The SCEAS System
Navigation Menu

Search the dblp DataBase


Jordi Herrera-Joancomartí: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa
    A Secure E-Exam Management System. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:864-871 [Conf]
  2. Jordi Castellà-Roca, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí, Jordi Planes
    A Performance Comparison of Java Cards for Micropayment Implementation. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:19-38 [Conf]
  3. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Efficient Smart-Card Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:221-228 [Conf]
  4. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:226-238 [Conf]
  5. Helena Rifà-Pous, Jordi Herrera-Joancomartí
    Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. [Citation Graph (0, 0)][DBLP]
    CNSR, 2007, pp:372-380 [Conf]
  6. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2004, pp:449-452 [Conf]
  7. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:427-440 [Conf]
  8. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spending Programs: A Tool for Flexible Micropayments. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:1-13 [Conf]
  9. Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:44-53 [Conf]
  10. Jordi Herrera-Joancomartí, Julià Minguillón, David Megías
    A family of image watermarking schemes based on lossy compression. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:559-563 [Conf]
  11. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Simple Collusion-Secure Fingerprinting Schemes for Images. [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:128-132 [Conf]
  12. Jordi Herrera-Joancomartí, Josep Prieto-Blázquez
    A Personal Authentication Scheme Using Mobile Technology. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:253-257 [Conf]
  13. Jordi Herrera-Joancomartí, Josep Prieto-Blázquez, Jordi Castellà-Roca
    A Secure Electronic Examination Protocol using Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:263-268 [Conf]
  14. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    Robust Frequency Domain Audio Watermarking: A Tuning Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:244-258 [Conf]
  15. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. [Citation Graph (0, 8)][DBLP]
    SIGMOD Record, 1998, v:27, n:4, pp:62-67 [Journal]
  16. Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí
    Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:1-40 [Journal]
  17. Helena Rifà-Pous, Jordi Herrera-Joancomartí
    An Interdomain PKI Model Based on Trust Lists. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:49-64 [Conf]
  18. Helena Rifà-Pous, Jordi Herrera-Joancomartí
    A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES). [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2007, pp:281-293 [Conf]
  19. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    An audio watermarking scheme robust against stereo attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:206-213 [Conf]

  20. JXTA Security in Mobile Constrained Devices. [Citation Graph (, )][DBLP]

  21. Collaborative group membership and access control for JXTA. [Citation Graph (, )][DBLP]

  22. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. [Citation Graph (, )][DBLP]

  23. Maintaining Unlinkability in Group Based P2P Environments. [Citation Graph (, )][DBLP]

  24. Persistent Interoperable Security for JXTA Advertisements. [Citation Graph (, )][DBLP]

  25. A Security Layer for JXTA Core Protocols. [Citation Graph (, )][DBLP]

  26. Preserving user's privacy in web search engines. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002