default search action
Llorenç Huguet i Rotger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]María Magdalena Payeras Capellà, Macià Mut Puigserver, Miquel A. Cabot-Nadal, Llorenç Huguet i Rotger:
Blockchain-Based Confidential Multiparty Contract Signing Protocol Without TTP Using Elliptic Curve Cryptography. Comput. J. 65(10): 2755-2768 (2022) - 2020
- [j10]María Magdalena Payeras Capellà, Macià Mut Puigserver, Pau Conejero-Alberola, Jordi Castellà-Roca, Llorenç Huguet i Rotger:
Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services. Comput. J. 63(8): 1168-1193 (2020)
2010 – 2019
- 2019
- [j9]M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board. IEEE Access 7: 31330-31341 (2019) - [j8]M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Deployment and performance evaluation of mobile multicoupon solutions. Int. J. Inf. Sec. 18(1): 101-124 (2019) - 2018
- [j7]Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Llorenç Huguet i Rotger:
A survey on electronic coupons. Comput. Secur. 77: 106-127 (2018) - [j6]Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Gerard Draper-Gil, Llorenç Huguet i Rotger:
Optimistic protocol for certified electronic mail with verifiable TTP. Comput. Stand. Interfaces 57: 20-30 (2018) - [c34]María Magdalena Payeras Capellà, Macià Mut Puigserver, Llorenç Huguet i Rotger:
Anonymity in Secure Access to Integrated Touristic Services Including Payment. SIN 2018: 5:1-5:8 - 2015
- [j5]Andreu Pere Isern-Deyà, Llorenç Huguet i Rotger, Magdalena Payeras-Capellà, Macià Mut Puigserver:
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform. Int. J. Inf. Sec. 14(4): 335-345 (2015) - 2013
- [j4]Santos González, Llorenç Huguet i Rotger, Consuelo Martínez, Hugo Villafañe:
Discrete logarithm like problems and linear recurring sequences. Adv. Math. Commun. 7(2): 187-195 (2013) - [j3]Andreu Pere Isern-Deyà, Magdalena Payeras-Capellà, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Micropayment proposal with formal verification using coloured Petri nets and performance analysis on the Android platform. Int. J. Bus. Intell. Data Min. 8(1): 74-104 (2013) - 2012
- [c33]Andreu Pere Isern-Deyà, Magdalena Payeras-Capellà, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Micropayment scheme implementation on the Android platform with performance evaluation. MoMM 2012: 64-73 - [c32]M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger:
Anonymity and Transferability for an Electronic Bank Check Scheme. TrustCom 2012: 427-435 - 2011
- [c31]Antonio Urbano Fullana, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, María Francisca Hinarejos Campos, Llorenç Huguet i Rotger:
Cross-Layer Secrecy Design on TCP/IP and 802.11 for Energy Saving. NTMS 2011: 1-5
2000 – 2009
- 2009
- [c30]Magdalena Payeras-Capellà, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
No Author Based Selective Receipt in an Efficient Certified E-mail Protocol. PDP 2009: 387-392 - [c29]Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. SecureComm 2009: 101-120 - 2008
- [c28]Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Replay Attack in a Fair Exchange Protocol. ACNS 2008: 174-187 - 2006
- [c27]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Achieving Fairness and Timeliness in a Previous Electronic Contract Signing Protocol. ARES 2006: 717-722 - [c26]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Solving Bao's Colluding Attack in Wang's Fair Payment Protocol. OTM Workshops (1) 2006: 460-468 - 2005
- [c25]Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Certified e-Mail Protocol with Verifiable Third Party. EEE 2005: 548-551 - [c24]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP. TrustBus 2005: 60-69 - 2004
- [c23]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. ICCSA (4) 2004: 223-232 - [c22]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic Cash. ICCSA (1) 2004: 831-840 - [c21]Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
