default search action
Joan Borrell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Depeng Chen, Guillermo Navarro-Arribas, Cristina Pérez-Solà, Joan Borrell:
Message anonymity on predictable opportunistic networks. J. Ambient Intell. Humaniz. Comput. 14(11): 15059-15072 (2023) - 2020
- [j20]Carlos Borrego, Marica Amadeo, Antonella Molinaro, Paulo Mendes, Rute C. Sofia, Naércio Magaia, Joan Borrell:
Forwarding in Opportunistic Information-Centric Networks: An Optimal Stopping Approach. IEEE Commun. Mag. 58(5): 56-61 (2020)
2010 – 2019
- 2019
- [j19]Carlos Borrego, Joan Borrell, Sergi Robles:
Efficient broadcast in opportunistic networks using optimal stopping theory. Ad Hoc Networks 88: 5-17 (2019) - [j18]Carlos Borrego, Joan Borrell, Sergi Robles:
Hey, influencer! Message delivery to social central nodes in social opportunistic networks. Comput. Commun. 137: 81-91 (2019) - 2018
- [j17]Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joan Borrell:
Cryptocurrency Networks: A New P2P Paradigm. Mob. Inf. Syst. 2018: 2159082:1-2159082:16 (2018) - 2017
- [c31]Depeng Chen, Guillermo Navarro-Arribas, Joan Borrell:
On the Applicability of Onion Routing on Predictable Delay-Tolerant Networks. LCN 2017: 575-578 - 2016
- [j16]Rubén Martínez-Vidal, Ramon Martí, Cormac J. Sreenan, Joan Borrell:
Measuring QoS in an Aeronautical Opportunistic Network Architecture with Limited Access to a Satellite Communications Backhaul. Mob. Inf. Syst. 2016: 7601316:1-7601316:12 (2016) - 2015
- [j15]Rubén Martínez-Vidal, Ramon Martí, Cormac J. Sreenan, Joan Borrell:
Methodological evaluation of architectural alternatives for an aeronautical delay tolerant network. Pervasive Mob. Comput. 23: 139-155 (2015) - [c30]Rubén Martínez-Vidal, Thomas R. Henderson, Joan Borrell:
Implementation and evaluation of licklider transmission protocol (LTP) in ns-3. WNS3 2015: 75-82 - 2014
- [c29]Rubén Martínez-Vidal, Ramon Martí, Joan Borrell:
Analyzing information propagation in a transoceanic aircraft delay tolerant network. LCN 2014: 116-123 - 2013
- [j14]Estanislao Mercadal, Carlos Vidueira, Cormac J. Sreenan, Joan Borrell:
Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries. Comput. Commun. 36(9): 1011-1023 (2013) - [c28]Rubén Martínez-Vidal, Sergio Castillo-Perez, Sergi Robles, Adrián Sánchez-Carmona, Joan Borrell, Miguel Cordero, Antidio Viguria, Nicolas Giuditta:
Mobile-Agent Based Delay-Tolerant Network Architecture for Non-critical Aeronautical Data Communications. DCAI 2013: 513-520 - [c27]Rubén Martínez-Vidal, Ramon Martí, Joan Borrell:
Characterization of a transoceanic aircraft delay tolerant network. LCN 2013: 565-572 - 2012
- [j13]Estanislao Mercadal, Sergi Robles, Ramon Martí, Cormac J. Sreenan, Joan Borrell:
Double multiagent architecture for dynamic triage of victims in emergency scenarios. Prog. Artif. Intell. 1(2): 183-191 (2012) - [c26]Estanislao Mercadal, Guillermo Navarro-Arribas, Simon N. Foley, Joan Borrell:
Towards efficient access control in a mobile agent based wireless sensor network. CRiSIS 2012: 1-4 - 2011
- [j12]Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell:
Fuzzy Role-Based Access Control. Inf. Process. Lett. 111(10): 483-487 (2011) - [j11]Carles Martínez-García, Guillermo Navarro-Arribas, Simon N. Foley, Vicenç Torra, Joan Borrell:
Flexible secure inter-domain interoperability through attribute conversion. Inf. Sci. 181(16): 3491-3507 (2011) - [c25]Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell:
Intra-role Progression in RBAC: An RPG-Like Access Control Scheme. DPM/SETOP 2011: 221-234 - [c24]Estanislao Mercadal, Sergi Robles, Ramon Martí, Cormac J. Sreenan, Joan Borrell:
Heterogeneous Multiagent Architecture for Dynamic Triage of Victims in Emergency Scenarios. PAAMS 2011: 237-246 - 2010
- [j10]Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, Joan Borrell, Gerard Suades:
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents. Comput. Commun. 33(18): 2203-2214 (2010) - [j9]Carles Garrigues, Sergi Robles, Joan Borrell, Guillermo Navarro-Arribas:
Promoting the development of secure mobile agent applications. J. Syst. Softw. 83(6): 959-971 (2010) - [j8]Jordi Cucurull-Juan, Guillermo Navarro-Arribas, Ramon Martí, Sergi Robles, Joan Borrell:
An efficient and secure agent code distribution service. Softw. Pract. Exp. 40(4): 363-386 (2010)
2000 – 2009
- 2009
- [j7]Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, B. Overeinder, Joan Borrell:
Agent mobility architecture based on IEEE-FIPA standards. Comput. Commun. 32(4): 712-729 (2009) - [j6]Carles Garrigues, Nikos Migas, William J. Buchanan, Sergi Robles, Joan Borrell:
