Francesc Sebé

Orcid: 0000-0002-7217-5227

According to our database1, Francesc Sebé authored at least 73 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.
Cryptogr., March, 2024

2023
Mobile terrestrial laser scanner <i>vs</i>. UAV photogrammetry to estimate woody crop canopy parameters - Part 2: Comparison for different crops and training systems.
Comput. Electron. Agric., September, 2023

Mobile terrestrial laser scanner vs. UAV photogrammetry to estimate woody crop canopy parameters - Part 1: Methodology and comparison in vineyards.
Comput. Electron. Agric., September, 2023

2022
An anonymous and unlinkable electronic toll collection system.
Int. J. Inf. Sec., 2022

2021
An efficient privacy-preserving pay-by-phone system for regulated parking areas.
Int. J. Inf. Sec., 2021

2020
Measuring privacy in smart metering anonymized data.
CoRR, 2020

A Construction for Providing Reusability to Mobile Phone-Based e-Tickets.
IEEE Access, 2020

2019
Repairing an aggregation-based smart metering system.
Int. J. Inf. Sec., 2019

Parking Tickets for Privacy-Preserving Pay-by-Phone Parking.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

2017
A Privacy-Preserving Pay-by-Phone Parking System.
IEEE Trans. Veh. Technol., 2017

A privacy-preserving reputation system with user rewards.
J. Netw. Comput. Appl., 2017

Iterated endorsement deduction and ranking.
Computing, 2017

2016
A hybrid approach to vector-based homomorphic tallying remote voting.
Int. J. Inf. Sec., 2016

Endorsement deduction and ranking in social networks.
Comput. Commun., 2016

Efficient smart metering based on homomorphic encryption.
Comput. Commun., 2016

2015
Synthetic generation of social network data with endorsements.
J. Simulation, 2015

Elliptic Curve Array Ballots for Homomorphic Tallying Elections.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

2014
MPI-based implementation of an enhanced algorithm to solve the LPN problem in a memory-constrained environment.
Parallel Comput., 2014

Constructing credential-based E-voting systems from offline E-coin protocols.
J. Netw. Comput. Appl., 2014

Triangle randomization for social network data anonymization.
Ars Math. Contemp., 2014

An Efficient Homomorphic E-Voting System over Elliptic Curves.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

2013
Privacy preserving release of blogosphere data in the presence of search engines.
Inf. Process. Manag., 2013

Degree Sequences of PageRank Uniform Graphs and Digraphs with Prime Outdegrees.
Proceedings of the Combinatorial Algorithms - 24th International Workshop, 2013

Blind Certificates for Secure Electronic Voting.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2011
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks.
Int. J. Inf. Sec., 2011

Verifiable Encrypted Redundancy for Mix-Type Remote Electronic Voting.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

2010
Simple and efficient hash-based verifiable mixing for remote electronic voting.
Comput. Commun., 2010

WLC Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Secure Many-to-One Communications in Wireless Sensor Networks.
Sensors, 2009

Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

2008
Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng., 2008

Secure and scalable many-to-one symbol transmission for sensor networks.
Comput. Commun., 2008

Privacy homomorphisms for social networks with private relationships.
Comput. Networks, 2008

A polynomial-time approximation to optimal multivariate microaggregation.
Comput. Math. Appl., 2008

An Anonymity Model Achievable Via Microaggregation.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

2007
Secure many-to-one symbol transmission for implementation on smart cards.
Comput. Networks, 2007

Scalability and security in biased many-to-one communication.
Comput. Networks, 2007

Advances in smart cards.
Comput. Networks, 2007

An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures.
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006

Efficient multivariate data-oriented microaggregation.
VLDB J., 2006

Watermarking Numerical Data in the Presence of Noise.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2006

Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation.
Proceedings of the Privacy in Statistical Databases, 2006

On the Security of a Repaired Mental Poker Protocol.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Privacy homomorphisms for e-gambling and mental poker.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

A Smart Card-Based Mental Poker System.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata.
Data Min. Knowl. Discov., 2005

Dropout-Tolerant TTP-Free Mental Poker.
Proceedings of the Trust, 2005

Noise-Robust Watermarking for Numerical Datasets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

2004
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Outlier Protection in Continuous Microdata Masking.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

On the Security of Noise Addition for Privacy in Statistical Databases.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

Secure Reverse Communication in a Multicast Tree.
Proceedings of the NETWORKING 2004, 2004

Secure Large-Scale Bingo.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Computer Skills Training to (Middle-aged) Adults: Problems and Program.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Secure Many-to-One Transmission of q-ary Symbols.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

2003
Transparent Protection of Data.
PhD thesis, 2003

Collusion-secure and cost-effective detection of unlawful multimedia redistribution.
IEEE Trans. Syst. Man Cybern. Part C, 2003

MINPAY: a Multi-device INternet PAY-as-you-watch system.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Practical Asymmetric Fingerprinting with a TTP.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

Short 3-Secure Fingerprinting Codes for Copyright Protection.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Watermarking for Multilevel Access to Statistical Databases.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.
Proceedings of the Information Security, 4th International Conference, 2001

Asynchronous Large-Scale Certification Based on Certificate Verification Trees.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000


  Loading...