@incollection{FC2018, year = {2018}, booktitle = {Financial Cryptography and Data Security. Bitcoin Workshop}, series = {Lecture Notes in Computer Science}, title = {Analysis of the {B}itcoin {U}{T}{X}{O} set}, publisher = {Springer Berlin Heidelberg}, author = {Sergi Delgado-Segura and Cristina P\'erez-Sol\`a and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\'i}} }
@article{MIS2018, title = {Cryptocurrency networks: a new {P}2{P} paradigm}, journal = {Mobile Information Systems}, year = {2018}, issn = {1574-017X}, author = {Sergi Delgado-Segura and Cristina P\'erez-Sol\`a and Jordi Herrera-Joancomart{\'i} and Guillermo Navarro-Arribas and Joan Borrell} }
@article{doi:10.1080/10400435.2017.1393844, author = {Joan Pahisa-Sol\'e and Jordi Herrera-Joancomart\'{\i}}, title = {Testing an {A}{A}{C} system that transforms pictograms into natural language with persons with cerebral palsy}, journal = {Assistive Technology}, volume = {0}, number = {0}, pages = {1-9}, year = {2017}, publisher = {Taylor & Francis}, doi = {10.1080/10400435.2017.1393844}, note = {PMID: 29045194}, url = {https://doi.org/10.1080/10400435.2017.1393844}, eprint = {https://doi.org/10.1080/10400435.2017.1393844} }
@article{DELGADOSEGURA2017, title = {A fair protocol for data trading based on {B}itcoin transactions}, journal = {Future Generation Computer Systems}, year = {2017}, issn = {0167-739X}, doi = {https://doi.org/10.1016/j.future.2017.08.021}, url = {http://www.sciencedirect.com/science/article/pii/S0167739X17318344}, author = {Sergi Delgado-Segura and Cristina P\'erez-Sol\`a and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart{\'i}}, keywords = {Fair exchange protocol, Blockchain, Bitcoin, Smart contracts} }
@article{Casas-Roma2017, author = {Casas-Roma, Jordi and Herrera-Joancomart{\'i}, Jordi and Torra, Vicen{\c{c}}}, title = {A survey of graph-modification techniques for privacy-preserving on networks}, journal = {Artificial Intelligence Review}, year = {2017}, volume = {47}, number = {3}, pages = {341--366}, abstract = {Recently, a huge amount of social networks have been made publicly available. In parallel, several definitions and methods have been proposed to protect users' privacy when publicly releasing these data. Some of them were picked out from relational dataset anonymization techniques, which are riper than network anonymization techniques. In this paper we summarize privacy-preserving techniques, focusing on graph-modification methods which alter graph's structure and release the entire anonymous network. These methods allow researchers and third-parties to apply all graph-mining processes on anonymous data, from local to global knowledge extraction.}, issn = {1573-7462}, doi = {10.1007/s10462-016-9484-8}, url = {http://dx.doi.org/10.1007/s10462-016-9484-8} }
@article{Casas-Roma2017a, author = {Casas-Roma, Jordi and Herrera-Joancomart{\'i}, Jordi and Torra, Vicen{\c{c}}}, title = {k-Degree anonymity and edge selection: improving data utility in large networks}, journal = {Knowledge and Information Systems}, year = {2017}, volume = {50}, number = {2}, pages = {447--474}, abstract = {The problem of anonymization in large networks and the utility of released data are considered in this paper. Although there are some anonymization methods for networks, most of them cannot be applied in large networks because of their complexity. In this paper, we devise a simple and efficient algorithm for k-degree anonymity in large networks. Our algorithm constructs a k-degree anonymous network by the minimum number of edge modifications. We compare our algorithm with other well-known k-degree anonymous algorithms and demonstrate that information loss in real networks is lowered. Moreover, we consider the edge relevance in order to improve the data utility on anonymized networks. By considering the neighbourhood centrality score of each edge, we preserve the most important edges of the network, reducing the information loss and increasing the data utility. An evaluation of clustering processes is performed on our algorithm, proving that edge neighbourhood centrality increases data utility. Lastly, we apply our algorithm to different large real datasets and demonstrate their efficiency and practical utility.}, issn = {0219-3116}, doi = {10.1007/s10115-016-0947-7}, url = {http://dx.doi.org/10.1007/s10115-016-0947-7} }
@incollection{Herrera-Joancomart2016, author = {Herrera-Joancomart{\'i}, Jordi and P{\'e}rez-Sol{\`a}, Cristina}, title = {Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions}, booktitle = {Modeling Decisions for Artificial Intelligence: 13th International Conference, MDAI 2016}, year = {Sep. 2016}, publisher = {Springer International Publishing}, pages = {26--44}, isbn = {978-3-319-45656-0}, doi = {10.1007/978-3-319-45656-0_3}, url = {http://dx.doi.org/10.1007/978-3-319-45656-0_3} }
@article{s16060776, author = {Delgado-Segura, Sergi and Tanas, Cristian and Herrera-Joancomart\'{i}, Jordi}, title = {Reputation and Reward: Two Sides of the Same Bitcoin}, journal = {Sensors}, volume = {16}, year = {2016}, number = {6}, pages = {776}, url = {http://www.mdpi.com/1424-8220/16/6/776}, issn = {1424-8220}, abstract = {In Mobile Crowd Sensing (MCS), the power of the crowd, jointly with the sensing capabilities of the smartphones they wear, provides a new paradigm for data sensing. Scenarios involving user behavior or those that rely on user mobility are examples where standard sensor networks may not be suitable, and MCS provides an interesting solution. However, including human participation in sensing tasks presents numerous and unique research challenges. In this paper, we analyze three of the most important: user participation, data sensing quality and user anonymity. We tackle the three as a whole, since all of them are strongly correlated. As a result, we present PaySense, a general framework that incentivizes user participation and provides a mechanism to validate the quality of collected data based on the users’ reputation. All such features are performed in a privacy-preserving way by using the Bitcoin cryptocurrency. Rather than a theoretical one, our framework has been implemented, and it is ready to be deployed and complement any existing MCS system.}, doi = {10.3390/s16060776} }
@inbook{Tanas2016, author = {Tanas, Cristian and Delgado-Segura, Sergi and Herrera-Joancomart{\'i}, Jordi}, editor = {Garcia-Alfaro, Joaquin and Navarro-Arribas, Guillermo and Aldini, Alessandro and Martinelli, Fabio and Suri, Neeraj}, title = {An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy}, booktitle = {Data Privacy Management, and Security Assurance: 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21--22, 2015. Revised Selected Papers}, year = {2016}, publisher = {Springer International Publishing}, address = {Cham}, pages = {83--99}, isbn = {978-3-319-29883-2}, doi = {10.1007/978-3-319-29883-2_6}, url = {http://dx.doi.org/10.1007/978-3-319-29883-2_6} }
@article{casas15, year = {2015}, issn = {0219-1377}, journal = {Knowledge and Information Systems}, volume = {44}, number = {3}, doi = {10.1007/s10115-014-0774-7}, title = {Anonymizing graphs: measuring quality for clustering}, url = {http://dx.doi.org/10.1007/s10115-014-0774-7}, publisher = {Springer London}, keywords = {Privacy; Networks; Data mining; Mining methods and algorithms; Quality and Metrics; Semi-structured data and XML}, author = {Casas-Roma, Jordi and Herrera-Joancomart\'{\i}, Jordi and Torra, Vicen\c{c}}, pages = {507-528}, language = {English} }