Protecting mobile agents from external replay attacks. J. Syst. Softw. 82(2): 197-206 (2009) - [j5]Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, Joan Borrell:
Full mobile agent interoperability in an IEEE-FIPA context. J. Syst. Softw. 82(12): 1927-1940 (2009) - [c23]Carles Martínez-García, Guillermo Navarro-Arribas, Joan Borrell, Abraham Martín-Campillo:
An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments. PAAMS 2009: 401-410 - 2008
- [j4]Carles Garrigues, Sergi Robles, Joan Borrell:
Securing dynamic itineraries for mobile agent applications. J. Netw. Comput. Appl. 31(4): 487-508 (2008) - [c22]Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, I. Barrera, Joan Borrell:
Distributed Exchange of Alerts for the Detection of Coordinated Attacks. CNSR 2008: 96-103 - [i2]Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, Joan Borrell:
Preventing Coordinated Attacks Via Distributed Alert Exchange. CoRR abs/0802.3718 (2008) - 2007
- [c21]Jordi Cucurull-Juan, Ramon Martí, Sergi Robles, Joan Borrell, Guillermo Navarro:
FIPA-Based Interoperable Agent Mobility. CEEMAS 2007: 319-321 - [i1]Jordi Cucurull-Juan, Ramon Martí, Sergi Robles, Joan Borrell, Guillermo Navarro:
FIPA-based Interoperable Agent Mobility Proposal. CoRR abs/0706.1860 (2007) - 2006
- [c20]Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell:
Protection of Components Based on a Smart-Card Enhanced Security Module. CRITIS 2006: 128-139 - [c19]Joaquín García-Alfaro, Sergio Castillo, Jordi Castellà-Roca, Guillermo Navarro, Joan Borrell:
SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components. OTM Workshops (1) 2006: 415-424 - 2005
- [c18]Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ruiz, Sergi Robles:
Access control with safe role assignment for mobile agents. AAMAS 2005: 1235-1236 - [c17]Guillermo Navarro, J. Peñalver, Jose A. Ortega-Ruiz, Joan Ametller, Joaquín García, Joan Borrell:
Amapola: A Simple Infrastructure for Ubiquitous Computing. INTELLCOMM 2005: 77-86 - [c16]Joaquín García, Michael A. Jaeger, Gero Mühl, Joan Borrell:
Decoupling Components of an Attack Prevention System Using Publish/Subscribe. INTELLCOMM 2005: 87-97 - [c15]Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz:
Protecting On-Line Casinos against Fraudulent Player Drop-Out. ITCC (1) 2005: 500-505 - [c14]Guillermo Navarro, Joan Borrell:
An XML Standards Based Authorization Framework for Mobile Agents. MADNES 2005: 54-66 - [c13]Jordi Cucurull-Juan, Joan Ametller, Jose A. Ortega-Ruiz, Sergi Robles, Joan Borrell:
Protecting Mobile Agent Loops. MATA 2005: 74-83 - 2004
- [c12]Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. ICICS 2004: 223-235 - 2003
- [c11]Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell:
Practical Mental Poker Without a TTP Based on Homomorphic Encryption. INDOCRYPT 2003: 280-294 - [c10]Joan Ametller, Sergi Robles, Joan Borrell:
Agent Migration over FIPA ACL Messages. MATA 2003: 210-219 - [c9]Joan Ametller, Sergi Robles, Joan Borrell:
Secure Mobile Agents Applications: Implementation through Platform Services. MATA 2003: 265-274 - [c8]Joan Mir, Joan Borrell:
Protecting Mobile Agent Itineraries. MATA 2003: 275-285 - 2002
- [c7]Guillermo Navarro, Sergi Robles, Joan Borrell:
Role-Based Access Control for E-commerce Sea-of-Data Applications. ISC 2002: 102-116 - [c6]Sergi Robles, Joan Mir, Joan Ametller, Joan Borrell:
Implementation of Secure Architectures for Mobile Agents in MARISM-A. MATA 2002: 182-192 - 2001
- [c5]Sergi Robles, Joan Borrell, John Bigham, Laurissa N. Tokarchuk, Laurie G. Cuthbert:
Design of a trust model for a secure multi-agent marketplace. Agents 2001: 77-78 - [c4]Joan Mir, Joan Borrell:
Protecting General Flexible Itineraries of Mobile Agents. ICISC 2001: 382-396 - 2000
- [j3]Andreu Riera, Josep Rifà, Joan Borrell:
Efficient construction of vote-tags to allow open objection to the tally in electronic elections. Inf. Process. Lett. 75(5): 211-215 (2000)
1990 – 1999
- 1999
- [c3]Andreu Riera, Joan Borrell:
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes. NDSS 1999 - 1997
- [c2]Andreu Riera, Joan Borrell, Josep Rifà:
Large scale elections by coordinating electoral colleges. SEC 1997: 349-362 - 1996
- [j2]Joan Borrell, Josep Rifà:
An implementable secure voting scheme. Comput. Secur. 15(4): 327-338 (1996) - 1995
- [j1]Josep Rifà, Joan Borrell:
A Fast Algorithm To Compute Irreducible and Primitive Polynomials in Finite Fields. Math. Syst. Theory 28(1): 13-20 (1995) - 1991
- [c1]Josep Rifà, Joan Borrell:
Improving the Time Complexity of the Computation of Irreducible and Primitive Polynomials in Finite Fields. AAECC 1991: 352-359
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint