LIST OF PUBLISHED PAPERS

[1] Jordi Herrera-Joancomartí and Cristina Pérez-Solà. Privacy in bitcoin transactions: New challenges from blockchain scalability solutions. In Modeling Decisions for Artificial Intelligence: 13th International Conference, MDAI 2016, pages 26--44. Springer International Publishing, Sep. 2016. [ bib | DOI | http ]
[2] Sergi Delgado-Segura, Cristian Tanas, and Jordi Herrera-Joancomartí­. Reputation and reward: Two sides of the same bitcoin. Sensors, 16(6):776, 2016. [ bib | DOI | http ]
[3] Jordi Casas-Roma, Jordi Herrera-Joancomartí­, and Vicenç Torra. A survey of graph-modification techniques for privacy-preserving on networks. Artificial Intelligence Review, 2016. [ bib ]
[4] Jordi Casas-Roma, Jordi Herrera-Joancomartí­, and Vicenç Torra. k-degree anonymity and edge selection: Improving data utility in large networks. Knowledge and Information Systems, 2016. [ bib ]
[5] Cristian Tanas, Sergi Delagado, and Jordi Herrera-Joancomartí. An integrated reward and reputation mechanism for mcs preseving users' privacy. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2016. [ bib ]
[6] Jordi Casas-Roma, Jordi Herrera-Joancomartí­, and Vicenç Torra. Anonymizing graphs: measuring quality for clustering. Knowledge and Information Systems, 44(3):507--528, 2015. [ bib | DOI | http ]
[7] Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí­, and Joan Melià Seguí. Remarks on Peinado et al.'s analysis of J3Gen. Sensors, 15(3):6217--6220, 2015. [ bib | DOI | http ]
[8] Jordi Herrera-Joancomartí. Research and challenges on bitcoin anonymity. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, volume 8872 of Lecture Notes in Computer Science, pages 1--14. Springer Berlin Heidelberg, 2014. [ bib ]
[9] Joan Antoni Donet, Cristina Pérez-Sola, and Jordi Herrera-Joancomartí. The bitcoin P2P network. In Rainer Böhme, Michael Brenner, Tyler Moore, and Matthew Smith, editors, Financial Cryptography and Data Security, volume 8438 of Lecture Notes in Computer Science, pages 87--102. Springer Berlin Heidelberg, 2014. [ bib | DOI | http ]
[10] Cristina Pérez-Solà and Jordi Herrera-Joancomartí. Bitcoin y el problema de los generales bizantinos. In R. Álvarez, J. Climent, F. Ferrández, F. Martínez, L. Tortosa, J. Vicent, and A. Zamora, editors, Actas de la XIII Reunión Española de Criptología y Seguridad de la Información (RECSI 2014), pages 241--246, Campus de San Vicente, s/n, 03690 San Vicente del Raspeig, Septiembre 2014. Publicaciones Universidad de Alicante. [ bib ]
[11] Joan Melià Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí. On the similarity of commercial epc gen2 pseudorandom number generators. Transactions on Emerging Telecommunications Technologies, 25(2):151--154, 2014. [ bib | DOI | http ]
[12] Cristian Tanas and Jordi Herrera-Joancomartí. Crowdsensing simulation using ns-3. In Jordi Nin and Daniel Villatoro, editors, Citizen in Sensor Networks, Lecture Notes in Computer Science, pages 47--58. Springer International Publishing, 2014. [ bib | DOI | http ]
[13] Joan Melià Seguí­, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí. J3Gen: A PRNG for low-cost passive RFID. Sensors, 13(3):3816--3830, 2013. [ bib | DOI | http ]
[14] Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra. An algorithm for k-degree anonymity on large networks. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM '13, pages 671--675, New York, NY, USA, 2013. ACM. [ bib | DOI | http ]
[15] Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra. Analyzing the impact of edge modifications on networks. In Vicenç Torra, Yasuo Narukawa, Guillermo Navarro-Arribas, and David Megías, editors, Modeling Decisions for Artificial Intelligence, volume 8234 of Lecture Notes in Computer Science, pages 296--307. Springer Berlin Heidelberg, 2013. [ bib | DOI | http ]
