Cryptocurrency networks: A new P2P paradigm S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ... Mobile Information Systems 2018 (1), 2159082, 2018 | 84 | 2018 |
An uncoercible verifiable electronic voting protocol A Riera, J Borrell, J Rifa Global IT security (Vienna, Budapest, 31 August-2 September 1998), 206-215, 1998 | 40 | 1998 |
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro Information and Communications Security: 6th International Conference, ICICS …, 2004 | 39 | 2004 |
Agent migration over FIPA ACL messages J Ametller, S Robles, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2003 | 37 | 2003 |
Efficient broadcast in opportunistic networks using optimal stopping theory C Borrego, J Borrell, S Robles Ad Hoc Networks 88, 5-17, 2019 | 36 | 2019 |
Fuzzy role-based access control C Martínez-García, G Navarro-Arribas, J Borrell Information processing letters 111 (10), 483-487, 2011 | 36 | 2011 |
Protecting general flexible itineraries of mobile agents J Mir, J Borrell International Conference on Information Security and Cryptology, 382-396, 2001 | 36 | 2001 |
Securing the itinerary of mobile agents through a non-repudiation protocol J Borrell, S Robles, J Serra, A Riera Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999 | 36 | 1999 |
Sustainable sound absorbers from fruit stones waste JMG Borrell, EJ Sanchis, JS Alcaraz, IM Belda Applied Acoustics 161, 107174, 2020 | 35 | 2020 |
Protecting mobile agent itineraries J Mir, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2003 | 35 | 2003 |
Hey, influencer! Message delivery to social central nodes in social opportunistic networks C Borrego, J Borrell, S Robles Computer Communications 137, 81-91, 2019 | 33 | 2019 |
Agent mobility architecture based on IEEE-FIPA standards J Cucurull, R Martí, G Navarro-Arribas, S Robles, B Overeinder, J Borrell Computer Communications 32 (4), 712-729, 2009 | 31 | 2009 |
Promoting the development of secure mobile agent applications C Garrigues, S Robles, J Borrell, G Navarro-Arribas Journal of Systems and Software 83 (6), 959-971, 2010 | 30 | 2010 |
Protecting mobile agents from external replay attacks C Garrigues, N Migas, W Buchanan, S Robles, J Borrell Journal of Systems and Software 82 (2), 197-206, 2009 | 29 | 2009 |
Practical mental poker without a TTP based on homomorphic encryption J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell International Conference on Cryptology in India, 280-294, 2003 | 25 | 2003 |
Design of a trust model for a secure multi-agent marketplace S Robles, J Borrell, J Bigham, L Tokarchuk, L Cuthbert Proceedings of the fifth international conference on Autonomous agents, 77-78, 2001 | 25 | 2001 |
Efficient construction of vote-tags to allow open objection to the tally in electronic elections A Riera, J Rifà, J Borrell Information Processing Letters 75 (5), 211-215, 2000 | 23 | 2000 |
Securing dynamic itineraries for mobile agent applications C Garrigues, S Robles, J Borrell Journal of Network and Computer Applications 31 (4), 487-508, 2008 | 21 | 2008 |
Constrained delegation in XML-based access control and digital rights management standards G Navarro, BS Firozabadi, E Rissanen, J Borrell CNIS03, Special Session on Architectures and Languages for Digital Rights …, 2003 | 21 | 2003 |
Implementation of secure architectures for mobile agents in marism-a S Robles, J Mir, J Ametller, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2002 | 20 | 2002 |