Joan Borrell
Cited by
Cited by
Cryptocurrency networks: A new P2P paradigm
S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ...
Mobile Information Systems 2018, 1-16, 2018
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation
J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro
Information and Communications Security: 6th International Conference, ICICS …, 2004
An uncoercible verifiable electronic voting protocol
A Riera, J Borrell, J Rifa
Global IT security (Vienna, Budapest, 31 August-2 September 1998), 206-215, 1998
Agent migration over FIPA ACL messages
J Ametller, S Robles, J Borrell
Mobile Agents for Telecommunication Applications: 5th InternationalWorkshop …, 2003
Protecting general flexible itineraries of mobile agents
J Mir, J Borrell
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
Securing the itinerary of mobile agents through a non-repudiation protocol
J Borrell, S Robles, J Serra, A Riera
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999
Fuzzy role-based access control
C Martínez-García, G Navarro-Arribas, J Borrell
Information processing letters 111 (10), 483-487, 2011
Protecting mobile agent itineraries
J Mir, J Borrell
Mobile Agents for Telecommunication Applications: 5th InternationalWorkshop …, 2003
Agent mobility architecture based on IEEE-FIPA standards
J Cucurull, R Martí, G Navarro-Arribas, S Robles, B Overeinder, J Borrell
Computer Communications 32 (4), 712-729, 2009
Promoting the development of secure mobile agent applications
C Garrigues, S Robles, J Borrell, G Navarro-Arribas
Journal of Systems and Software 83 (6), 959-971, 2010
Efficient broadcast in opportunistic networks using optimal stopping theory
C Borrego, J Borrell, S Robles
Ad Hoc Networks 88, 5-17, 2019
Protecting mobile agents from external replay attacks
C Garrigues, N Migas, W Buchanan, S Robles, J Borrell
Journal of Systems and Software 82 (2), 197-206, 2009
Design of a trust model for a secure multi-agent marketplace
S Robles, J Borrell, J Bigham, L Tokarchuk, L Cuthbert
Proceedings of the fifth international conference on Autonomous agents, 77-78, 2001
Practical mental poker without a TTP based on homomorphic encryption
J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
Hey, influencer! Message delivery to social central nodes in social opportunistic networks
C Borrego, J Borrell, S Robles
Computer Communications 137, 81-91, 2019
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
A Riera, J Rifà, J Borrell
Information Processing Letters 75 (5), 211-215, 2000
Implementation of secure architectures for mobile agents in marism-a
S Robles, J Mir, J Ametller, J Borrell
Mobile Agents for Telecommunication Applications: 4th International Workshop …, 2002
Securing dynamic itineraries for mobile agent applications
C Garrigues, S Robles, J Borrell
Journal of Network and Computer Applications 31 (4), 487-508, 2008
Constrained delegation in XML-based access control and digital rights management standards
G Navarro, BS Firozabadi, E Rissanen, J Borrell
CNIS03, Special Session on Architectures and Languages for Digital Rights …, 2003
An implementable secure voting scheme
J Borrell, J Rifà
Computers & Security 15 (4), 327-338, 1996
The system can't perform the operation now. Try again later.
Articles 1–20