- Matemàtica
Departamento
![Foto de - Matemàtica](/img/noimage.png)
![Foto de Universitat Rovira i Virgili](/img/noimage_org.png)
Universitat Rovira i Virgili
Tarragona, EspañaPublicaciones en colaboración con investigadores/as de Universitat Rovira i Virgili (57)
2023
-
Analysis of the emotional vocabulary of primary education students
Revista CES Psicologia, Vol. 16, Núm. 2, pp. 163-175
2019
-
Construction of extremal mixed graphs of diameter two
Discrete Applied Mathematics, Vol. 263, pp. 204-211
2017
-
The Degree/Diameter Problem for mixed abelian Cayley graphs
Discrete Applied Mathematics, Vol. 231, pp. 190-197
2016
-
The degree/diameter problem in maximal planar bipartite graphs
Electronic Journal of Combinatorics, Vol. 23, Núm. 1
2011
-
A chebyshev criterion for abelian integrals
Transactions of the American Mathematical Society, Vol. 363, Núm. 1, pp. 109-129
2010
-
Bifurcation of critical periods from Pleshkan's isochrones
Journal of the London Mathematical Society, Vol. 81, Núm. 1, pp. 141-160
2009
-
Aggregation of trustworthy announcement messages in vehicular ad hoc networks
IEEE Vehicular Technology Conference
-
Secure many-to-one communications in wireless sensor networks
Sensors, Vol. 9, Núm. 7, pp. 5324-5338
-
Trustworthy privacy-preserving car-generated announcements in vehicular Ad Hoc networks
IEEE Transactions on Vehicular Technology, Vol. 58, Núm. 4, pp. 1876-1886
2008
-
A polynomial-time approximation to optimal multivariate microaggregation
Computers and Mathematics with Applications, Vol. 55, Núm. 4, pp. 714-732
-
An anonymity model achievable via microaggregation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Efficient remote data possession checking in critical information infrastructures
IEEE Transactions on Knowledge and Data Engineering
-
Location privacy via unlinkability: An alternative to cloaking and perturbation
ACM International Conference Proceeding Series
-
Micro-aggregation-based heuristics for p-sensitive k-anonymity: One step beyond
ACM International Conference Proceeding Series
-
Privacy homomorphisms for social networks with private relationships
Computer Networks, Vol. 52, Núm. 15, pp. 3007-3016
-
Secure and scalable many-to-one symbol transmission for sensor networks
Computer Communications, Vol. 31, Núm. 10, pp. 2408-2413
2007
-
Advances in smart cards
Computer Networks, Vol. 51, Núm. 9, pp. 2219-2222
-
An incentive-based system for information providers over peer-to-peer mobile ad-hoc networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Scalability and security in biased many-to-one communication
Computer Networks, Vol. 51, Núm. 1, pp. 1-13
-
Secure and private incentive-based advertisement dissemination in mobile ad hoc networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)