@article{s150306217, author = {Garcia-Alfaro, Joaquin and Herrera-Joancomart\'i, Jordi and Meli\`a -Segu\'i, Joan}, title = {Remarks on {P}einado et al.'s Analysis of {J}3{G}en}, journal = {Sensors}, volume = {15}, year = {2015}, number = {3}, pages = {6217-6220}, url = {http://www.mdpi.com/1424-8220/15/3/6217}, pubmedid = {25781510}, issn = {1424-8220}, doi = {10.3390/s150306217} }
@inbook{Herrera-Joancomart2015, author = {Herrera-Joancomart{\'i}, Jordi}, editor = {Garcia-Alfaro, Joaquin and Herrera-Joancomart{\'i}, Jordi and Lupu, Emil and Posegga, Joachim and Aldini, Alessandro and Martinelli, Fabio and Suri, Neeraj}, title = {Research and Challenges on Bitcoin Anonymity}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, year = {2015}, publisher = {Springer International Publishing}, address = {Cham}, pages = {3--16}, isbn = {978-3-319-17016-9}, doi = {10.1007/978-3-319-17016-9_1}, url = {http://dx.doi.org/10.1007/978-3-319-17016-9_1}, pdf = {http://www.deic.uab.cat/~jherrera/papers/DPM-2014.pdf} }
@incollection{Donet2014, year = {2014}, isbn = {978-3-662-44773-4}, booktitle = {Financial Cryptography and Data Security}, volume = {8438}, series = {Lecture Notes in Computer Science}, editor = {B\"ohme, Rainer and Brenner, Michael and Moore, Tyler and Smith, Matthew}, doi = {10.1007/978-3-662-44774-1_7}, title = {The Bitcoin {P2P} Network}, url = {http://link.springer.com/chapter/10.1007/978-3-662-44774-1_7}, publisher = {Springer Berlin Heidelberg}, author = {Donet, Joan Antoni and P\'erez-Sola, Cristina and Herrera-Joancomart\'i, Jordi}, pages = {87-102} }
@inproceedings{recsi2014, author = {Cristina P\'erez-Sol\`a and Jordi Herrera-Joancomart\'i}, title = {Bitcoin y el problema de los generales bizantinos}, booktitle = {Actas de la XIII Reuni\'on Española de Criptolog\'ia y Seguridad de la Informaci\'on (RECSI 2014)}, volume = {}, isbn = {978-84-9717-323-0}, year = {2014}, month = {Septiembre}, pages = {241--246}, publisher = {Publicaciones Universidad de Alicante}, address = {Campus de San Vicente, s/n, 03690 San Vicente del Raspeig}, editor = {Álvarez, R. and Climent, J. and Ferrández, F. and Mart\'{\i}nez, F. and Tortosa, L. and Vicent, J. and Zamora, A.}, abstract = {En este art\'{\i}culo pretendemos mostrar porqu\'e, a nuestro entender, la comunidad cient\'{\i}fica y en especial los que trabajamos en el ámbito de la criptograf\'{\i}a y la seguridad de la informaci\'n, debemos comprender el funcionamiento de la moneda digital Bitcoin. Como se verá, los motivos que presentamos trascienden a la propia moneda Bitcoin y se centran en la red peer-to-peer (P2P) subyacente a dicha moneda, que proporciona un sistema distribuido que permite mantener un registro público tambi\'en distribuido. Dicho registro permite distintos usos y, como se verá, deja la puerta abierta a múltiples innovaciones.} }
@article{ETT:ETT2600, author = {Meli\`a -Segu\'{i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart\'{i}, Jordi}, title = {On the similarity of commercial EPC Gen2 pseudorandom number generators}, journal = {Transactions on Emerging Telecommunications Technologies}, volume = {25}, number = {2}, issn = {2161-3915}, url = {http://dx.doi.org/10.1002/ett.2600}, doi = {10.1002/ett.2600}, pages = {151--154}, year = {2014} }
@incollection{Tanas2013, year = {2014}, isbn = {978-3-319-04177-3}, booktitle = {Citizen in Sensor Networks}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-319-04178-0_5}, title = {Crowdsensing Simulation Using ns-3}, url = {http://dx.doi.org/10.1007/978-3-319-04178-0_5}, publisher = {Springer International Publishing}, author = {Tanas, Cristian and Herrera-Joancomart\'{\i}, Jordi}, pages = {47-58}, language = {English}, editor = {Nin, Jordi and Villatoro, Daniel} }
@article{s130303816, author = {Meli\`a -Segu\'{\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart\'{\i}, Jordi}, title = {J3{G}en: A {P}{R}{N}{G} for Low-Cost Passive {R}{F}{I}{D}}, journal = {Sensors}, volume = {13}, year = {2013}, number = {3}, pages = {3816--3830}, url = {http://www.mdpi.com/1424-8220/13/3/3816}, pubmedid = {23519344}, issn = {1424-8220}, doi = {10.3390/s130303816} }
@inproceedings{Casas-RomaHT13, author = {Casas-Roma, Jordi and Herrera-Joancomart\'{\i}, Jordi and Torra, Vicen\c{c}}, title = {An Algorithm for K-degree Anonymity on Large Networks}, booktitle = {Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining}, series = {ASONAM '13}, year = {2013}, isbn = {978-1-4503-2240-9}, location = {Niagara, Ontario, Canada}, pages = {671--675}, numpages = {5}, url = {http://doi.acm.org/10.1145/2492517.2492643}, doi = {10.1145/2492517.2492643}, acmid = {2492643}, publisher = {ACM}, address = {New York, NY, USA} }
@incollection{MDAI-2013-2, year = {2013}, isbn = {978-3-642-41549-4}, booktitle = {Modeling Decisions for Artificial Intelligence}, volume = {8234}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-642-41550-0_26}, title = {Analyzing the Impact of Edge Modifications on Networks}, url = {http://dx.doi.org/10.1007/978-3-642-41550-0_26}, publisher = {Springer Berlin Heidelberg}, keywords = {Anonymization; Edge Relevance; Edge Modification; Networks; Graphs}, author = {Casas-Roma, Jordi and Herrera-Joancomart\'{\i}, Jordi and Torra, Vicen\c{c}}, pages = {296-307}, editor = {Torra, Vicen\c{c} and Narukawa, Yasuo and Navarro-Arribas, Guillermo and Meg\'{\i}as, David} }
@incollection{MDAI-2013-1, year = {2013}, isbn = {978-3-642-41549-4}, booktitle = {Modeling Decisions for Artificial Intelligence}, volume = {8234}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-642-41550-0_25}, title = {Improving Automatic Edge Selection for Relational Classification}, url = {http://dx.doi.org/10.1007/978-3-642-41550-0_25}, publisher = {Springer Berlin Heidelberg}, author = {P\'erez-Sol\`a, Cristina and Herrera-Joancomart\'{\i}, Jordi}, pages = {284-295}, editor = {Torra, Vicen\c{c} and Narukawa, Yasuo and Navarro-Arribas, Guillermo and Meg\'{\i}as, David} }
@article{DAC:DAC2689, author = {Tanas, Cristian and Herrera-Joancomart\'{\i}, Jordi}, title = {When users become sensors: can we trust their readings?}, journal = {International Journal of Communication Systems}, publisher = {John Wiley \& Sons, Ltd}, issn = {1099-1131}, volume = {28}, number = {4}, pages = {601--614}, url = {http://dx.doi.org/10.1002/dac.2689}, doi = {10.1002/dac.2689}, keywords = {data reliability, sensor networks, reputation systems}, year = {2013}, abstract = {Smart sensor network arises as a new generation of sensor networks, where a crowd of possibly anonymous volunteers are involved in the tasks of collecting data from the surrounding environment and providing it to the community. In this paper, we analyze one of the main questions, often forgotten, in these scenarios: whether or not we can trust the sensor readings provided by the individuals engaged in the sensor network. We introduce a data reliability architecture capable of filtering and validating sensor readings in an open environment, where not all users are equally honest. Simulations based on a real world smart sensor application allow us to make a first analysis of the proposed architecture's performance and the variables that have a significant impact on this performance. Copyright 2013 John Wiley \& Sons, Ltd.} }