[16] Cristina Pérez-Solà and Jordi Herrera-Joancomartí. Improving automatic edge selection for relational classification. In Vicenç Torra, Yasuo Narukawa, Guillermo Navarro-Arribas, and David Megías, editors, Modeling Decisions for Artificial Intelligence, volume 8234 of Lecture Notes in Computer Science, pages 284--295. Springer Berlin Heidelberg, 2013. [ bib | DOI | http ]
[17] Cristian Tanas and Jordi Herrera-Joancomartí. When users become sensors: can we trust their readings? International Journal of Communication Systems, 28(4):601--614, 2013. [ bib | DOI | http ]
[18] Cristina Pérez-Solà and Jordi Herrera-Joancomartí. Improving relational classification using link prediction techniques. In Hendrik Blockeel, Kristian Kersting, Siegfried Nijssen, and Filip Zelezny, editors, Machine Learning and Knowledge Discovery in Databases, volume 8188 of Lecture Notes in Computer Science, pages 590--605. Springer Berlin Heidelberg, 2013. [ bib | DOI | http ]
[19] Cristina Pérez-Solà and Jordi Herrera-Joancomartí. OSN crawling schedulers and their implications on k-plexes detection. International Journal of Intelligent Systems, 28(6):583--605, 2013. [ bib | DOI | http ]
[20] Cristina Pérez-Solà and Jordi Herrera-Joancomartí. Classifying online social network users through the social graph. In Foundations and Practice of Security, volume 7743 of Lecture Notes in Computer Science, pages 115--131. Springer Berlin Heidelberg, 2013. [ bib | DOI | http ]
[21] Cristian Tanas and Jordi Herrera-Joancomartí. Users as smart sensors: A mobile platform for sensing public transport incidents. In Citizen in Sensor Networks, volume 7685 of Lecture Notes in Computer Science, pages 81--93. Springer Berlin Heidelberg, 2013. [ bib | DOI | http ]
[22] Cristian Tanas, Cristina Pérez-Solà, and Jordi Herrera-Joancomartí. Security and privacy challenges in smart sensor networks. In U. Zurutuza, R. Uribeetxeberria, and I. Arenaza-Nuño, editors, Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012), pages 423--428. Arrasate - Mondragon, Mondragon Uniberstsitatea, Septiembre 2012. [ bib ]
[23] Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra. Algoritmos genéticos para la anonimización de grafos. In U. Zurutuza, R. Uribeetxeberria, and I. Arenaza-Nuño, editors, Actas de la XII Reunión Española de Criptología y Seguridad de la Información (RECSI 2012), pages 243--248. Arrasate - Mondragon, Mondragon Uniberstsitatea, Septiembre 2012. [ bib ]
[24] Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, and Josep Prieto-Blázquez. Towards secure mobile P2P applications using JXME. Journal of Internet Services and Information Security (JISIS), 2(1/2):1--21, 2 2012. [ bib ]
[25] Jordi Casas-Roma, Jordi Herrera-Joancomartí, and Vicenç Torra. Comparing random-based and k-anonymity-based algorithms for graph anonymization. In Modeling Decisions for Artificial Intelligence, volume 7647 of Lecture Notes in Computer Science, pages 197--209. Springer Berlin Heidelberg, 2012. [ bib | DOI | http ]
[26] Joan Melia-Segui, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomarti. Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags. In IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, pages 3820 --3825, nov. 2011. [ bib | DOI ]
[27] Joan Melià-Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí. Practical eavesdropping of control data from EPC Gen2 queries with a programmable RFID toolkit. Hakin9, 6(9):14--19, Set. 2011. [ bib ]
[28] Jordi Herrera-Joancomartí and Cristina Pérez-Solà. Online social honeynets: Trapping web crawlers in OSN. In Vicenç Torra, Yasuo Narakawa, Jianping Yin, and Jun Long, editors, Modeling Decision for Artificial Intelligence, volume 6820 of Lecture Notes in Computer Science, pages 1--16. Springer Berlin / Heidelberg, 2011. [ bib | DOI | http ]
[29] Helena Rifà-Pous and Jordi Herrera-Joancomartí. Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet, 3(1):31--48, 2011. [ bib | DOI | http ]
[30] Joan Melià Seguí, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí. A practical implementation attack on weak pseudorandom number generator designs for EPC Gen2 tags. Wireless Personal Communications, 59:27--42, 2011. 10.1007/s11277-010-0187-1. [ bib | http ]
