The bitcoin P2P network JA Donet Donet, C Pérez-Sola, J Herrera-Joancomartí Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014 | 214 | 2014 |
Research and challenges on bitcoin anonymity J Herrera-Joancomartí Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2015 | 153 | 2015 |
Computational and energy costs of cryptographic algorithms on handheld devices H Rifa-Pous, J Herrera-Joancomartí Future internet 3 (1), 31-48, 2011 | 128 | 2011 |
Preserving user’s privacy in web search engines J Castellà-Roca, A Viejo, J Herrera-Joancomartí Computer Communications 32 (13-14), 1541-1551, 2009 | 122 | 2009 |
Analysis of the bitcoin utxo set S Delgado-Segura, C Pérez-Sola, G Navarro-Arribas, ... Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019 | 110 | 2019 |
A fair protocol for data trading based on Bitcoin transactions S Delgado-Segura, C Pérez-Solà, G Navarro-Arribas, ... Future Generation Computer Systems 107, 832-840, 2020 | 101 | 2020 |
Privacy in bitcoin transactions: new challenges from blockchain scalability solutions J Herrera-Joancomartí, C Pérez-Solà Modeling Decisions for Artificial Intelligence: 13th International …, 2016 | 101 | 2016 |
An integrated structure for a virtual networking laboratory J Prieto-Blázquez, J Arnedo-Moreno, J Herrera-Joancomartí IEEE transactions on Industrial Electronics 55 (6), 2334-2342, 2008 | 80 | 2008 |
A secure e-exam management system J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa First International Conference on Availability, Reliability and Security …, 2006 | 77 | 2006 |
Double-spending prevention for bitcoin zero-confirmation transactions C Pérez-Solà, S Delgado-Segura, G Navarro-Arribas, ... International Journal of Information Security 18 (4), 451-463, 2019 | 71 | 2019 |
A survey of graph-modification techniques for privacy-preserving on networks J Casas-Roma, J Herrera-Joancomartí, V Torra Artificial Intelligence Review 47, 341-366, 2017 | 70 | 2017 |
Simple collusion-secure fingerprinting schemes for images J Domingo-Ferrer, J Herrera-Joancomarti Proceedings International Conference on Information Technology: Coding and …, 2000 | 62 | 2000 |
Short collusion-secure fingerprints based on dual binary Hamming codes J Domingo-Ferrer, J Herrera-Joancomarti Electronics Letters 36 (20), 1, 2000 | 61 | 2000 |
J3Gen: A PRNG for low-cost passive RFID J Melià-Seguí, J Garcia-Alfaro, J Herrera-Joancomartí Sensors 13 (3), 3816-3830, 2013 | 60 | 2013 |
Analysis and improvement of a pseudorandom number generator for EPC Gen2 tags J Melia-Segui, J Garcia-Alfaro, J Herrera-Joancomarti Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010 | 59 | 2010 |
On the difficulty of hiding the balance of lightning network channels J Herrera-Joancomartí, G Navarro-Arribas, A Ranchal-Pedrosa, ... Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 58 | 2019 |
k-Degree anonymity and edge selection: improving data utility in large networks J Casas-Roma, J Herrera-Joancomartí, V Torra Knowledge and Information Systems 50, 447-474, 2017 | 57 | 2017 |
An algorithm for k-degree anonymity on large networks J Casas-Roma, J Herrera-Joancomartí, V Torra Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013 | 55 | 2013 |
Cryptocurrency networks: A new P2P paradigm S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ... Mobile Information Systems 2018, 1-16, 2018 | 52 | 2018 |
Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity J Dittmann, D Megias, A Lang, J Herrera-Joancomarti Transactions on Data Hiding and Multimedia Security I, 1-40, 2006 | 43 | 2006 |