@incollection{ECML13, year = {2013}, isbn = {978-3-642-40987-5}, booktitle = {Machine Learning and Knowledge Discovery in Databases}, volume = {8188}, series = {Lecture Notes in Computer Science}, editor = {Blockeel, Hendrik and Kersting, Kristian and Nijssen, Siegfried and Zelezny, Filip}, doi = {10.1007/978-3-642-40988-2_38}, title = {Improving Relational Classification Using Link Prediction Techniques}, url = {http://dx.doi.org/10.1007/978-3-642-40988-2_38}, publisher = {Springer Berlin Heidelberg}, author = {P\'erez-Sol\`a , Cristina and Herrera-Joancomart\'{\i}, Jordi}, pages = {590-605} }
@article{INT:INT21594, author = {P\'erez-Sol\`a , Cristina and Herrera-Joancomart\'{\i}, Jordi}, title = {{O}{S}{N} Crawling Schedulers and Their Implications on k-Plexes Detection}, journal = {International Journal of Intelligent Systems}, volume = {28}, number = {6}, issn = {1098-111X}, url = {http://dx.doi.org/10.1002/int.21594}, doi = {10.1002/int.21594}, pages = {583--605}, year = {2013}, abstract = {Web crawlers are complex applications that explore the Web for different purposes. Web crawlers can be configured to crawl online social networks (OSNs) to obtain relevant data about their global structure. Before a web crawler can be launched to explore the Web, a large amount of settings have to be configured. These settings define the crawler's behavior and they have a big impact on the collected data. Both the amount of collected data and the quality of the information that it contains are affected by the crawler settings and, therefore, by properly configuring these web crawler settings we can target specific goals to achieve with our crawl. In this paper, we review the configuration choices that an attacker who wants to obtain information from an OSN by crawling it has to make to conduct his attack. We analyze different scheduler algorithms for web crawlers and evaluate their performance in terms of how useful they are to pursue a set of different adversary goals.} }
@inproceedings{fps2013, year = {2013}, isbn = {978-3-642-37118-9}, booktitle = {Foundations and Practice of Security}, volume = {7743}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-642-37119-6_8}, title = {Classifying Online Social Network Users through the Social Graph}, url = {http://dx.doi.org/10.1007/978-3-642-37119-6_8}, publisher = {Springer Berlin Heidelberg}, keywords = {Online Social Networks; Relational Classifiers; Graph Anonymization}, author = {Cristina P\'erez-Sol\`a and Jordi Herrera-Joancomart\'i}, pages = {115-131} }
@incollection{tanas12, year = {2013}, isbn = {978-3-642-36073-2}, booktitle = {Citizen in Sensor Networks}, volume = {7685}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-642-36074-9_8}, title = {Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents}, url = {http://dx.doi.org/10.1007/978-3-642-36074-9_8}, publisher = {Springer Berlin Heidelberg}, author = {Tanas, Cristian and Herrera-Joancomart\'{\i}, Jordi}, pages = {81-93} }
@inproceedings{recsi2012, author = {Cristian Tanas and Cristina P\'erez-Sol\`a and Jordi Herrera-Joancomart\'{\i}}, title = {Security and Privacy Challenges in Smart Sensor Networks}, booktitle = {Actas de la XII Reuni\'on Espa\~{n}ola de Criptolog\'ia y Seguridad de la Informaci\'on (RECSI 2012)}, volume = {}, isbn = {978-84-615-9933-2}, year = {2012}, month = {Septiembre}, pages = {423--428}, publisher = {Arrasate - Mondragon, Mondragon Uniberstsitatea}, address = {}, editor = {Zurutuza, U. and Uribeetxeberria, R. and Arenaza-Nu\~{n}o, I. } }
@inproceedings{recsi2012b, author = {Casas-Roma, Jordi and Herrera-Joancomart\'{\i}, Jordi and Torra, Vicen\c{c}}, title = {Algoritmos gen\'eticos para la anonimizaci\'on de grafos}, booktitle = {Actas de la XII Reuni\'on Espa\~{n}ola de Criptolog\'ia y Seguridad de la Informaci\'on (RECSI 2012)}, volume = {}, isbn = {978-84-615-9933-2}, year = {2012}, month = {Septiembre}, pages = {243--248}, publisher = {Arrasate - Mondragon, Mondragon Uniberstsitatea}, address = {}, editor = {Zurutuza, U. and Uribeetxeberria, R. and Arenaza-Nu\~{n}o, I. } }
@article{jisis12-2-12-01, author = {Marc Domingo-Prieto and Joan Arnedo-Moreno and Jordi Herrera-Joancomart\'{\i} and Josep Prieto-Bl\'azquez}, title = {Towards secure mobile {P2P} applications using {JXME}}, journal = {Journal of Internet Services and Information Security (JISIS)}, volume = {2}, number = {1/2}, year = {2012}, month = {2}, pages = {1--21}, ee = {http://isyou.info/jisis/vol1/no4/jisis-2012-vol2-no12-01.pdf} }
@incollection{jcasas2012, year = {2012}, isbn = {978-3-642-34619-4}, booktitle = {Modeling Decisions for Artificial Intelligence}, volume = {7647}, series = {Lecture Notes in Computer Science}, doi = {10.1007/978-3-642-34620-0_19}, title = {Comparing Random-Based and k-Anonymity-Based Algorithms for Graph Anonymization}, url = {http://dx.doi.org/10.1007/978-3-642-34620-0_19}, publisher = {Springer Berlin Heidelberg}, author = {Casas-Roma, Jordi and Herrera-Joancomart\'{\i}, Jordi and Torra, Vicen\c{c}}, pages = {197-209} }
@inproceedings{6119932, author = {Melia-Segui, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomarti, Jordi}, booktitle = {IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society}, title = {Multiple-polynomial {LFSR} based pseudorandom number generator for {EPC} {G}en2 {RFID} tags}, year = {2011}, month = {nov.}, volume = {}, number = {}, pages = {3820 -3825}, doi = {10.1109/IECON.2011.6119932}, issn = {1553-572X} }
@article{Hackin9-2011, author = {Meli\`a-Segu\'{\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart\'{\i}, Jordi}, title = {Practical Eavesdropping of Control Data From {EPC} {G}en2 Queries With a Programmable {RFID} Toolkit}, journal = {Hakin9}, volume = {6}, number = {9}, issn = {1098-111X}, pages = {14--19}, month = {Set.}, year = {2011} }
@incollection{springerlink:10.1007/978-3-642-22589-5_1, author = {Jordi Herrera-Joancomart\'{\i} and Cristina P\'erez-Sol\`a}, affiliation = {Dept. d'Enginyeria de la Informaci\'o i les Comunicacions, Escola d'Enginyeria, Universitat Aut\`onoma de Barcelona, 08193 Bellaterra, Catalonia, Spain}, title = {Online Social Honeynets: Trapping Web Crawlers in {OSN}}, booktitle = {Modeling Decision for Artificial Intelligence}, series = {Lecture Notes in Computer Science}, editor = {Torra, Vicen\c{c} and Narakawa, Yasuo and Yin, Jianping and Long, Jun}, publisher = {Springer Berlin / Heidelberg}, isbn = {978-3-642-22588-8}, keyword = {Computer Science}, pages = {1-16}, volume = {6820}, url = {http://dx.doi.org/10.1007/978-3-642-22589-5_1}, doi = {10.1007/978-3-642-22589-5_1}, year = {2011} }
@article{fi3010031, author = { Helena Rif\`a-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices}, journal = {Future Internet}, volume = {3}, year = {2011}, number = {1}, pages = {31--48}, url = {http://www.mdpi.com/1999-5903/3/1/31/}, issn = {1999-5903}, doi = {10.3390/fi3010031} }
@article{springerlink:10.1007/s11277-010-0187-1, author = {Meli\`a -Segu\'{\i}, Joan and Garcia-Alfaro, Joaquin and Herrera-Joancomart\'{\i}, Jordi}, affiliation = {Universitat Autònoma de Barcelona}, title = {A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for {EPC} {G}en2 Tags}, journal = {Wireless Personal Communications}, publisher = {Springer Netherlands}, issn = {0929-6212}, keyword = {Engineering}, pages = {27-42}, volume = {59}, issue = {1}, url = {http://dx.doi.org/10.1007/s11277-010-0187-1}, note = {10.1007/s11277-010-0187-1}, abstract = {The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain. It is designed to balance cost and functionality. As a consequence, security on board of EPC Gen2 tags is often minimal. It is, indeed, mainly based on the use of on board pseudorandomness, used to obscure the communication between readers and tags; and to acknowledge the proper execution of password-protected operations. In this paper, we present a practical implementation attack on a weak pseudorandom number generator (PRNG) designed specifically for EPC Gen2 tags. We show that it is feasible to eavesdrop a small amount of pseudorandom values by using standard EPC commands and using them to determine the PRNG configuration that allows to predict the complete output sequence.}, year = {2011} }
@article{helena2011, author = {Helena Rif\`a -Pous and Jordi Herrera-Joancomart\'{\i}}, affiliation = {Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Barcelona, Spain}, title = {A Fair and Secure Cluster Formation Process for Ad Hoc Networks}, journal = {Wireless Personal Communications}, publisher = {Springer Netherlands}, issn = {0929-6212}, keyword = {Engineering}, pages = {625-636}, volume = {56}, issue = {3}, url = {http://dx.doi.org/10.1007/s11277-010-9994-7}, note = {10.1007/s11277-010-9994-7}, abstract = {An efficient approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate, for each cluster, a clusterhead which is responsible for holding intercluster control information. The role of a clusterhead entails rights and duties. On the one hand, it has a dominant position in front of the others because it manages the connectivity and has access to other node’s sensitive information. But on the other hand, the clusterhead role also has some associated costs. Hence, in order to prevent malicious nodes from taking control of the group in a fraudulent way and avoid selfish attacks from suitable nodes, the clusterhead needs to be elected in a secure way. In this paper we present a novel solution that guarantees the clusterhead is elected in a cheat-proof manner.}, year = {2011} }
@article{Cris2010, address = {Venezuela}, author = {Apol.lonia Mart\'{\i}nez Nadal and Jordi Herrera-Joancomart\'{\i} and Cristina P\'erez-sol\`a}, pages = {191-216}, journal = {Revista de derecho y tecnolog\'{\i}a}, title = {An\'alisis t\'ecnico-jur\'{\i}dico del proceso de Iniciativa Legislativa Popular con recogida de firmas digitales en Espa\~{n}a}, volume = {11}, year = {2010} }
@article{10.1109/3PGCIC.2010.80, author = {Cristina Per\'ez-Sol\`a and Jordi Herrera-Joancomart\'{\i}}, title = {{OSN}: When Multiple Autonomous Users Disclose Another Individual's Information}, journal = {P2P, Parallel, Grid, Cloud, and Internet Computing, International Conference on}, volume = {0}, isbn = {978-0-7695-4237-9}, year = {2010}, pages = {471-476}, doi = {http://doi.ieeecomputersociety.org/10.1109/3PGCIC.2010.80}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA} }
@inproceedings{marc10a, author = {Marc Domingo-Prieto and Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Security analysis of {JXME}-Proxyless version}, booktitle = {Actas de la XI Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (XI - RECSI)}, year = {2010}, pages = {301-306}, publisher = {}, address = {Tarragona}, isbn = {978-84-693-3304-4} }
@inproceedings{melia10c, author = {Joan Meli\`a and Joaquin Garc\'{\i}a-Alfaro and Jordi Herrera-Joancomart\'{\i}}, title = {Clasificaci\'on de las amenazas a la seguridad en sistemas {RFID} - {EPC} Gen2}, booktitle = {Actas de la XI Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (XI - RECSI)}, year = {2010}, pages = {211-216}, publisher = {}, address = {Tarragona}, isbn = {978-84-693-3304-4} }
@inproceedings{cris10a, author = {Cristina P\'erez-sol\`a and Apol.lonia Mart\'{\i}nez Nadal and Jordi Herrera-Joancomart\'{\i}}, title = {El proceso de Iniciativa Legislativa Popular por medio de firmas digitales}, booktitle = {Actas de la XI Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (XI - RECSI)}, year = {2010}, pages = {123-128}, publisher = {}, address = {Tarragona}, isbn = {978-84-693-3304-4} }
@inproceedings{melia2010a, author = {Joan Meli\`a and Joaquin Garc\'{\i}a-Alfaro and Jordi Herrera-Joancomart\'{\i}}, title = {{RFID} {EPC}-Gen2 for Postal Applications: A Security and Privacy Survey}, year = {2010}, booktitle = {IEEE International Conference on {RFID}-Technology and Applications}, isbn = {}, pages = {}, date = {June 2010}, address = {Guangzhou, China}, doi = {10.1109/RFID-TA.2010.5529872} }
@inproceedings{domingo2010a, author = {Marc Domingo-Prieto and Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {{JXTA} security in mobile constrained devices}, year = {2010}, booktitle = {Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA)}, isbn = {}, pages = {139-144}, publisher = {IEEE Computer Society}, doi = {10.1109/WAINA.2010.178} }
@inproceedings{Melia-Segui:2010:AIP:1894863.1894867, author = {Melia-Segui, J. and Garcia-Alfaro, J. and Herrera-Joancomarti, J.}, title = {Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags}, booktitle = {Proceedings of the 14th international conference on Financial cryptograpy and data security}, series = {FC'10}, year = {2010}, isbn = {3-642-14991-X, 978-3-642-14991-7}, location = {Tenerife, Canary Islands, Spain}, pages = {34--46}, numpages = {13}, url = {http://dl.acm.org/citation.cfm?id=1894863.1894867}, acmid = {1894867}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg} }
@article{Arnedo2010a, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {{XML}-based security for {JXTA} core protocols}, journal = {International Journal of Autonomic Computing (IJAC)}, issue_date = {December 2010}, volume = {1}, number = {4}, month = dec, year = {2010}, issn = {1741-8569}, pages = {447--469}, numpages = {23}, url = {http://dx.doi.org/10.1504/IJAC.2010.037517}, doi = {10.1504/IJAC.2010.037517}, acmid = {1923668}, publisher = {Inderscience Publishers}, address = {Inderscience Publishers, Geneva, SWITZERLAND} }
@article{CastellaRoca2009, title = {Preserving user's privacy in web search engines}, journal = {Computer Communications}, volume = {32}, issues = {13-14}, pages = { 1541-1551 }, year = {2009}, note = {}, issn = {0140-3664}, doi = {10.1016/j.comcom.2009.05.009}, author = {Jordi Castell\`a-Roca and Alexandre Viejo and Jordi Herrera-Joancomart\'{\i}}, abstract = { Web search engines (e.g. Google, Yahoo, Microsoft Live Search, etc.) are widely used to find certain data among a huge amount of information in a minimal amount of time. However, these useful tools also pose a privacy threat to the users: web search engines profile their users by storing and analyzing past searches submitted by them. To address this privacy threat, current solutions propose new mechanisms that introduce a high cost in terms of computation and communication. In this paper we present a novel protocol specially designed to protect the users? privacy in front of web search profiling. Our system provides a distorted user profile to the web search engine. We offer implementation details and computational and communication results that show that the proposed protocol improves the existing solutions in terms of query delay. Our scheme provides an affordable overhead while offering privacy benefits to the users.} }