[31] Helena Rifà Pous and Jordi Herrera-Joancomartí. A fair and secure cluster formation process for ad hoc networks. Wireless Personal Communications, 56:625--636, 2011. 10.1007/s11277-010-9994-7. [ bib | http ]
[32] Apol.lonia Martínez Nadal, Jordi Herrera-Joancomartí, and Cristina Pérez-solà. Análisis técnico-jurídico del proceso de iniciativa legislativa popular con recogida de firmas digitales en españa. Revista de derecho y tecnología, 11:191--216, 2010. [ bib ]
[33] Cristina Peréz-Solà and Jordi Herrera-Joancomartí. OSN: When multiple autonomous users disclose another individual's information. P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on, 0:471--476, 2010. [ bib | DOI ]
[34] Marc Domingo-Prieto, Joan Arnedo Moreno, and Jordi Herrera-Joancomartí. Security analysis of JXME-proxyless version. In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), pages 301--306, Tarragona, 2010. [ bib ]
[35] Joan Melià, Joaquin García-Alfaro, and Jordi Herrera-Joancomartí. Clasificación de las amenazas a la seguridad en sistemas RFID - EPC gen2. In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), pages 211--216, Tarragona, 2010. [ bib ]
[36] Cristina Pérez-solà, Apol.lonia Martínez Nadal, and Jordi Herrera-Joancomartí. El proceso de iniciativa legislativa popular por medio de firmas digitales. In Actas de la XI Reunión Española sobre Criptologia y Seguridad de la Información (XI - RECSI), pages 123--128, Tarragona, 2010. [ bib ]
[37] Joan Melià, Joaquin García-Alfaro, and Jordi Herrera-Joancomartí. RFID EPC-gen2 for postal applications: A security and privacy survey. In IEEE International Conference on RFID-Technology and Applications, Guangzhou, China, 2010. [ bib | DOI ]
[38] Marc Domingo-Prieto, Joan Arnedo Moreno, and Jordi Herrera-Joancomartí. JXTA security in mobile constrained devices. In Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA), pages 139--144. IEEE Computer Society, 2010. [ bib | DOI ]
[39] J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomarti. Analysis and improvement of a pseudorandom number generator for epc gen2 tags. In Proceedings of the 14th international conference on Financial cryptograpy and data security, FC'10, pages 34--46, Berlin, Heidelberg, 2010. Springer-Verlag. [ bib | http ]
[40] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. XML-based security for JXTA core protocols. International Journal of Autonomic Computing (IJAC), 1(4):447--469, December 2010. [ bib | DOI | http ]
[41] Jordi Castellà-Roca, Alexandre Viejo, and Jordi Herrera-Joancomartí. Preserving user's privacy in web search engines. Computer Communications, 32:1541--1551, 2009. [ bib | DOI ]
[42] Jordi Herrera-Joancomartí and D. Megías. Watermarking in the encrypted domain. In Actas del V Congreso Iberoamericano de Seguridad Informática CIBSI-09, pages 202--212, Montevideo, Uruguay, 2009. [ bib ]
[43] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. Maintaining unlinkability in group based p2p environments. In 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), pages 140--145, Los Alamitos, CA, USA, 2009. IEEE Computer Society. [ bib | DOI ]
[44] Joan Arnedo-Moreno and Jordi Herrera-Joancomartí. A security layer for JXTA core protocols. In Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC), pages 463--468, Los Alamitos, CA, USA, 2009. IEEE Computer Society. [ bib | DOI ]
[45] Joan Arnedo-Moreno and Jordi Herrera-Joancomartí. JXTA resource access control by means of advertisement encryption. Future Generation Computer Systems, 26(1):21 -- 28, 2010. [ bib | DOI ]
[46] Joan Arnedo-Moreno and Jordi Herrera-Joancomartí. A survey on security in JXTA applications. Journal of Systems and Software, 82(9):1513 -- 1525, 2009. SI: QSIC 2007. [ bib | DOI ]
