Name
Affiliation
Papers
VANESA DAZA
Universitat Rovira i Virgili, Tarragona
41
Collaborators
Citations 
PageRank 
63
211
20.62
Referers 
Referees 
References 
466
540
379
Search Limit
100540
Title
Citations
PageRank
Year
New Privacy Practices for Blockchain Software00.342022
Clover: An anonymous transaction relay protocol for the bitcoin P2P network00.342022
Leveled Multikey FHE with constant-size ciphertexts from RLWE.00.342022
AToM: Active topology monitoring for the bitcoin peer-to-peer network00.342022
Offline Scaling of IoT Devices in IOTA Blockchain00.342022
SoK: Network-Level Attacks on the Bitcoin P2P Network00.342022
FairTraDEX: A Decentralised Exchange Preventing Value Extraction.00.342022
ZPiE: Zero-Knowledge Proofs in Embedded Systems00.342021
Sans: Self-Sovereign Authentication For Network Slices20.412020
Improving Bitcoin Transaction Propagation by Leveraging Unreachable Nodes00.342020
Leveraging Bitcoin Testnet for Bidirectional Botnet Command and Control Systems00.342020
LASER: Lightweight And SEcure Remote keyless entry protocol (Extended version).00.342019
Connect: Contextual Name Discovery For Blockchain-Based Services In The Iot20.372017
CoLLIDE: CLoud Latency-based IDEntification.00.342017
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions.00.342017
FRoDO: Fraud Resilient Device for Off-line micropayments10.362016
Exploring the Effectiveness of Video Viewing in an Introductory x-MOOC of Algebra.00.342015
A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs).00.342015
Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions40.472014
SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro Payments.00.342014
Queueing Analysis in Multiuser Multi-Packet Transmission Systems Using Spatial Multiplexing20.372012
Buffer sizing in TxSDMA systems10.362011
An Approximate Queueing Model for Multi-Rate Multi-User MIMO Systems40.462011
Flaws in some self-healing key distribution schemes with revocation40.462009
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks561.882009
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts90.682008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes261.312008
On the Computational Security of a Distributed Key Distribution Scheme20.392008
Extensions of access structures and their cryptographic applications00.342008
A distributed architecture for scalable private RFID tag identification251.332007
On Dynamic Distribution of Private Keys over MANETs50.522007
Cryptographic techniques for mobile ad-hoc networks40.452007
CCA2-secure threshold broadcast encryption with shorter ciphertexts210.942007
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks00.342007
On codes, matroids and secure multi-party computation from linear secret sharing schemes211.192005
Protocols useful on the Internet from distributed signature schemes30.372004
Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures90.502004
Some Protocols Useful on the Internet from Threshold Signature Schemes20.382003
Constructing general dynamic group key distribution schemes with decentralized user join50.602003
A Distributed and Computationally Secure Key Distribution Scheme30.392002
Some Applications of Threshold Signature Schemes to Distributed Protocols.00.342002