@inproceedings{Herr2009, author = {Jordi Herrera-Joancomart\'{\i} and D. Meg\'{\i}as}, title = {Watermarking in the encrypted Domain}, year = {2009}, booktitle = {Actas del V Congreso Iberoamericano de Seguridad Inform\'atica CIBSI-09}, isbn = {978-9974-0-0593-8}, pages = {202-212}, address = {Montevideo, Uruguay} }
@inproceedings{Arnedo2009c, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Maintaining unlinkability in group based P2P environments}, year = {2009}, booktitle = {18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE) }, isbn = {978-0-7695-3683-5}, pages = {140-145}, doi = {10.1109/WETICE.2009.24}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, abstract = { In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communications channel, all approaches consider the overlay network as a single entity and none of them take into account peer group based environments. In this paper, we describe a method in order to maintain unlinkability in group membership authentication attempts when using peer groups relying on web-of-trust. Using this method, it is not possible to ultimately pinpoint a peer's identity despite the constraints of a group membership scenario.} }
@inproceedings{10.1109/CISIS.2009.24, author = {Joan Arnedo-Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {A Security Layer for {JXTA} Core Protocols}, year = {2009}, booktitle = {Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC)}, isbn = {978-0-7695-3575-3}, pages = {463-468}, doi = {10.1109/CISIS.2009.24}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA} }
@article{ArnedoMoreno201021, title = {{JXTA} resource access control by means of advertisement encryption}, journal = {Future Generation Computer Systems}, volume = {26}, number = {1}, pages = {21 - 28}, year = {2010}, note = {}, issn = {0167-739X}, doi = {10.1016/j.future.2009.05.023}, author = {Joan Arnedo-Moreno and Jordi Herrera-Joancomart\'{\i}} }
@article{ArnedoMoreno20091513, title = {A survey on security in {JXTA} applications}, journal = {Journal of Systems and Software}, volume = {82}, number = {9}, pages = {1513 - 1525}, year = {2009}, note = {SI: QSIC 2007}, issn = {0164-1212}, doi = {10.1016/j.jss.2009.04.037}, author = {Joan Arnedo-Moreno and Jordi Herrera-Joancomart\'{\i}} }
@article{rifa2009, author = {Helena Rif\`{a}-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {Cryptographic Energy Costs Are Assumable in Ad Hoc Networks}, journal = {IEICE Transactions on Information and Systems}, volume = {E92.D}, number = {5}, pages = {1194-1196}, year = {2009}, issn = {0916-8532}, doi = {10.1587/transinf.E92.D.1194} }
@article{melia2009, author = {Joan Meli\`a and Joaquin Garcia and Jordi Herrera-Joancomart\'{\i}}, title = {{EPC-RFID} Security and Privacy for Postal Sector}, journal = {RFIDSec Asia}, year = {2009}, month = {}, volume = {}, number = {}, pages = {}, issn = {} }
@article{iJET789, author = {Josep Prieto-Blazquez and Jordi Herrera-Joancomart\'{\i} and Ana-Elena Guerrero-Rold\'an}, ee = {http://dx.doi.org/10.3991/ijet.v4s1.789}, journal = {International Journal of Emerging Technologies in Learning (iJET)}, number = {S1}, pages = {47-52}, title = {A Virtual Laboratory Structure for Developing Programming Labs.}, url = {http://dblp.uni-trier.de/db/journals/ijet/ijet4.html#Prieto-BlazquezHG09}, volume = 4, year = 2009 }
@article{prieto2008siie, author = {Josep Prieto-Bl\'azquez and Jordi Herrera-Joancomart\'{\i}}, title = {A Virtual Laboratory Structure for Computer Engineering Education}, journal = {X The International Symposium on Computers in Education, 2008. Salamanca (Spain)}, year = {2008}, month = {October}, volume = {1}, number = {}, pages = {S11:1-6}, issn = {84-9773-303-7} }
@article{prieto2008fie, title = {Virtual Laboratory Ontology for Engineering Education}, author = {Josep Prieto-Bl\'azquez and Ivan Garc\'{\i}a-Tor\`a and Jordi Herrera-Joancomart\'{\i} and Anna Guerrero-Rold\'an}, journal = {Frontiers in Education, 2008. FIE 2008. 38th Annual. Saratoga (EEUU)}, year = {2008}, month = {October}, volume = {1}, number = {}, pages = {S2F-1 Vol. 1}, issn = {0190-5848}, isbn = {978-1-4244-1969-2}, doi = {10.1109/FIE.2008.4720470} }
@article{prieto2008tie, author = {Josep Prieto-Bl\'azquez and Joan Arnedo-Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {An Integrated Structure for a Virtual Networking Laboratory}, journal = {Industrial Electronics, IEEE Transactions on}, year = {2008}, month = {June }, volume = {55}, number = {6}, pages = {2334-2342}, doi = {10.1109/TIE.2008.921231}, issn = {0278-0046} }
@article{furies_jcomss, author = {Helena Rif\`{a}-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {A Forwarding Cooperation Protocol for Plain and Cluster-based Ad Hoc Networks}, year = {2008}, month = {March}, number = {1}, volume = {4}, pages = {3-12}, journal = {Journal of Communications Software and Systems (JCOMSS)} }
@inproceedings{Xavi08, author = {Xavier Domenech and Jordi Herrera-Joancomart\'{\i} and David Megias}, title = {{Prevenci\'on de ataques de desincronizaci\'on en esquemas de watermarking de audio}}, booktitle = {Actas de la X Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (X - RECSI)}, year = {2008}, pages = {551-556}, publisher = {}, address = {Salamanca}, isbn = {978-84-691-5158-7} }
@inproceedings{Guille08, author = {Guillermo Navarro and Joaquin Garcia-Alfaro and Oriol Mula and Jordi Herrera-Joancomart\'{\i}}, title = {{Gesti\'on de recursos de un navegador web para prevenir ataques contra la privacidad en TOR}}, booktitle = {Actas de la X Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (X - RECSI)}, year = {2008}, pages = {629--638}, publisher = {}, address = {Salamanca}, isbn = {978-84-691-5158-7} }
@inproceedings{Melia08, author = {Joan Meli\`a and Joaquin Garcia-Alfaro and Jordi Herrera-Joancomart\'{\i}}, title = {{Analisis de seguridad y Privacidad para sistemas EPC-RFID}}, booktitle = {Actas de la X Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (X - RECSI)}, year = {2008}, pages = {639--646}, address = {Salamanca}, isbn = {978-84-691-5158-7} }
@inproceedings{Arne08c, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {{JXTA} security in basic peer operations}, booktitle = {Actas de la IX Reuni\'on Espa\~{n}ola sobre Criptologia y Seguridad de la Informaci\'on (X - RECSI)}, year = {2008}, pages = {405-414}, publisher = {}, address = {Salamanca}, isbn = {978-84-691-5158-7} }
@inproceedings{Arne08b, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Persistent interoperable security for {JXTA}}, year = {2008}, booktitle = {Proceedings of the Second International Workshop on P2P, Parallel, Grid and Internet Computing (3PGIC) 2008}, pages = {354-359}, publisher = {IEEEPress} }
@inproceedings{Arne08, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Collaborative group membership and access control for {JXTA}}, booktitle = {Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on}, year = {2008}, month = {Jan.}, volume = {}, publisher = {IEEE Computer Society}, number = {}, pages = {159-166}, doi = {10.1109/COMSWA.2008.4554399}, isbn = {978-1-4244-1796-4} }
