Jose L. Muñoz

Orcid: 0000-0001-6442-437X

According to our database1, Jose L. Muñoz authored at least 84 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
eSTARK: extending STARKs with arguments.
Des. Codes Cryptogr., November, 2024

Scalability limitations of Kademlia DHTs when enabling Data Availability Sampling in Ethereum.
CoRR, 2024

Can We Run Our Ethereum Nodes at Home?
IEEE Access, 2024

2023
Circom: A Circuit Description Language for Building Zero-Knowledge Applications.
IEEE Trans. Dependable Secur. Comput., 2023

Autopsy of Ethereum's Post-Merge Reward System.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Unveiling Ethereum's Hidden Centralization Incentives: Does Connectivity Impact Performance?
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
New Privacy Practices for Blockchain Software.
IEEE Softw., 2022

PlonKup: Reconciling PlonK with plookup.
IACR Cryptol. ePrint Arch., 2022

RapidUp: Multi-Domain Permutation Protocol for Lookup Tables.
IACR Cryptol. ePrint Arch., 2022

Data Marketplaces with a Free Sampling Service.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
Invoice Factoring Registration Based on a Public Blockchain.
IEEE Access, 2021

2020
An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications.
IEEE Access, 2020

2018
Privacy risk analysis in the IoT domain.
Proceedings of the 2018 Global Internet of Things Summit, 2018

2017
Implementation and testing of IPv6 transition mechanisms.
Proceedings of the 9th IEEE Latin-American Conference on Communications, 2017

2016
On the Road to Secure and Privacy-Preserving IoT Ecosystems.
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016

2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015

A model for revocation forecasting in public-key infrastructures.
Knowl. Inf. Syst., 2015

Evaluation of Cryptographic Capabilities for the Android Platform.
Proceedings of the Future Network Systems and Security - First International Conference, 2015

2014
MHT-Based Mechanism for Certificate Revocation in VANETs.
Proceedings of the Wireless Networking for Moving Objects, 2014

RIAPPA: a Robust Identity Assignment Protocol for P2P overlays.
Secur. Commun. Networks, 2014

Vespa: Emulating Infotainment Applications in Vehicular Networks.
IEEE Pervasive Comput., 2014

Cross-layer packet scheduler for QoS support over Digital Video Broadcasting-Second Generation broadband satellite systems.
Int. J. Commun. Syst., 2014

A Simple Closed-Form Approximation for the Packet Loss Rate of a TCP Connection Over Wireless Links.
IEEE Commun. Lett., 2014

PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks.
Comput. Stand. Interfaces, 2014

Certificate Revocation List Distribution System for the KAD Network.
Comput. J., 2014

2013
VSPLIT: A Cross-Layer Architecture for V2I TCP Services Over 802.11.
Mob. Networks Appl., 2013

BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013

COACH: COllaborative certificate stAtus CHecking mechanism for VANETs.
J. Netw. Comput. Appl., 2013

Deploying Internet Protocol Security in satellite networks using Transmission Control Protocol Performance Enhancing Proxies.
Int. J. Satell. Commun. Netw., 2013

Performance evaluation of selected Transmission Control Protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS.
Int. J. Commun. Syst., 2013

Secure handoffs for V2I communications in 802.11 networks.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

A Cross-layer architecture for DVB-S2 Broadband Satellite systems with QoS support.
Proceedings of the European Wireless 2013, 2013

2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012

QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems.
EURASIP J. Wirel. Commun. Netw., 2012

Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012

XPLIT: A cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM.
Comput. Networks, 2012

DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks.
Ad Hoc Networks, 2012

RAR: Risk Aware Revocation Mechanism for Vehicular Networks.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Toward Revocation Data Handling Efficiency in VANETs.
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012

Analysis of Inter-RSU Beaconing Interference in VANETs.
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012

On the Self-similarity Nature of the Revocation Data.
Proceedings of the Information Security - 15th International Conference, 2012

Impact of the Revocation Service in PKI Prices.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs.
J. Netw. Comput. Appl., 2011

Adaptive Packet Scheduling for the Support of QoS over DVB-S2 Satellite Systems.
Proceedings of the Wired/Wireless Internet Communications, 2011

Analysis of TCP variants over a QoS DVB-S2 system.
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011

2010
PREON: An efficient cascade revocation mechanism for delegation paths.
Comput. Secur., 2010

RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010

2009
Certificate status validation in mobile ad hoc networks.
IEEE Wirel. Commun., 2009

Design and implementation of a lightweight online certificate validation service.
Telecommun. Syst., 2009

ad hoc networks.">A review of trust modeling in ad hoc networks.
Internet Res., 2009

PKIX Certificate Status in Hybrid MANETs.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

Cross-layer architecture for TCP splitting in the return channel over satellite networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

It's Like Deja-Vu All over Again ... Again.
Proceedings of the 2009 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2009

2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008

Surework: a super-peer reputation framework for p2p networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

2006
Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Gener. Comput., 2006

Secure brokerage mechanisms for mobile electronic commerce.
Comput. Commun., 2006

2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005

Analysis of peer-to-peer distributed reputation schemes.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

2004
Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec., 2004

Reducing the Communication Overhead of an Offline Revocation Dictionary.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

Punishing manipulation attacks in mobile agent systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

CERVANTES - A Certificate Validation Test-Bed.
Proceedings of the Public Key Infrastructure, 2004

2003
Desing and Evaluation of Certificate Revocation Systems.
PhD thesis, 2003

E-MHT. An Efficient Protocol for Certificate Status Checking.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A Certificate Status Checking Protocol for the Authenticated Dictionary.
Proceedings of the Computer Network Security, 2003

Efficient Offline Certificate Revocation.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
Proceedings of the Web Engineering, International Conference, 2003

Protocols for Malicious Host Revocation.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation of Revocation Systems with a JAVA Test-bed.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Adaptive computing: what can it do, where can it go?
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

Roles of funding agencies in technology-driven economic development.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

DARPA's adaptive computing systems program.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2000
Guest Editors' Introduction: Configurable Computing.
IEEE Des. Test Comput., 2000


  Loading...