Oscar Esparza
Orcid: 0000-0002-2593-0162
According to our database1,
Oscar Esparza
authored at least 69 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Evaluation of TCP Congestion Control Algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario.
Comput. Networks, February, 2024
DA2Wa: A secure pairing protocol between a DApp and a wallet for the blockchain scenario.
Comput. Commun., 2024
2022
Proceedings of the IEEE International Conference on Services Computing, 2022
2016
Proceedings of the Interoperability and Open-Source Solutions for the Internet of Things, 2016
2015
EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks.
Pervasive Mob. Comput., 2015
Knowl. Inf. Syst., 2015
Multipath TCP Architecture for Infotainment Multimedia Applications in Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
2014
Proceedings of the Wireless Networking for Moving Objects, 2014
Secur. Commun. Networks, 2014
IEEE Pervasive Comput., 2014
Cross-layer packet scheduler for QoS support over Digital Video Broadcasting-Second Generation broadband satellite systems.
Int. J. Commun. Syst., 2014
A Simple Closed-Form Approximation for the Packet Loss Rate of a TCP Connection Over Wireless Links.
IEEE Commun. Lett., 2014
Comput. Stand. Interfaces, 2014
Comput. J., 2014
2013
Mob. Networks Appl., 2013
BECSI: Bandwidth efficient certificate status information distribution mechanism for VANETs.
Mob. Inf. Syst., 2013
J. Netw. Comput. Appl., 2013
Deploying Internet Protocol Security in satellite networks using Transmission Control Protocol Performance Enhancing Proxies.
Int. J. Satell. Commun. Netw., 2013
Performance evaluation of selected Transmission Control Protocol variants over a digital video broadcasting-second generation broadband satellite multimedia system with QoS.
Int. J. Commun. Syst., 2013
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
2012
A Modeling of Certificate Revocation and Its Application to Synthesis of Revocation Traces.
IEEE Trans. Inf. Forensics Secur., 2012
QoSatAr: a cross-layer architecture for E2E QoS provisioning over DVB-S2 broadband satellite systems.
EURASIP J. Wirel. Commun. Netw., 2012
Data Knowl. Eng., 2012
Comput. Networks, 2012
DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks.
Ad Hoc Networks, 2012
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking.
Wirel. Commun. Mob. Comput., 2011
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs.
J. Netw. Comput. Appl., 2011
Proceedings of the Wired/Wireless Internet Communications, 2011
NeuroCast: Adaptive Multi-source P2P Video Streaming Application for Wireless Networks.
Proceedings of the Wired/Wireless Internet Communications, 2011
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, 2011
2010
Comput. Secur., 2010
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010
2009
Telecommun. Syst., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Cross-layer architecture for TCP splitting in the return channel over satellite networks.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009
2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
2006
New Gener. Comput., 2006
2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005
2004
Contribución a la protección de agentes móviles frente a hosts maliciosos. Detección de ataques y políticas de castigo.
PhD thesis, 2004
Int. J. Inf. Sec., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003