@inproceedings{bib-cedi07, author = {Helena Rif\`{a}-Pous and Joan Vila-Canals and Jordi Herrera-Joancomart\'{\i}}, title = {Coste de los protocolos de seguridad en redes MANET}, year = {2007}, pages = {127-134}, booktitle = {Actas del II Simposio sobre Seguridad Inform{\'a}tica [SSI'2007]. ISBN: 978-84-9732-607-0}, address = {Zaragoza, Espa\~{n}a} }
@inproceedings{Arne07, author = {Joan Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Resoluci\'on de escenarios en control de acceso a grupo en entornos distribuidos}, booktitle = {CEDI: Simposio sobre seguridad inform\'atica}, year = {2007}, pages = {119-126}, address = {Zaragoza, Espa\~{n}a} }
@inproceedings{bib-furies, author = {Helena Rif\`{a}-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {{A forwarding spurring protocol for multihop ad hoc networks (FURIES)}}, booktitle = {{Next Generation Teletraffic and Wired/Wireless Advanced Networking, Proceedings}}, series = {{LNCS}}, year = {{2007}}, volume = {{4712}}, pages = {{281-293}}, note = {{7th International Conference on Next Generation Teletraffic and Wire/Wireless Advanced Networking, St Petersburg, RUSSIA, SEP 10-14, 2007}}, abstract = {{The functioning of an ad hoc network is based on the supportive contributions of all of its members. Nodes behave as routers and take part in route discovery and maintenance. In this paper, a forwarding protocol is presented that stimulates node cooperation to improve the throughput of the network. The incentive mechanism is provided through a micropayment protocol that deals with the cooperation range of the users. Most cooperative nodes intrinsically benefit of the best routes and availability and they take preference in front of selfish ones.}}, publisher = {{SPRINGER-VERLAG BERLIN}}, type = {{Proceedings Paper}}, language = {{English}}, affiliation = {{Rifa-Pous, H (Reprint Author), Univ Oberta Catalunya, Rb Poble Nou 156, Barcelona 08018, Spain. Univ Oberta Catalunya, Barcelona 08018, Spain.}}, issn = {{0302-9743}}, isbn = {{978-3-540-74832-8}}, doi = {10.1007/978-3-540-74833-5_24} }
@inproceedings{DBLP:conf/europki/Rifa-PousH07, author = {Helena Rif{\`a}-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {An Interdomain PKI Model Based on Trust Lists}, booktitle = {EuroPKI}, year = {2007}, pages = {49-64}, doi = {10.1007/978-3-540-73408-6_4}, series = {LNCS 4582}, month = {June}, isbn = {978-3-540-73407-9}, publisher = {Springer}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{sedymo, author = {Helena Rif{\`a}-Pous and Jordi Herrera-Joancomart\'{\i}}, title = {{Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol}}, booktitle = {Communication Networks and Services Research (CNSR)}, year = {2007}, isbn = {0-7695-2835-X}, pages = {372-380}, doi = {10.1109/CNSR.2007.57}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA} }
@article{Ditt06, author = {J. Dittmann and D. Meg\'{\i}as and A. Lang and Jordi Herrera-Joancomart\'{\i}}, title = {Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity}, journal = {LNCS Transactions on Data Hiding and Multimedia Security}, year = {2006}, volume = {4300}, pages = {1-43}, month = {Nov.}, note = {}, abstract = {}, source = {}, isbn = {978-3-540-49071-5} }
@inproceedings{Arne06, author = {J. Arnedo Moreno and Jordi Herrera-Joancomart\'{\i}}, title = {Providing collaborative mechanism for peer group acces control}, booktitle = {Proceedings of the Workshop on Trusted Collaboration}, year = {2006}, editor = {}, volume = {}, number = {}, series = {}, pages = {1-6}, address = {Atlanta (USA)}, month = {Nov.}, organization = {}, publisher = {IEEE Press}, note = {}, abstract = {} }
@inproceedings{Rifa06, author = {Helena Rif\`a and Jordi Herrera-Joancomart\'{\i}}, title = {Gesti\'on de confianza en redes ad-hoc}, booktitle = {Actas de la IX Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on - RECSI}, volume = {}, pages = {pp.745-759}, year = {2006}, month = {sep}, address = {Barcelona, Spain} }
@inproceedings{Arne06b, author = {Joan Arnedo and Jordi Herrera-Joancomart\'{\i}}, title = {Identifying different scenarios for group access control in distributed environments}, booktitle = {Actas de la IX Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on - RECSI}, volume = {}, pages = {pp.388-399}, year = {2006}, month = {sep}, address = {Barcelona, Spain} }
@inproceedings{Lang06, author = {A. Lang and J. Dittmann and D. Meg\'{\i}as and Jordi Herrera-Joancomart\'{\i}}, title = { Practical Audio Watermarking Evaluation Tests and its Representation and Visualization in the Triangle of Robustness, Transparency and Capacity}, booktitle = {Second Wavila Challenge (WaCha)}, year = {2006}, editor = {}, volume = {}, number = {}, series = {}, pages = {}, address = {Geneve (Switzerland)}, month = {Set.}, organization = {}, publisher = {}, note = {}, abstract = {} }
@inproceedings{Serr06, author = {J. Serra and D. Meg\'{\i}as and Jordi Herrera Joancomart\'{\i} and J. Minguill\'on}, title = {Multiband semifragile watermarking for multi and hyperspectral images based on iterative tree structured vector quantization}, booktitle = {Proceedings of the Image and Signal Processing for Remote Sensing XII}, year = {2006}, editor = {}, volume = {6365}, number = {}, series = {}, pages = {0O-1, 0O-10}, address = {Bellingham, Washington (USA)}, month = {Sep.}, organization = {}, publisher = {IS\&T/SPIE}, note = {}, abstract = {} }
@inproceedings{Cast06, author = {Jordi Castell\`a Roca and Jordi Herrera Joancomart\'{\i} and Aleix Dorca Josa}, title = {A Secure E-Exam Management System}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security: Security in E-learning (ARES 2006)}, year = {2006}, editor = {}, volume = {}, number = {}, series = {}, pages = {864-871}, address = {Vienna (Austria)}, month = {Apr.}, organization = {}, publisher = {IEEE Compute Society}, note = {ISBN - 0-9695-2567-9/0}, abstract = {} }
@inproceedings{Megi06, author = {D. Meg\'{\i}as and Jordi Herrera Joancomart\'{\i} and J. Serra and J. Minguill\'on}, title = {A Benchmark Assessment of the WAUC Watermarking Audio Algorithm}, booktitle = {Proceedings of the SPIE- 18th Annual Symposium Electronic Imaging 2006}, year = {2006}, editor = {}, volume = {6072}, number = {}, series = {}, pages = {1K-1, 1K-10}, address = {San Jose, California (USA)}, month = {Jan}, organization = {IS\&T/SPIE}, publisher = {}, note = {}, abstract = {} }
@inproceedings{Megi05, author = {David Meg\'{\i}as Jimenez and Jordi Herrera Joancomart\'{\i} and Juli\`a Minguill\'on Alfonso}, title = {Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio}, booktitle = {International Conference on Information and Communications Security - ICICS'05}, year = {2005}, editor = {}, volume = {3783}, number = {}, series = {Lecture Notes in Computer Science}, pages = {427-440}, address = {}, month = {Dec.}, organization = {}, publisher = {Springer}, note = {ISBN 3-540-30934-9}, abstract = {} }
@inproceedings{Ming05b, author = {Juli\`a Minguill\'on Alfonso and Jordi Herrera Joancomart\'{\i} and David Meg\'{\i}as Jimenez and J. Serra and J. Serra-Sacrist\`a and F. Garc\'{\i}a-Vilchez}, title = {Influence of Mark Embedding Strategies on Lossless Compression of Ultraspectral Images}, booktitle = {Proceedings of the 25th International Geoscience and Remote Sensing Symposium IGARSS}, year = {2005}, editor = {}, volume = {}, number = {}, series = {}, pages = {}, address = {USA}, month = {Jul}, organization = {}, publisher = {SPIE - The International Society for Optical Engineering}, note = {}, abstract = {} }