A Voting System with Trusted Verifiable Services. ICCSA (1) 2004: 924-937 - [c20]Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
Optimality in Asynchronous Contract Signing Protocols. TrustBus 2004: 200-208 - 2003
- [c19]Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
A Fully Anonymous Electronic Payment Scheme for B2B. ICWE 2003: 76-79 - [c18]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
An Efficient Anonymous Scheme for Secure Micropayments. ICWE 2003: 80-83 - 2002
- [c17]Josep Lluís Ferrer-Gomila, Apollònia Martínez Nadal, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
A Juridical Validation of a Contract Signing Protocol. EC-Web 2002: 343-352 - [c16]Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
ITHAKI: Fair N-Transferable Anonymous Cash. ICEIS 2002: 900-907 - [c15]Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
A Realistic Protocol for Multi-party Certified Electronic Mail. ISC 2002: 210-219 - 2001
- [c14]Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
Efficient Optimistic N-Party Contract Signing Protocol. ISC 2001: 394-407 - 2000
- [c13]Macià Mut Puigserver, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger:
Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties. INFOCOM 2000: 1401-1405 - [c12]Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
An Efficient Protocol for Certified Electronic Mail. ISW 2000: 237-248
1990 – 1999
- 1995
- [c11]Alexei E. Ashikhmin, Alexander Barg, Gérard D. Cohen, Llorenç Huguet i Rotger:
Variations on Minimal Codewords in Linear Codes. AAECC 1995: 96-105 - 1993
- [c10]Gérard D. Cohen, Llorenç Huguet i Rotger, Gilles Zémor:
Bounds on generalized weights. Algebraic Coding 1993: 270-277 - 1992
- [b1]Alain Poli, Llorenç Huguet i Rotger:
Error correcting codes - theory and applications. Prentice Hall 1992, ISBN 978-0-13-284894-7, pp. I-XV, 1-512 - 1990
- [j2]Josep Domingo-Ferrer, Llorenç Huguet i Rotger:
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures. Comput. Secur. 9(2): 145-152 (1990) - [c9]Josep Domingo-Ferrer, Llorenç Huguet i Rotger:
A cryptographic tool for programs protection. EUROCODE 1990: 227-240
1980 – 1989
- 1989
- [j1]Josep M. Basart, Llorenç Huguet i Rotger:
An Approximation Algorithm for the TSP. Inf. Process. Lett. 31(2): 77-81 (1989) - [c8]Josep Domingo-Ferrer, Llorenç Huguet i Rotger:
Full Secure Key Exchange and Authentication with no Previously Shared Secrets. EUROCRYPT 1989: 665-669 - [e1]Llorenç Huguet i Rotger, Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 5th International Conference, AAECC-5, Menorca, Spain, June 15-19, 1987, Proceedings. Lecture Notes in Computer Science 356, Springer 1989, ISBN 3-540-51082-6 [contents] - 1988
- [c7]Josep Rifà, Josep M. Basart, Llorenç Huguet i Rotger:
On Completely Regular Propelinear Codes. AAECC 1988: 341-355 - [c6]J. L. Dalmau, J. A. Delgado, Llorenç Huguet i Rotger, Inma Ortuño Ortin, R. Valle:
Concatenated coding schemes for HF channels. Coding Theory and Applications 1988: 269-278 - 1986
- [c5]Josep M. Basart, Llorenç Huguet i Rotger:
From T(m) Triangular Graphs to Single-Error-Correcting Codes. AAECC 1986: 5-12 - [c4]Josep Rifà, Llorenç Huguet i Rotger:
Characterization of Completely Regular Codes through P-Polynomial Association Schemes. AAECC 1986: 157-167 - 1985
- [c3]Mercè Griera, Josep Rifà, Llorenç Huguet i Rotger:
On S-Sum-Sets and Projective Codes. AAECC 1985: 135-142 - [c2]Llorenç Huguet i Rotger, Josep Rifà, Mercè Griera:
Pseudo-Triple-Sum-Sets and Association Schemes. AAECC 1985: 143-149 - 1984
- [c1]Llorenç Huguet i Rotger, Mercè Griera:
Association schemes and difference sets defined on two weight codes. AAECC 1984: 107-111
Coauthor Index
aka: María Magdalena Payeras Capellà
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint