Jordi Herrera-Joancomartí
Jordi Herrera-Joancomartí
Dirección de correo verificada de - Página principal
TítuloCitado porAño
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
Computational and energy costs of cryptographic algorithms on handheld devices
H Rifa-Pous, J Herrera-Joancomartí
Future internet 3 (1), 31-48, 2011
The bitcoin P2P network
JAD Donet, C Pérez-Sola, J Herrera-Joancomartí
International Conference on Financial Cryptography and Data Security, 87-102, 2014
An integrated structure for a virtual networking laboratory
J Prieto-Blázquez, J Arnedo-Moreno, J Herrera-Joancomartí
IEEE transactions on Industrial Electronics 55 (6), 2334-2342, 2008
Simple collusion-secure fingerprinting schemes for images
J Domingo-Ferrer, J Herrera-Joancomartí
Proceedings International Conference on Information Technology: Coding and …, 2000
Short collusion-secure fingerprints based on dual binary Hamming codes
J Domingo-Ferrer, J Herrera-Joancomarti
Electronics Letters 36 (20), 1697-1699, 2000
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
Research and challenges on bitcoin anonymity
J Herrera-Joancomartí
Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2014
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti
International Conference on Financial Cryptography and Data Security, 34-46, 2010
J3Gen: A PRNG for low-cost passive RFID
J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí
Sensors 13 (3), 3816-3830, 2013
An algorithm for k-degree anonymity on large networks
J Casas-Roma, J Herrera-Joancomartí, V Torra
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity
J Dittmann, D Megías, A Lang, J Herrera-Joancomartí
Transactions on Data Hiding and Multimedia Security I, 1-40, 2006
A robust audio watermarking scheme based on MPEG 1 layer 3 compression
D Megías, J Herrera-Joancomartí, J Minguillón
IFIP International Conference on Communications and Multimedia Security, 226-238, 2003
A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags
J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí
Wireless personal communications 59 (1), 27-42, 2011
Privacy in bitcoin transactions: new challenges from blockchain scalability solutions
J Herrera-Joancomartí, C Pérez-Solà
International Conference on Modeling Decisions for Artificial Intelligence …, 2016
A fair protocol for data trading based on Bitcoin transactions
S Delgado-Segura, C Pérez-Solà, G Navarro-Arribas, ...
Future Generation Computer Systems, 2017
A fair and secure cluster formation process for ad hoc networks
H Rifà-Pous, J Herrera-Joancomartí
Wireless Personal Communications 56 (3), 625-636, 2011
A survey on security in JXTA applications
J Arnedo-Moreno, J Herrera-Joancomartí
Journal of Systems and Software 82 (9), 1513-1525, 2009
Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags
J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomartí
IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society …, 2011
Analysis of the Bitcoin UTXO set
S Delgado-Segura, C Pérez-Sola, G Navarro-Arribas, ...
International Conference on Financial Cryptography and Data Security, 78-91, 2018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20