@article{Ming05, author = {Juli\`a Minguill\'on Alfonso and Jordi Herrera Joancomart\'{\i} and David Meg\'{\i}as Jimenez}, title = {Robust watermarking scheme based on the JPEG2000 standard}, journal = {Journal of Electronic Imaging}, year = {2005}, volume = {14}, number = {3}, pages = {033015-1,033015-16}, month = {}, note = {ISSN-1017-9909}, abstract = {}, source = {} }
@proceedings{Herr05, title = {Information Hiding}, year = {2005}, editor = {M. Barni and Jordi Herrera-Joancomart\'{\i} and S. Katzenbeisser and F. P\'erez-Gonz\'alez}, publisher = {Springer}, volume = {3727}, number = {}, series = {Lecture Notes in Computer Science}, organization = {}, address = {}, month = {}, note = {}, abstract = {}, isbn = {}, price = {}, source = {} }
@article{Herr04c, author = {Jordi Herrera-Joancomart\'{\i}}, title = {Infraestructures de clau p\'ublica (PKI): qu\`e s\'on i qu\`e aporten.}, journal = {TERAFLOP}, year = {2004}, volume = {}, number = {}, pages = {}, month = {}, note = {ISSN: 1134-6671}, abstract = {}, source = {} }
@inproceedings{Meg:04c, author = {Meg\'{\i}as, David and Herrera-Joancomart\'{\i}, Jordi and Minguill\'{o}n, Juli\`{a}}, title = {Robust frequency domain audio watermarking: a tuning analysis}, booktitle = {Proceedings of the Third international conference on Digital Watermarking, IWDW'04}, series = {LNCS-3304}, year = {2005}, isbn = {3-540-24839-0, 978-3-540-24839-2}, location = {Seoul, South Korea}, pages = {244--258}, numpages = {15}, url = {http://dx.doi.org/10.1007/978-3-540-31805-7_21}, doi = {10.1007/978-3-540-31805-7_21}, acmid = {2144456}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg} }
@inproceedings{Meg:04b, author = {D. Meg\'{\i}as and Jordi Herrera-Joancomart\'{\i} and J. Minguill\'on}, title = {An audio watermarking scheme robust against stereo attacks}, booktitle = {MM\&Sec '04: Proceedings of the 2004 workshop on Multimedia and security}, year = {2004}, isbn = {1-58113-854-7}, pages = {206--213}, location = {Magdeburg, Germany}, doi = {10.1145/1022431.1022467}, publisher = {ACM}, address = {New York, NY, USA} }
@inproceedings{minguillon04, author = {Juli\`a Minguill\'on and Jordi Herrera-Joancomart\'{\i} and David Meg\'{i}as}, title = {Transmisi\'on progresiva de im\'agenes marcadas digitalmente}, booktitle = {Actas de la VIII Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on VIII - RECSI}, volume = {}, pages = {675-686}, year = {2004}, month = {sep}, address = {Legan\'es, Spain} }
@inproceedings{herr04b, author = {Jordi Herrera-Joancomart\'{\i} and Juli\`a Minguill\'on and David Meg\'{i}as}, title = {PlaPID: una plataforma para la protecci\'on de im\'agenes digitales}, booktitle = {Actas de la VIII Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on VIII - RECSI}, volume = {}, pages = {665-674}, year = {2004}, month = {sep}, address = {Legan\'es, Spain} }
@inproceedings{Meg:04, author = {D. Meg\'{\i}as and Jordi Herrera-Joancomart\'{\i} and J. Minguill\'on}, editor = {{Steinmetz, R and Mauthe, A}}, title = {{A robust frequency domain audio watermarking scheme for monophonic and stereophonic {PCM} formats}}, booktitle = {Proceedings of the 30th EUROMICRO conference}, year = {{2004}}, pages = {{449-452}}, note = {{30th EUROMICRO Conference, Rennes, FRANCE, AUG 31-SEP 03, 2004}}, abstract = {{In this paper, a watermarking scheme for both monophonic and stereophonic audio files is presented. The suggested method uses MPEG 1 Layer 3 compression to determine where and how the embedded mark must be introduced. The results show that the suggested watermarking scheme is robust against the attacks of the audio Stirmark benchmark and compression attacks using the Sound Quality Assessment Material as the experimental corpus set.}}, publisher = {{IEEE COMPUTER SOC}}, type = {{Proceedings Paper}}, language = {{English}}, affiliation = {{Megias, D (Reprint Author), Univ Oberta Catalunya, Estudis Informat \& Multimedia, Av Tibidabo 39-43, Barcelona 08035, Spain. Univ Oberta Catalunya, Estudis Informat \& Multimedia, Barcelona 08035, Spain.}}, issn = {{1089-6503}}, isbn = {{0-7695-2199-1}}, subject-category = {{Computer Science, Software Engineering; Computer Science, Theory \& Methods; Telecommunications}} }
@inproceedings{Herr04a, author = {J. Herrera-Joancomart'{\i} and J. Prieto-Bl\'azquez and J. Castell\`a Roca}, editor = {{Srimani, PK}}, title = {{A secure electronic examination protocol using wireless networks}}, booktitle = {{ITCC 2004: International COnference on Information Technology: Coding and Computing, Vol 2, Proceedings}}, year = {{2004}}, pages = {{263-267}}, month = {{April}}, organization = {{IEEE Comp Soc}}, abstract = {{Electronic examinations are those examinations performed through a computer where questions and answers are computer files rather than sheets of paper The temptation of using electronic examinations as a distance learning evaluation tool is obvious. However security concerns must be considered. In this paper we present a secure electronic examination protocol. Using wireless technology, we propose a trade-off solution between examination security (in terms of examination result correctness) and examination flexibility.}}, publisher = {{IEEE COMPUTER SOC}}, type = {{Proceedings Paper}}, language = {{English}}, affiliation = {{Herrera-Joancomart\'{\i}, J (Reprint Author), Univ Oberta Catalunya, Av Tibidabo 39, Barcelona 08035, Spain. Univ Oberta Catalunya, Barcelona 08035, Spain.}}, isbn = {{0-7695-2108-8}}, subject-category = {{Computer Science, Artificial Intelligence; Computer Science, Hardware \& Architecture; Computer Science, Information Systems; Computer Science, Theory \& Methods}} }
@inproceedings{Meg:03, author = {D. Meg\'{\i}as and Jordi Herrera-Joancomart\'{\i} and J. Minguill\'on}, title = {A Robust Audio Watermarking Scheme Based on {MPEG} 1 Layer 3 Compression}, booktitle = {Communications and Multimedia Security - CMS 2003}, volumne = {2828}, pages = {226--238}, year = {2003}, series = {LNCS 963}, publisher = {Springer-Verlag} }
@inproceedings{minguillon03RS, author = {Juli{\`a} Minguill{\'o}n and Jordi Herrera-Joancomart\'{\i} and David Meg\'{i}as and Joan Serra-Sagrist\`a}, title = {Evaluation of copyright protection schemes for hyperspectral imaging}, booktitle = {Proceedings of the Image and Signal Processing for Remote Sensing IX}, editor = {Lorenzo Bruzzone}, publisher = {SPIE}, year = {2004}, volume = {5238}, pages = {512-523}, location = {Barcelona, Spain}, doi = {10.1117/12.511161} }
@inproceedings{Prie03, author = {J. Prieto-Bl\'azquez and J. Herrera-Joancomart\'{\i} and R. Mart\'{\i}nez Pe\~{n}a}, title = {Implementaci\'on de un sistema de autentificaci\'on personal basado en tecnolog\'{\i}a Bluetooth}, booktitle = {Actas del II Simposio Espa\~{n}ol de Comercio Electr\'onico - SCE04}, key = {}, pages = {13--24}, year = {2003}, month = jun, series = {}, note = {}, publisher = {Fundaci\'on DITEL} }
@inproceedings{Herr03b, author = {Jordi Herrera-Joancomart\'{\i} and J. Minguill\'on and D. Meg\'{i}as}, title = {A family of image watermarking schemes based on lossy image compression}, booktitle = {Proceedings of the Information Technology: Coding and Computing ITCC'2003}, key = {}, pages = {559--563}, year = {2003}, series = {}, note = {}, publisher = {IEEE Computer Society} }
