martí, and Jaime Delgado.
Implementation and performance evaluation of communications security in a mobile e-health service.
In Mário Marques Freire, Prosper Chemouil, Pascal Lorenz, and Annie Gravey, editors, European Conference on Universial Multiservice Networks, 450–459. Springer, Berlin, Heidelberg, Springer Berlin Heidelberg, 2004.
doi:10.1007/978-3-540-30197-4_45.
[BibTeX▼] - Ramon Martí, Jaime Delgado, and Xavier Perramon.
Network and application security in mobile e-health applications.
In Hyun-Kook Kahng and Shigeki Goto, editors, International Conference on Information Networking, 995–1004. Springer, Springer Berlin Heidelberg, 2004.
[BibTeX▼] - Ramon Martí, Jaime Delgado, and Xavier Perramon.
Security specification and implementation for mobile e-health services.
In IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE'04. 2004, 241–248. IEEE, 2004.
doi:10.1109/EEE.2004.1287316.
[BibTeX▼] - J. García-Alfaro, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, and G. Navarro-Arribas.
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation.
In J. López, S. Qing, and E. Okamoto, editors, 6th International Conference on Information and communications Security, volume 3269 of Lecture Notes in Computer Science, 223–235. Springer Verlag, October 2004.
SCI-JCR(2004): 0.51 (Q3), (acceptance rate: 17%),ISSN 0302-9743, CORE(2008) B, CORE(2008) C, CiteSeer VIP(2007) 0.02 (371/581).
URL: https://link.springer.com/chapter/10.1007/978-3-540-30191-2_18, doi:http://dx.doi.org/10.1007/b101042.
[abstract▼] [BibTeX▼] - J. García-Alfaro, F. Autrel, J. Borrell, Y. Bouzida, S. Castillo, F. Cuppens, and G. Navarro-Arribas.
Preventing coordinated attacks via alert correlation.
In Teemupekka Virtanen Sanna Liimatainen, editor, 9th Nordic Workshop on Secure IT Systems, 110–117. Departement of Computer Science at Helsinki University of Technology, Publications in Telecommunications Software and Multimedia, November 2004.
ISSN 1456-7911, CORE(2008) C, CORE(2013) C.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, J. García, and J. A. Ortega-Ruiz.
Chained and delegable authorization tokens.
In Teemupekka Virtanen Sanna Liimatainen, editor, 9th Nordic Workshop on Secure IT Systems, 8–14. Departement of Computer Science at Helsinki university of Technology, Publications in Telecommunications Software and multimedia, November 2004.
ISSN 1456-7911, CORE(2008) C, CORE(2013) C.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas and J. García.
Cadat: control de acceso basado en tokens y cadenas hash delegables.
In Avances en Criptología y Seguridad de la información, 425–435. Leganés, Spain, September 2004. VIII RECSI, Ediciones Díaz de Santos.
ISBN 84-7978-650-7.
[abstract▼] [BibTeX▼] - J. García-Alfaro, S. Castillo, G. Navarro-Arribas, and J. Borrell.
Diseño y desarrollo de un sistema colaborativo para la prevención de ataques coordinados.
In In Avances en Criptología y Seguridad de la Información, 475–493. Leganés, Spain, September 2004. VIII RECSI, Ediciones Díaz de Santos.
ISBN 84-7978-650-7.
[abstract▼] [BibTeX▼]
2003
- Habtamu Abie, Bernd Blobel, J Delgado, S Karnouskos, R Marti, Peter Pharow, and Olli Pitkänen.
Digiright: relevance to and potential impact on europe’s need to strengthen the science and technology excellence on drm.
In Proceedings of the First International Mobile IPR Workshop: Rights Management of Information Products on the Mobile Internet, 127–134. HIIT Publications, 2003.
[BibTeX▼] - G. Navarro-Arribas, B. Sadighi Firozabadi, E. Rissanen, and J. Borrell.
Constrained delegation in xml-based access control and digital rights management standards.
In M. H. Hamza, editor, CNIS03, Special Session on Architectures and Languages for Digital Rights Management and Access Control, 271–276. New York, USA, December 2003. Acta Press.
[abstract▼] [BibTeX▼] - J. Ametller, J. Borrell, J. García, G. Navarro-Arribas, and S. Robles.
Framework for developing mobile agent applications.