[47] Helena Rifà-Pous and Jordi Herrera-Joancomartí. Cryptographic energy costs are assumable in ad hoc networks. IEICE Transactions on Information and Systems, E92.D(5):1194--1196, 2009. [ bib | DOI ]
[48] Joan Melià, Joaquin Garcia, and Jordi Herrera-Joancomartí. EPC-RFID security and privacy for postal sector. RFIDSec Asia, 2009. [ bib ]
[49] Josep Prieto-Blazquez, Jordi Herrera-Joancomartí, and Ana-Elena Guerrero-Roldán. A virtual laboratory structure for developing programming labs. International Journal of Emerging Technologies in Learning (iJET), 4(S1):47--52, 2009. [ bib | http ]
[50] Josep Prieto-Blázquez and Jordi Herrera-Joancomartí. A virtual laboratory structure for computer engineering education. X The International Symposium on Computers in Education, 2008. Salamanca (Spain), 1:S11:1--6, October 2008. [ bib ]
[51] Josep Prieto-Blázquez, Ivan García-Torà, Jordi Herrera-Joancomartí, and Anna Guerrero-Roldán. Virtual laboratory ontology for engineering education. Frontiers in Education, 2008. FIE 2008. 38th Annual. Saratoga (EEUU), 1:S2F--1 Vol. 1, October 2008. [ bib | DOI ]
[52] Josep Prieto-Blázquez, Joan Arnedo-Moreno, and Jordi Herrera-Joancomartí. An integrated structure for a virtual networking laboratory. Industrial Electronics, IEEE Transactions on, 55(6):2334--2342, June 2008. [ bib | DOI ]
[53] Helena Rifà-Pous and Jordi Herrera-Joancomartí. A forwarding cooperation protocol for plain and cluster-based ad hoc networks. Journal of Communications Software and Systems (JCOMSS), 4(1):3--12, March 2008. [ bib ]
[54] Xavier Domenech, Jordi Herrera-Joancomartí, and David Megias. Prevención de ataques de desincronización en esquemas de watermarking de audio. In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), pages 551--556, Salamanca, 2008. [ bib ]
[55] Guillermo Navarro, Joaquin Garcia-Alfaro, Oriol Mula, and Jordi Herrera-Joancomartí. Gestión de recursos de un navegador web para prevenir ataques contra la privacidad en TOR. In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), pages 629--638, Salamanca, 2008. [ bib ]
[56] Joan Melià, Joaquin Garcia-Alfaro, and Jordi Herrera-Joancomartí. Analisis de seguridad y Privacidad para sistemas EPC-RFID. In Actas de la X Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), pages 639--646, Salamanca, 2008. [ bib ]
[57] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. JXTA security in basic peer operations. In Actas de la IX Reunión Española sobre Criptologia y Seguridad de la Información (X - RECSI), pages 405--414, Salamanca, 2008. [ bib ]
[58] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. Persistent interoperable security for JXTA. In Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008, pages 354--359. IEEEPress, 2008. [ bib ]
[59] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. Collaborative group membership and access control for JXTA. In Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, pages 159--166. IEEE Computer Society, Jan. 2008. [ bib | DOI ]
[60] Helena Rifà-Pous, Joan Vila-Canals, and Jordi Herrera-Joancomartí. Coste de los protocolos de seguridad en redes manet. In Actas del II Simposio sobre Seguridad Informática [SSI'2007]. ISBN: 978-84-9732-607-0, pages 127--134, Zaragoza, España, 2007. [ bib ]
[61] Joan Arnedo Moreno and Jordi Herrera-Joancomartí. Resolución de escenarios en control de acceso a grupo en entornos distribuidos. In CEDI: Simposio sobre seguridad informática, pages 119--126, Zaragoza, España, 2007. [ bib ]
[62] Helena Rifà-Pous and Jordi Herrera-Joancomartí. A forwarding spurring protocol for multihop ad hoc networks (FURIES). In Next Generation Teletraffic and Wired/Wireless Advanced Networking, Proceedings, volume 4712 of LNCS, pages 281--293. SPRINGER-VERLAG BERLIN, 2007. 7th International Conference on Next Generation Teletraffic and Wire/Wireless Advanced Networking, St Petersburg, RUSSIA, SEP 10-14, 2007. [ bib | DOI ]
[63] Helena Rifà-Pous and Jordi Herrera-Joancomartí. An interdomain pki model based on trust lists. In EuroPKI, LNCS 4582, pages 49--64. Springer, June 2007. [ bib | DOI ]
