Seguir
Joan Borrell
Título
Citado por
Citado por
Año
Cryptocurrency networks: A new P2P paradigm
S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ...
Mobile Information Systems 2018, 1-16, 2018
722018
An uncoercible verifiable electronic voting protocol
A Riera, J Borrell, J Rifa
Global IT security (Vienna, Budapest, 31 August-2 September 1998), 206-215, 1998
401998
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation
J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro
Information and Communications Security: 6th International Conference, ICICS …, 2004
392004
Protecting mobile agent itineraries
J Mir, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2003
392003
Agent migration over FIPA ACL messages
J Ametller, S Robles, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2003
382003
Protecting general flexible itineraries of mobile agents
J Mir, J Borrell
International Conference on Information Security and Cryptology, 382-396, 2001
362001
Securing the itinerary of mobile agents through a non-repudiation protocol
J Borrell, S Robles, J Serra, A Riera
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999
361999
Fuzzy role-based access control
C Martínez-García, G Navarro-Arribas, J Borrell
Information processing letters 111 (10), 483-487, 2011
342011
Agent mobility architecture based on IEEE-FIPA standards
J Cucurull, R Martí, G Navarro-Arribas, S Robles, B Overeinder, J Borrell
Computer Communications 32 (4), 712-729, 2009
322009
Efficient broadcast in opportunistic networks using optimal stopping theory
C Borrego, J Borrell, S Robles
Ad Hoc Networks 88, 5-17, 2019
312019
Hey, influencer! Message delivery to social central nodes in social opportunistic networks
C Borrego, J Borrell, S Robles
Computer Communications 137, 81-91, 2019
302019
Promoting the development of secure mobile agent applications
C Garrigues, S Robles, J Borrell, G Navarro-Arribas
Journal of Systems and Software 83 (6), 959-971, 2010
282010
Protecting mobile agents from external replay attacks
C Garrigues, N Migas, W Buchanan, S Robles, J Borrell
Journal of Systems and Software 82 (2), 197-206, 2009
282009
Design of a trust model for a secure multi-agent marketplace
S Robles, J Borrell, J Bigham, L Tokarchuk, L Cuthbert
Proceedings of the fifth international conference on Autonomous agents, 77-78, 2001
262001
Sustainable sound absorbers from fruit stones waste
JMG Borrell, EJ Sanchis, JS Alcaraz, IM Belda
Applied Acoustics 161, 107174, 2020
252020
Practical mental poker without a TTP based on homomorphic encryption
J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
252003
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
A Riera, J Rifà, J Borrell
Information Processing Letters 75 (5), 211-215, 2000
232000
Securing dynamic itineraries for mobile agent applications
C Garrigues, S Robles, J Borrell
Journal of Network and Computer Applications 31 (4), 487-508, 2008
212008
Implementation of secure architectures for mobile agents in marism-a
S Robles, J Mir, J Ametller, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2002
212002
Constrained delegation in XML-based access control and digital rights management standards
G Navarro, BS Firozabadi, E Rissanen, J Borrell
CNIS03, Special Session on Architectures and Languages for Digital Rights …, 2003
202003
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20