dblp.uni-trier.dewww.uni-trier.de

Josep Pegueroles

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Shared Self-Organized GKM Protocol for MANETs. J. Inf. Sci. Eng. 24(6): 1629-1646 (2008)
2007
16EELuis Zarza, Josep Pegueroles, Miguel Soriano: Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. ARES 2007: 1207-1213
15EELuis Zarza, Josep Pegueroles, Miguel Soriano: Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. DEXA Workshops 2007: 708-712
14EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. ICCSA (2) 2007: 526-539
13EECristina Satizábal, Juan Hernández-Serrano, Jordi Forné, Josep Pegueroles: Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks. Computer Communications 30(7): 1498-1512 (2007)
12EEJuan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Resource Discovery System. JNW 2(1): 48-59 (2007)
2006
11EEJuan Vera del Campo, Josep Pegueroles, Miguel Soriano: Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. ARES 2006: 148-155
10EEJosep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano: A Practical Solution for Distribution Rights Protection in Multicast Environments. ICCSA (3) 2006: 527-536
9EECristina Satizábal, Jordi Forné, Juan Hernández-Serrano, Josep Pegueroles: Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. MSN 2006: 485-496
8 Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez: Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319
2005
7EEJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano: Energy Efficiency of Load Balancing in MANET Routing Protocols. SNPD 2005: 476-483
6EEMiguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomas, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano: Multimedia Copyright Protection Platform Demonstrator. iTrust 2005: 411-414
2004
5EEJose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano: Security Issues in Virtual Grid Environments. International Conference on Computational Science 2004: 174-178
4EEJose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès: Reducing the Communication Overhead of an Offline Revocation Dictionary. TrustBus 2004: 269-278
2003
3EEJosep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella: Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. GCC (1) 2003: 875-882
2EEJosep Pegueroles, Francisco Rico-Novella: Enabling Secure Multicast Using a New Java LKH Rekeying Tool. ICWE 2003: 293-294
1EEJosep Pegueroles, Francisco Rico-Novella: Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation. ISCC 2003: 815-820

Coauthor Index

1Wang Bin [3]
2Juan Vera del Campo [11] [12]
3Joan Casanellas [6]
4Oscar Esparza [4] [5]
5Marcel Fernandez [6] [10]
6Jordi Forné [4] [5] [9] [13]
7Juan Hernández-Serrano [6] [7] [9] [13] [14] [17]
8Rafael Martínez [8]
9Jose L. Muñoz [4] [5]
10Esteve Pallarès [4]
11Francisco Rico-Novella [1] [2] [3] [10]
12Cristina Satizábal [9] [13]
13Elisa Sayrol [6]
14Miguel Soriano [3] [5] [6] [7] [8] [10] [11] [12] [14] [15] [16] [17]
15Joan Tomas [6]
16Luis Zarza [8] [15] [16]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)