Name
Affiliation
Papers
JOAN ARNEDO
Estudis d'Informàtica, Multimèdia i Telecomunicació, UOC, Barcelona, Spain
48
Collaborators
Citations 
PageRank 
69
134
21.88
Referers 
Referees 
References 
290
673
386
Search Limit
100673
Title
Citations
PageRank
Year
Z Generation and Fortnite: New Ethical Paradigms in Video Games Design00.342019
The quest for a better tailoring of gameful design: An analysis of player type preferences10.352019
The use of digital games to teaching computer graphics: An open opportunity.00.342018
Effect of personalized gameful design on student engagement.10.352018
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives.00.342018
Gamification: a systematic review of design frameworks.80.652017
Open Proctor: An Academic Integrity Tool for the Open Learning Environment.00.342017
A Method for Thematic and Structural Visualization of Academic Content00.342017
Gamification of cognitive training: a crowdsourcing-inspired approach for older adults.00.342016
Designing game-like activities to engage adult learners in higher education.00.342016
A Behavioral Biometrics Based and Machine Learning Aided Framework for Academic Integrity in E-Assessment20.392016
A Literature Review of Gamification Design Frameworks281.402015
Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services.00.342015
FRAGGLE: A FRamework for AGile Gamification of Learning Experiences.10.362015
AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices.00.342015
ValID: A Trust-Based Virtual Assessment System10.362014
Anonymously accessing JXTA community services through split message forwarding.20.342013
A Study on Practices against Malware in Free Software Projects10.352013
Analysis of the Forensic Traces Left by AirPrint in Apple iOS Devices20.432013
Experimental Evaluation of Anonymous Protocols under the JXTA Middlewar00.342012
Jxtanonym: An Anonymity Layer For Jxta Services Messaging30.412012
Split Message-Based Anonymity for JXTA Applications20.382012
jxSensor: A Sensor Network Integration Layer for JXTA10.342012
Versatile iPad forensic acquisition using the Apple Camera Connection Kit40.492012
Towards secure mobile P2P applications using JXME.00.342012
An Anonymity Layer for JXTA Services00.342011
The impact of security on voip call quality00.342011
Lightweight Security for JXME-Proxied Relay Authentication00.342011
Universal, Fast Method for iPad Forensics Imaging via USB Adapter30.722011
JXTA Security in Mobile Constrained Devices10.382010
Application of JXTA-overlay platform for secure robot control40.492010
VoIP: making secure calls and maintaining high call quality30.662010
JXTA resource access control by means of advertisement encryption20.402010
XML-based security for JXTA core protocols00.342010
A Secure JXTA-Overlay Platform for Robot Control00.342010
JXTA-Overlay P2P Platform and Its Application for Robot Control00.342010
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys70.622010
A Security Layer For Jxta Core Protocols20.372009
Experimental Results and Evaluation of SmartBox Stimulation Device in a P2P E-learning System70.582009
A survey on security in JXTA applications110.782009
A Security Framework for JXTA-Overlay10.432009
A Security-Aware Approach to JXTA-Overlay Primitives10.432009
Securing a Java P2P framework: the JXTA-overlay case00.342009
Maintaining Unlinkability in Group Based P2P Environments00.342009
Persistent Interoperable Security for JXTA Advertisements90.702008
Collaborative Group Membership And Access Control For Jxta30.392008
An Integrated Structure For A Virtual Networking Laboratory201.402008
Providing a collaborative mechanism for peer group access control30.502006