@inproceedings{Herr03a, author = {J. Herrera-Joancomart'{\i} and J. Prieto-Bl\'azquez}, title = {A Personal Authentication Scheme Using Mobile Technology}, booktitle = {Proceedings of the Information Technology: Coding and Computing ITCC'2003}, key = {}, pages = {253--257}, year = {2003}, series = {}, note = {}, publisher = {IEEE Computer Society} }
@inproceedings{minguillon03EI, author = {Juli\`a Minguill\'on and Jordi Herrera-Joancomart\'{\i} and David Meg\'{i}as}, title = {Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme}, booktitle = {Proceedings of the Security and Watermarking of Multimedia Contents V}, editor = {Edward J. Delp III and Ping W. Wong}, year = {2003}, volume = {5020}, pages = {717-727}, location = {Santa Clara, CA, USA}, doi = {10.1117/12.476811} }
@inproceedings{herr02b, author = {Jordi Herrera-Joancomart\'{\i} and Juli\`a Minguill\'on}, title = {Ataques a esquemas de watermarking de im\'agenes}, booktitle = {Actas de la VII Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on VIII - RECSI}, volume = 2, pages = {437--446}, year = {2002}, month = {sep}, address = {Oviedo, Spain}, publisher = {Publicaciones de la universidad de Oviedo} }
@inproceedings{herr02a, author = {Jordi Herrera-Joancomart\'{\i} and J. Castell\`a Roca}, title = {Cadenas hash espandidas para compromisos compactos de n valores}, booktitle = {Actas de la VII Reuni\'on Espa\~{n}ola de Criptografia y Seguridad de la Informaci\'on VIII - RECSI}, volume = 2, pages = {427--436}, year = {2002}, month = {sep}, address = {Oviedo, Spain}, publisher = {Publicaciones de la universidad de Oviedo} }
@inproceedings{Sebe01, author = {Francesc Seb\'e, J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Spatial-Domain Image Watermarking Robust Against Compression, Filtering, Cropping and Scaling}, year = {2000}, booktitle = {Information Security - ISW '2000}, pages = {44--53}, note = {Lecture Notes in Computer Science Volume 1975}, editor = {}, publisher = {Springer-Verlag}, address = {Berlin} }
@article{Herr00b, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Short Collusion-secure fingerprinting based on dual binary Hamming codes}, journal = {Electronics Letters}, year = {2000}, volume = {36}, key = {}, number = {20}, pages = {1697--1699}, month = sep, publisher = {The Institution of Electrical Engineers (IEE)}, note = {} }
@inproceedings{Cast00a, author = {J. Castell\`a and J. Planes and J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {A Performance Comparison of {J}ava Cards for Micropayment Implementation}, booktitle = {Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000}, series = {IFIP Conference Proceedings}, key = {Cast}, pages = {19--38}, year = {2000}, month = {September}, address = {Bristol}, isbn = {0-7923-7953-5}, publisher = {Kluver Academic Publisher}, note = {} }
@inproceedings{Domi00b, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i} and Francesc Seb\'e}, title = {Un esquema de watermarking robusto para im\'agenes}, booktitle = {VI Reuni\'on Espa\~{n}ola de Criptolog\'{\i}a}, key = {Domi}, pages = {213--218}, year = {2000}, month = {September}, address = {Universidad de La Laguna, Tenerife} }
@inproceedings{Cast00b, author = {J. Castell\`a and J. Planes and J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Comparativa de tarjetas Java para aplicaciones de comercio electr\'onico}, booktitle = {VI Reuni\'on Espa\~{n}ola de Criptolog\'{\i}a}, key = {Cast}, pages = {225--231}, year = {2000}, month = {September}, address = {Universidad de La Laguna, Tenerife} }
@inproceedings{Herr00, author = {Jordi Herrera-Joancomart\'{\i} and J. Domingo-Ferrer}, title = {C\'odigos duales de Hamming para esquemas de fingerprinting seguros contra confabulaciones}, booktitle = {VI Reuni\'on Espa\~{n}ola de Criptolog\'{\i}a}, key = {Herr}, pages = {219--224}, year = {2000}, month = {September}, address = {Universidad de La Laguna, Tenerife} }
@article{Herr00c, author = {Jordi Herrera-Joancomart\'{\i}}, title = {Protecci\'o del copyright en els continguts multim\' edia}, journal = {TERAFLOP}, year = {2000}, volume = {}, number = {}, pages = {}, month = {}, note = {ISSN: 1134-6671}, abstract = {}, source = {} }
@phdthesis{Herr00a, author = {Jordi Herrera-Joancomart\'{\i}}, title = {Secure Electronic Commerce of Multimedia Contents Over Open Networks}, school = {Departament d'Enginyeria Telem\`atica, Universitat Polit\`ecnica de Catalunya}, year = {2000}, type = {}, address = {}, month = {May}, note = {}, key = {}, annote = {} }
@inproceedings{Domi00, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Simple Collusion-secure Fingerprinting Schemes for images}, booktitle = {Proceedings of the Information Technology: Coding and Computing ITCC'2000}, key = {Domi}, pages = {128-132}, year = {2000}, month = {April}, series = {}, publisher = {IEEE Computer Society} }
@book{Domi99a, author = {J. Domingo-Ferrer, Jordi Herrera-Joancomart\'{\i}}, editor = {}, title = { Criptografia. Per als serveis telem\`atics i el comer\c{c} electr\`onic}, publisher = {EdiUOC}, year = {1999}, volume = {}, number = {}, series = {}, address = {}, edition = {}, month = {}, note = {}, abstract = {}, isbn = {84-8429-007-7}, price = {}, source = {} }
@inproceedings{Domi99b, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Spending Programs: A tool for Flexible Micropayments}, booktitle = {Second International Information Security Workshop, ISW'99}, key = {Domi}, pages = {1-13}, year = {1999}, editor = {M. Mambo and Y. Zheng}, series = {LNCS 1729}, month = {November}, publisher = {Springer-Verlag} }
@article{Domi98e, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents}, journal = {ACM SIGMOD Record}, year = {1998}, volume = {27}, key = {Domi}, number = {4}, pages = {62-67}, month = {December} }
@inproceedings{Domi98d, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Efficient Smart-Card Based Anonymous Fingerprinting}, booktitle = {Smart Card Research and Advanced Application, CARDIS'98}, key = {Domi}, pages = {231-238}, year = {2000}, series = {LNCS 1820}, publisher = {Springer-Verlag} }
@inproceedings{Domi98c, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {A scheme for Anonimous Electronic Commerce Using Secure Intelligent Trade Agents}, booktitle = {Butllet\'{\i} de l'ACIA}, volume = {14-15}, key = {Domi}, pages = {119--124}, year = {1998}, address = {} }
@inproceedings{Domi98b, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {Un homomorfismo de privacidad entre cuerpos basado en fracciones de Farey}, booktitle = {V Reuni\'on Espa\~{n}ola de Criptologia}, key = {Domi}, pages = {80-91}, year = {1998}, address = {Universidad de M\'alaga} }
@inproceedings{Domi98a, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i}}, title = {A privacy homomorphism allowing field operations on encrypted data}, booktitle = {Proceedings I Jornades de Matem\`atica Discreta i Algor\'{\i}smica}, key = {Domi}, pages = {24-26}, year = {1998}, address = {Barcelona, Universitat Polit\`ecnica de Catalunya} }
@article{Domi98, author = {J. Domingo-Ferrer and Jordi Herrera-Joancomart\'{\i} and Ricardo Xavier S\'anchez del Castillo}, title = {Protecci\'on del copyright electr\'onico: fingerprinting}, journal = {Nov\'atica}, year = {1998}, volume = {134}, key = {}, number = {}, pages = {36--39}, month = {} }
This file was generated by bibtex2html 1.98.