Follow
Jordi Herrera-Joancomartí
Jordi Herrera-Joancomartí
Verified email at uab.cat - Homepage
Title
Cited by
Cited by
Year
The bitcoin P2P network
JA Donet Donet, C Pérez-Sola, J Herrera-Joancomartí
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2152014
Research and challenges on bitcoin anonymity
J Herrera-Joancomartí
Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2015
1532015
Computational and energy costs of cryptographic algorithms on handheld devices
H Rifa-Pous, J Herrera-Joancomartí
Future internet 3 (1), 31-48, 2011
1282011
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
1222009
Analysis of the bitcoin utxo set
S Delgado-Segura, C Pérez-Sola, G Navarro-Arribas, ...
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
1112019
Privacy in bitcoin transactions: new challenges from blockchain scalability solutions
J Herrera-Joancomartí, C Pérez-Solà
Modeling Decisions for Artificial Intelligence: 13th International …, 2016
1032016
A fair protocol for data trading based on Bitcoin transactions
S Delgado-Segura, C Pérez-Solà, G Navarro-Arribas, ...
Future Generation Computer Systems 107, 832-840, 2020
1012020
An integrated structure for a virtual networking laboratory
J Prieto-Blázquez, J Arnedo-Moreno, J Herrera-Joancomartí
IEEE transactions on Industrial Electronics 55 (6), 2334-2342, 2008
802008
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
772006
Double-spending prevention for bitcoin zero-confirmation transactions
C Pérez-Solà, S Delgado-Segura, G Navarro-Arribas, ...
International Journal of Information Security 18 (4), 451-463, 2019
712019
A survey of graph-modification techniques for privacy-preserving on networks
J Casas-Roma, J Herrera-Joancomartí, V Torra
Artificial Intelligence Review 47, 341-366, 2017
702017
Simple collusion-secure fingerprinting schemes for images
J Domingo-Ferrer, J Herrera-Joancomarti
Proceedings International Conference on Information Technology: Coding and …, 2000
622000
Short collusion-secure fingerprints based on dual binary Hamming codes
J Domingo-Ferrer, J Herrera-Joancomarti
Electronics Letters 36 (20), 1, 2000
612000
J3Gen: A PRNG for low-cost passive RFID
J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí
Sensors 13 (3), 3816-3830, 2013
602013
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags
J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010
592010
On the difficulty of hiding the balance of lightning network channels
J Herrera-Joancomartí, G Navarro-Arribas, A Ranchal-Pedrosa, ...
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
582019
k-Degree anonymity and edge selection: improving data utility in large networks
J Casas-Roma, J Herrera-Joancomartí, V Torra
Knowledge and Information Systems 50, 447-474, 2017
572017
An algorithm for k-degree anonymity on large networks
J Casas-Roma, J Herrera-Joancomartí, V Torra
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
552013
Cryptocurrency networks: A new P2P paradigm
S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ...
Mobile Information Systems 2018, 1-16, 2018
522018
Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity
J Dittmann, D Megias, A Lang, J Herrera-Joancomarti
Transactions on Data Hiding and Multimedia Security I, 1-40, 2006
432006
The system can't perform the operation now. Try again later.
Articles 1–20