[64] Helena Rifà-Pous and Jordi Herrera-Joancomartí. Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. In Communication Networks and Services Research (CNSR), pages 372--380, Los Alamitos, CA, USA, 2007. IEEE Computer Society. [ bib | DOI ]
[65] J. Dittmann, D. Megías, A. Lang, and Jordi Herrera-Joancomartí. Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. LNCS Transactions on Data Hiding and Multimedia Security, 4300:1--43, Nov. 2006. [ bib ]
[66] J. Arnedo Moreno and Jordi Herrera-Joancomartí. Providing collaborative mechanism for peer group acces control. In Proceedings of the Workshop on Trusted Collaboration, pages 1--6, Atlanta (USA), Nov. 2006. IEEE Press. [ bib ]
[67] Helena Rifà and Jordi Herrera-Joancomartí. Gestión de confianza en redes ad-hoc. In Actas de la IX Reunión Española de Criptografia y Seguridad de la Información - RECSI, pages pp.745--759, Barcelona, Spain, sep 2006. [ bib ]
[68] Joan Arnedo and Jordi Herrera-Joancomartí. Identifying different scenarios for group access control in distributed environments. In Actas de la IX Reunión Española de Criptografia y Seguridad de la Información - RECSI, pages pp.388--399, Barcelona, Spain, sep 2006. [ bib ]
[69] A. Lang, J. Dittmann, D. Megías, and Jordi Herrera-Joancomartí. Practical audio watermarking evaluation tests and its representation and visualization in the triangle of robustness, transparency and capacity. In Second Wavila Challenge (WaCha), Geneve (Switzerland), Set. 2006. [ bib ]
[70] J. Serra, D. Megías, Jordi Herrera Joancomartí, and J. Minguillón. Multiband semifragile watermarking for multi and hyperspectral images based on iterative tree structured vector quantization. In Proceedings of the Image and Signal Processing for Remote Sensing XII, volume 6365, pages 0O--1, 0O--10, Bellingham, Washington (USA), Sep. 2006. IS&T/SPIE. [ bib ]
[71] Jordi Castellà Roca, Jordi Herrera Joancomartí, and Aleix Dorca Josa. A secure e-exam management system. In Proceedings of the International Conference on Availability, Reliability and Security: Security in E-learning (ARES 2006), pages 864--871, Vienna (Austria), Apr. 2006. IEEE Compute Society. ISBN - 0-9695-2567-9/0. [ bib ]
[72] D. Megías, Jordi Herrera Joancomartí, J. Serra, and J. Minguillón. A benchmark assessment of the wauc watermarking audio algorithm. In Proceedings of the SPIE- 18th Annual Symposium Electronic Imaging 2006, volume 6072, pages 1K--1, 1K--10, San Jose, California (USA), Jan 2006. IS&T/SPIE. [ bib ]
[73] David Megías Jimenez, Jordi Herrera Joancomartí, and Julià Minguillón Alfonso. Total disclosure of the embedding and detection algorithms for a secure digital watermarking scheme for audio. In International Conference on Information and Communications Security - ICICS'05, volume 3783 of Lecture Notes in Computer Science, pages 427--440. Springer, Dec. 2005. ISBN 3-540-30934-9. [ bib ]
[74] Julià Minguillón Alfonso, Jordi Herrera Joancomartí, David Megías Jimenez, J. Serra, J. Serra-Sacristà, and F. García-Vilchez. Influence of mark embedding strategies on lossless compression of ultraspectral images. In Proceedings of the 25th International Geoscience and Remote Sensing Symposium IGARSS, USA, Jul 2005. SPIE - The International Society for Optical Engineering. [ bib ]
[75] Julià Minguillón Alfonso, Jordi Herrera Joancomartí, and David Megías Jimenez. Robust watermarking scheme based on the jpeg2000 standard. Journal of Electronic Imaging, 14(3):033015--1,033015--16, 2005. ISSN-1017-9909. [ bib ]
[76] M. Barni, Jordi Herrera-Joancomartí, S. Katzenbeisser, and F. Pérez-González, editors. Information Hiding, volume 3727 of Lecture Notes in Computer Science. Springer, 2005. [ bib ]
[77] Jordi Herrera-Joancomartí. Infraestructures de clau pública (pki): què són i què aporten. TERAFLOP, 2004. ISSN: 1134-6671. [ bib ]