In Antonio Moreno, editor, Actas X Conferencia de la Asociación Española para la Inteligencia Artificial (CAEPIA 2003), 66–67. San Sebastian, Spain, November 2003.
[BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
Assigning roles for access control in mobile agent applications.
In The 3rd IFIP Conference on e-Commerce, e-Business, and e-Government, IFIP Conference Proceedings, 30–41. Sao Paulo, Brazil, September 2003. Kluwer Academic.
[abstract▼] [BibTeX▼]
2002
- Ramon Martí and Jaime Delgado.
A secure multicast pay-per-view application over internet.
In IEEE International Conference on, Telecommunications (ICT’02), volume 1, 742–747. 2002.
[BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
Role-based access control for e-commerce sea-of-data applications.
In Agnes Hui and Virgil Gligor, editors, Information Security. 5th International Conference, ISC 2002, volume 2433 of Lecture Notes in Computer Science, 102–116. Sao Paulo, September/October 2002. Springer Verlag.
SCI-JCR(2002): 0.515 (Q3), ISSN 0302-9743, CORE(2008) B, CORE(2013) B CiteSeer VIP(2007) 0.04 (172/581), CiteSeer VIP(2002) 0.11 (320/800).
[abstract▼] [BibTeX▼] - S. Robles, G. Navarro-Arribas, J. Pons, J. Rifà, and J. Borrell.
Mobile agents supporting secure grid environments.
In M. Wilson B. Matthews, B. Hopgood, editor, Euroweb 2002 Conference, 195–197. Oxford, UK, December 2002. World Wide Web Consortium, British Computer Society.
ISBN 1-902505-50-6.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
Adapted role-based access control for marism-a using spki certificates.
In 2nd. IW on Security of Mobile Multiagent Systems, 35–42. Bologna, Italy, July 2002.
ISSN 0946-008X.
[abstract▼] [BibTeX▼] - S. Robles, I. Luque, G. Navarro-Arribas, J. Pons, and J. Borrell.
Plataforma segura para la ejecución de agentes móviles con itinerario, código y datos protegibles.
In C. Martínez S. González, editor, VII Reunión Española sobre Criptología y Seguridad de la Información, volume II, 765–778. Oviedo, Spain, September 2002. Servicio de Publicaciones de la Universidad de Oviedo.
ISBN 84-699-8932-4.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
Spki para el control de acceso a recursos en entornos de agentes móviles.
In C. Martínez S. Gonzalez, editor, VII Reunión Española sobre Criptología y Seguridad de la Información, volume II, 671–684. Oviedo, Spain, September 2002. Servicio de Publicaciones de la Universidad de Oviedo.
ISBN 84-699-8932-4.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
An access control method for mobile agents in sea-of-data applications.
Upgrade: The European Journal for the Informatics Professional, III:47–51, December 2002.
[abstract▼] [BibTeX▼] - G. Navarro-Arribas, S. Robles, and J. Borrell.
Un método de control de acceso para agentes móviles en aplicaciones mar-de-datos.
Novatica, pages 18–22, November-December 2002.
[abstract▼] [BibTeX▼]
2000
- Jaime Delgado, Ramon Martí, and Xavier Perramon.
Xml: more than an e-publishing language.
In ELPUB, 194–207. 2000.
[BibTeX▼]
1998
- Ramon Martí and Jaime Delgado.
Definition of service levels for electronic brokerage applications.
In Sebastiano Trigila, Al Mullery, Mario Campolargo, Hans Vanderstraeten, and Marcel Mampaey, editors, International Conference on Intelligence in Services and Networks, 351–362. Springer, Berlin, Heidelberg, Springer Berlin Heidelberg, 1998.
doi:10.1007/BFb0056980.
[BibTeX▼]
1997
- Ramon Martí and Jaime Delgado.
Use of www technology for client/server applications in multimediator.
In Al Mullery, Michel Besson, Mario Campolargo, Roberta Gobbi, and Rick Reed, editors, International Conference on Intelligence in Services and Networks, 61–68. Springer, Berlin, Heidelberg, Springer Berlin Heidelberg, 1997.
doi:10.1007/3-540-63135-6_6.
[BibTeX▼]
1995
- Jaime Delgado, Ramon Martí, and others.
El uso de documentos normalizados en la comisión de la unión europea.
In TECNIMAP 95: comunicaciones edición electrónica: Auditorium de Palma de Mallorca, 10, 11, 12 de mayo de 1995, 594–660. 1995.
[BibTeX▼]