Jose L. Muñoz
Orcid: 0000-0001-6442-437X
According to our database1,
Jose L. Muñoz
authored at least 84 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Scalability limitations of Kademlia DHTs when enabling Data Availability Sampling in Ethereum.
CoRR, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Unveiling Ethereum's Hidden Centralization Incentives: Does Connectivity Impact Performance?
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Conference on Services Computing, 2022
2021
2020
An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications.
IEEE Access, 2020
2018
Proceedings of the 2018 Global Internet of Things Summit, 2018
2017
Proceedings of the 9th IEEE Latin-American Conference on Communications, 2017
2016
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016
2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015
Knowl. Inf. Syst., 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
2014
Proceedings of the Wireless Networking for Moving Objects, 2014
Secur. Commun. Networks, 2014
IEEE Pervasive Comput., 2014
Cross-layer packet scheduler for QoS support over Digital Video Broadcasting-Second Generation broadband satellite systems.
Int. J. Commun. Syst., 2014
A Simple Closed-Form Approximation for the Packet Loss Rate of a TCP Connection Over Wireless Links.
IEEE Commun. Lett., 2014
Comput. Stand. Interfaces, 2014
Comput. J., 2014
2013
Mob. Networks Appl., 2013
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013
J. Netw. Comput. Appl., 2013
Deploying Internet Protocol Security in satellite networks using Transmission Control Protocol Performance Enhancing Proxies.
Int. J. Satell. Commun. Netw., 2013
Performance evaluation of selected Transmission Control Protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS.
Int. J. Commun. Syst., 2013
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013
Proceedings of the European Wireless 2013, 2013
2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012
QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems.
EURASIP J. Wirel. Commun. Netw., 2012
Data Knowl. Eng., 2012
Comput. Networks, 2012
DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks.
Ad Hoc Networks, 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs.
J. Netw. Comput. Appl., 2011
Proceedings of the Wired/Wireless Internet Communications, 2011
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011
2010
Comput. Secur., 2010
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010
2009
Telecommun. Syst., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Cross-layer architecture for TCP splitting in the return channel over satellite networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009
It's Like Deja-Vu All over Again ... Again.
Proceedings of the 2009 International Conference on Engineering of Reconfigurable Systems & Algorithms, 2009
2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
2006
New Gener. Comput., 2006
2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005
2004
Int. J. Inf. Sec., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2000
Guest Editors' Introduction: Configurable Computing.
IEEE Des. Test Comput., 2000