The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jose L. Muñoz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Using OCSP to Secure Certificate-Using Transactions in M-commerce. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:280-292 [Conf]
  2. Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:927-936 [Conf]
  3. Jose L. Muñoz, Jordi Forné, Juan C. Castro
    Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:511-518 [Conf]
  4. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra
    Evaluation of Revocation Systems with a JAVA Test-bed. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:450-454 [Conf]
  5. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    CERVANTES - A Certificate Validation Test-Bed. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:28-42 [Conf]
  6. Jose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano
    Security Issues in Virtual Grid Environments. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:174-178 [Conf]
  7. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Protocols for Malicious Host Revocation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:191-201 [Conf]
  8. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:289-292 [Conf]
  9. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:251-256 [Conf]
  10. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:238-243 [Conf]
  11. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. [Citation Graph (0, 0)][DBLP]
    MATA, 2003, pp:286-295 [Conf]
  12. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Detecting and Proving Manipulation Attacks in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:224-233 [Conf]
  13. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Efficient Offline Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    MIPS, 2003, pp:319-330 [Conf]
  14. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    A Certificate Status Checking Protocol for the Authenticated Dictionary. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:255-266 [Conf]
  15. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès
    Reducing the Communication Overhead of an Offline Revocation Dictionary. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:269-278 [Conf]
  16. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey
    Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:119-127 [Conf]
  17. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    E-MHT. An Efficient Protocol for Certificate Status Checking. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:410-424 [Conf]
  18. Manuel Rodriguez-Perez, Oscar Esparza, Jose L. Muñoz
    Analysis of peer-to-peer distributed reputation schemes. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  19. Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné
    Secure brokerage mechanisms for mobile electronic commerce. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:12, pp:2308-2321 [Journal]
  20. Fadi J. Kurdahi, Nader Bagherzadeh, Peter Athanas, Jose L. Muñoz
    Guest Editors' Introduction: Configurable Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Design & Test of Computers, 2000, v:17, n:1, pp:17-19 [Journal]
  21. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Certificate revocation system implementation based on the Merkle hash tree. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:110-124 [Journal]

  22. It's Like Deja-Vu All over Again ... Again. [Citation Graph (, )][DBLP]


  23. Surework: a super-peer reputation framework for p2p networks. [Citation Graph (, )][DBLP]


  24. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. [Citation Graph (, )][DBLP]


  25. PKIX Certificate Status in Hybrid MANETs. [Citation Graph (, )][DBLP]


  26. RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks. [Citation Graph (, )][DBLP]


  27. PREON: An efficient cascade revocation mechanism for delegation paths. [Citation Graph (, )][DBLP]


  28. H-OCSP: A protocol to reduce the processing burden in online certificate status validation. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002