Follow
Joan Borrell
Title
Cited by
Cited by
Year
Cryptocurrency networks: A new P2P paradigm
S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ...
Mobile Information Systems 2018, 1-16, 2018
722018
An uncoercible verifiable electronic voting protocol
A Riera, J Borrell, J Rifa
Global IT security (Vienna, Budapest, 31 August-2 September 1998), 206-215, 1998
401998
Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation
J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro
Information and Communications Security: 6th International Conference, ICICS …, 2004
392004
Protecting mobile agent itineraries
J Mir, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2003
392003
Agent migration over FIPA ACL messages
J Ametller, S Robles, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2003
382003
Protecting general flexible itineraries of mobile agents
J Mir, J Borrell
International Conference on Information Security and Cryptology, 382-396, 2001
362001
Securing the itinerary of mobile agents through a non-repudiation protocol
J Borrell, S Robles, J Serra, A Riera
Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999
361999
Fuzzy role-based access control
C Martínez-García, G Navarro-Arribas, J Borrell
Information processing letters 111 (10), 483-487, 2011
342011
Agent mobility architecture based on IEEE-FIPA standards
J Cucurull, R Martí, G Navarro-Arribas, S Robles, B Overeinder, J Borrell
Computer Communications 32 (4), 712-729, 2009
322009
Efficient broadcast in opportunistic networks using optimal stopping theory
C Borrego, J Borrell, S Robles
Ad Hoc Networks 88, 5-17, 2019
312019
Hey, influencer! Message delivery to social central nodes in social opportunistic networks
C Borrego, J Borrell, S Robles
Computer Communications 137, 81-91, 2019
302019
Promoting the development of secure mobile agent applications
C Garrigues, S Robles, J Borrell, G Navarro-Arribas
Journal of Systems and Software 83 (6), 959-971, 2010
282010
Protecting mobile agents from external replay attacks
C Garrigues, N Migas, W Buchanan, S Robles, J Borrell
Journal of Systems and Software 82 (2), 197-206, 2009
282009
Design of a trust model for a secure multi-agent marketplace
S Robles, J Borrell, J Bigham, L Tokarchuk, L Cuthbert
Proceedings of the fifth international conference on Autonomous agents, 77-78, 2001
262001
Sustainable sound absorbers from fruit stones waste
JMG Borrell, EJ Sanchis, JS Alcaraz, IM Belda
Applied Acoustics 161, 107174, 2020
252020
Practical mental poker without a TTP based on homomorphic encryption
J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
252003
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
A Riera, J Rifà, J Borrell
Information Processing Letters 75 (5), 211-215, 2000
232000
Securing dynamic itineraries for mobile agent applications
C Garrigues, S Robles, J Borrell
Journal of Network and Computer Applications 31 (4), 487-508, 2008
212008
Implementation of secure architectures for mobile agents in marism-a
S Robles, J Mir, J Ametller, J Borrell
International Workshop on Mobile Agents for Telecommunication Applications …, 2002
212002
Constrained delegation in XML-based access control and digital rights management standards
G Navarro, BS Firozabadi, E Rissanen, J Borrell
CNIS03, Special Session on Architectures and Languages for Digital Rights …, 2003
202003
The system can't perform the operation now. Try again later.
Articles 1–20