The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Josep Pegueroles: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Juan Vera del Campo, Josep Pegueroles, Miguel Soriano
    Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:148-155 [Conf]
  2. Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella
    Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. [Citation Graph (0, 0)][DBLP]
    GCC (1), 2003, pp:875-882 [Conf]
  3. Jose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano
    Security Issues in Virtual Grid Environments. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:174-178 [Conf]
  4. Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano
    A Practical Solution for Distribution Rights Protection in Multicast Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:527-536 [Conf]
  5. Josep Pegueroles, Francisco Rico-Novella
    Enabling Secure Multicast Using a New Java LKH Rekeying Tool. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:293-294 [Conf]
  6. Josep Pegueroles, Francisco Rico-Novella
    Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:815-820 [Conf]
  7. Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano
    Multimedia Copyright Protection Platform Demonstrator. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:411-414 [Conf]
  8. Cristina Satizábal, Jordi Forné, Juan Hernández-Serrano, Josep Pegueroles
    Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2006, pp:485-496 [Conf]
  9. Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez
    Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:316-319 [Conf]
  10. Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano
    Energy Efficiency of Load Balancing in MANET Routing Protocols. [Citation Graph (0, 0)][DBLP]
    SNPD, 2005, pp:476-483 [Conf]
  11. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès
    Reducing the Communication Overhead of an Offline Revocation Dictionary. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:269-278 [Conf]
  12. Luis Zarza, Josep Pegueroles, Miguel Soriano
    Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:708-712 [Conf]
  13. Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano
    Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:526-539 [Conf]
  14. Cristina Satizábal, Juan Hernández-Serrano, Jordi Forné, Josep Pegueroles
    Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:7, pp:1498-1512 [Journal]

  15. Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. [Citation Graph (, )][DBLP]


  16. SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002