| Cryptocurrency networks: A new P2P paradigm S Delgado-Segura, C Pérez-Solà, J Herrera-Joancomartí, ... Mobile Information Systems 2018 (1), 2159082, 2018 | 89 | 2018 |
| An uncoercible verifiable electronic voting protocol A Riera, J Borrell, J Rifa Global IT security (Vienna, Budapest, 31 August-2 September 1998), 206-215, 1998 | 41 | 1998 |
| Decentralized publish-subscribe system to prevent coordinated attacks via alert correlation J Garcia, F Autrel, J Borrell, S Castillo, F Cuppens, G Navarro International Conference on Information and Communications Security, 223-235, 2004 | 39 | 2004 |
| Agent migration over FIPA ACL messages J Ametller, S Robles, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2003 | 38 | 2003 |
| Sustainable sound absorbers from fruit stones waste JMG Borrell, EJ Sanchis, JS Alcaraz, IM Belda Applied Acoustics 161, 107174, 2020 | 36 | 2020 |
| Efficient broadcast in opportunistic networks using optimal stopping theory C Borrego, J Borrell, S Robles Ad Hoc Networks 88, 5-17, 2019 | 36 | 2019 |
| Protecting general flexible itineraries of mobile agents J Mir, J Borrell International Conference on Information Security and Cryptology, 382-396, 2001 | 36 | 2001 |
| Securing the itinerary of mobile agents through a non-repudiation protocol J Borrell, S Robles, J Serra, A Riera Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999 | 36 | 1999 |
| Fuzzy role-based access control C Martínez-García, G Navarro-Arribas, J Borrell Information processing letters 111 (10), 483-487, 2011 | 35 | 2011 |
| Protecting mobile agent itineraries J Mir, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2003 | 35 | 2003 |
| Hey, influencer! Message delivery to social central nodes in social opportunistic networks C Borrego, J Borrell, S Robles Computer Communications 137, 81-91, 2019 | 34 | 2019 |
| Agent mobility architecture based on IEEE-FIPA standards J Cucurull, R Martí, G Navarro-Arribas, S Robles, B Overeinder, J Borrell Computer Communications 32 (4), 712-729, 2009 | 32 | 2009 |
| Promoting the development of secure mobile agent applications C Garrigues, S Robles, J Borrell, G Navarro-Arribas Journal of Systems and Software 83 (6), 959-971, 2010 | 29 | 2010 |
| Protecting mobile agents from external replay attacks C Garrigues, N Migas, W Buchanan, S Robles, J Borrell Journal of Systems and Software 82 (2), 197-206, 2009 | 29 | 2009 |
| Practical mental poker without a TTP based on homomorphic encryption J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell International Conference on Cryptology in India, 280-294, 2003 | 25 | 2003 |
| Design of a trust model for a secure multi-agent marketplace S Robles, J Borrell, J Bigham, L Tokarchuk, L Cuthbert Proceedings of the fifth international conference on Autonomous agents, 77-78, 2001 | 25 | 2001 |
| Efficient construction of vote-tags to allow open objection to the tally in electronic elections A Riera, J Rifà, J Borrell Information Processing Letters 75 (5), 211-215, 2000 | 23 | 2000 |
| Constrained delegation in XML-based access control and digital rights management standards G Navarro, BS Firozabadi, E Rissanen, J Borrell CNIS03, Special Session on Architectures and Languages for Digital Rights …, 2003 | 21 | 2003 |
| Securing dynamic itineraries for mobile agent applications C Garrigues, S Robles, J Borrell Journal of Network and Computer Applications 31 (4), 487-508, 2008 | 20 | 2008 |
| Implementation of secure architectures for mobile agents in marism-a S Robles, J Mir, J Ametller, J Borrell International Workshop on Mobile Agents for Telecommunication Applications …, 2002 | 20 | 2002 |