[78] David Megías, Jordi Herrera-Joancomartí, and Julià Minguillón. Robust frequency domain audio watermarking: a tuning analysis. In Proceedings of the Third international conference on Digital Watermarking, IWDW'04, LNCS-3304, pages 244--258, Berlin, Heidelberg, 2005. Springer-Verlag. [ bib | DOI | http ]
[79] D. Megías, Jordi Herrera-Joancomartí, and J. Minguillón. An audio watermarking scheme robust against stereo attacks. In MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security, pages 206--213, New York, NY, USA, 2004. ACM. [ bib | DOI ]
[80] Julià Minguillón, Jordi Herrera-Joancomartí, and David Megías. Transmisión progresiva de imágenes marcadas digitalmente. In Actas de la VIII Reunión Española de Criptografia y Seguridad de la Información VIII - RECSI, pages 675--686, Leganés, Spain, sep 2004. [ bib ]
[81] Jordi Herrera-Joancomartí, Julià Minguillón, and David Megías. Plapid: una plataforma para la protección de imágenes digitales. In Actas de la VIII Reunión Española de Criptografia y Seguridad de la Información VIII - RECSI, pages 665--674, Leganés, Spain, sep 2004. [ bib ]
[82] D. Megías, Jordi Herrera-Joancomartí, and J. Minguillón. A robust frequency domain audio watermarking scheme for monophonic and stereophonic PCM formats. In Steinmetz, R and Mauthe, A, editor, Proceedings of the 30th EUROMICRO conference, pages 449--452. IEEE COMPUTER SOC, 2004. 30th EUROMICRO Conference, Rennes, FRANCE, AUG 31-SEP 03, 2004. [ bib ]
[83] J. Herrera-Joancomart'i, J. Prieto-Blázquez, and J. Castellà Roca. A secure electronic examination protocol using wireless networks. In Srimani, PK, editor, ITCC 2004: International COnference on Information Technology: Coding and Computing, Vol 2, Proceedings, pages 263--267. IEEE Comp Soc, IEEE COMPUTER SOC, April 2004. [ bib ]
[84] D. Megías, Jordi Herrera-Joancomartí, and J. Minguillón. A robust audio watermarking scheme based on MPEG 1 layer 3 compression. In Communications and Multimedia Security - CMS 2003, LNCS 963, pages 226--238. Springer-Verlag, 2003. [ bib ]
[85] Julià Minguillón, Jordi Herrera-Joancomartí, David Megías, and Joan Serra-Sagristà. Evaluation of copyright protection schemes for hyperspectral imaging. In Lorenzo Bruzzone, editor, Proceedings of the Image and Signal Processing for Remote Sensing IX, volume 5238, pages 512--523. SPIE, 2004. [ bib | DOI ]
[86] J. Prieto-Blázquez, J. Herrera-Joancomartí, and R. Martínez Pe na. Implementación de un sistema de autentificación personal basado en tecnología bluetooth. In Actas del II Simposio Español de Comercio Electrónico - SCE04, pages 13--24. Fundación DITEL, June 2003. [ bib ]
[87] Jordi Herrera-Joancomartí, J. Minguillón, and D. Megías. A family of image watermarking schemes based on lossy image compression. In Proceedings of the Information Technology: Coding and Computing ITCC'2003, pages 559--563. IEEE Computer Society, 2003. [ bib ]
[88] J. Herrera-Joancomart'i and J. Prieto-Blázquez. A personal authentication scheme using mobile technology. In Proceedings of the Information Technology: Coding and Computing ITCC'2003, pages 253--257. IEEE Computer Society, 2003. [ bib ]
[89] Julià Minguillón, Jordi Herrera-Joancomartí, and David Megías. Empirical evaluation of a jpeg2000 standard-based robust watermarking scheme. In Edward J. Delp III and Ping W. Wong, editors, Proceedings of the Security and Watermarking of Multimedia Contents V, volume 5020, pages 717--727, 2003. [ bib | DOI ]
[90] Jordi Herrera-Joancomartí and Julià Minguillón. Ataques a esquemas de watermarking de imágenes. In Actas de la VII Reunión Española de Criptografia y Seguridad de la Información VIII - RECSI, volume 2, pages 437--446, Oviedo, Spain, sep 2002. Publicaciones de la universidad de Oviedo. [ bib ]
[91] Jordi Herrera-Joancomartí and J. Castellà Roca. Cadenas hash espandidas para compromisos compactos de n valores. In Actas de la VII Reunión Española de Criptografia y Seguridad de la Información VIII - RECSI, volume 2, pages 427--436, Oviedo, Spain, sep 2002. Publicaciones de la universidad de Oviedo. [ bib ]
[92] J. Domingo-Ferrer Francesc Sebé and Jordi Herrera-Joancomartí. Spatial-domain image watermarking robust against compression, filtering, cropping and scaling. In Information Security - ISW '2000, pages 44--53, Berlin, 2000. Springer-Verlag. Lecture Notes in Computer Science Volume 1975. [ bib ]
[93] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. Short collusion-secure fingerprinting based on dual binary hamming codes. Electronics Letters, 36(20):1697--1699, September 2000. [ bib ]
[94] J. Castellà, J. Planes, J. Domingo-Ferrer, and Jordi Herrera-Joancomartí. A performance comparison of Java cards for micropayment implementation. In Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000, IFIP Conference Proceedings, pages 19--38, Bristol, September 2000. Kluver Academic Publisher. [ bib ]
[95] J. Domingo-Ferrer, Jordi Herrera-Joancomartí, and Francesc Sebé. Un esquema de watermarking robusto para imágenes. In VI Reunión Española de Criptología, pages 213--218, Universidad de La Laguna, Tenerife, September 2000. [ bib ]
[96] J. Castellà, J. Planes, J. Domingo-Ferrer, and Jordi Herrera-Joancomartí. Comparativa de tarjetas java para aplicaciones de comercio electrónico. In VI Reunión Española de Criptología, pages 225--231, Universidad de La Laguna, Tenerife, September 2000. [ bib ]
[97] Jordi Herrera-Joancomartí and J. Domingo-Ferrer. Códigos duales de hamming para esquemas de fingerprinting seguros contra confabulaciones. In VI Reunión Española de Criptología, pages 219--224, Universidad de La Laguna, Tenerife, September 2000. [ bib ]
[98] Jordi Herrera-Joancomartí. Protecció del copyright en els continguts multimédia. TERAFLOP, 2000. ISSN: 1134-6671. [ bib ]
[99] Jordi Herrera-Joancomartí. Secure Electronic Commerce of Multimedia Contents Over Open Networks. PhD thesis, Departament d'Enginyeria Telemàtica, Universitat Politècnica de Catalunya, May 2000. [ bib ]
[100] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. Simple collusion-secure fingerprinting schemes for images. In Proceedings of the Information Technology: Coding and Computing ITCC'2000, pages 128--132. IEEE Computer Society, April 2000. [ bib ]
[101] Jordi Herrera-Joancomartí J. Domingo-Ferrer. Criptografia. Per als serveis telemàtics i el comerç electrònic. EdiUOC, 1999. [ bib ]
[102] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. Spending programs: A tool for flexible micropayments. In M. Mambo and Y. Zheng, editors, Second International Information Security Workshop, ISW'99, LNCS 1729, pages 1--13. Springer-Verlag, November 1999. [ bib ]
[103] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. An anonymous electronic commerce scheme with an off-line authority and untrusted agents. ACM SIGMOD Record, 27(4):62--67, December 1998. [ bib ]
[104] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. Efficient smart-card based anonymous fingerprinting. In Smart Card Research and Advanced Application, CARDIS'98, LNCS 1820, pages 231--238. Springer-Verlag, 2000. [ bib ]
[105] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. A scheme for anonimous electronic commerce using secure intelligent trade agents. In Butlletí de l'ACIA, volume 14-15, pages 119--124, 1998. [ bib ]
[106] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. Un homomorfismo de privacidad entre cuerpos basado en fracciones de farey. In V Reunión Española de Criptologia, pages 80--91, Universidad de Málaga, 1998. [ bib ]
[107] J. Domingo-Ferrer and Jordi Herrera-Joancomartí. A privacy homomorphism allowing field operations on encrypted data. In Proceedings I Jornades de Matemàtica Discreta i Algorísmica, pages 24--26, Barcelona, Universitat Politècnica de Catalunya, 1998. [ bib ]
[108] J. Domingo-Ferrer, Jordi Herrera-Joancomartí, and Ricardo Xavier Sánchez del Castillo. Protección del copyright electrónico: fingerprinting. Novática, 134:36--39, 1998. [ bib ]

This file was generated by bibtex2html 1.98.