Jordi Castellà-Roca

According to our database1, Jordi Castellà-Roca
  • authored at least 62 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Time-based low emission zones preserving drivers' privacy.
Future Generation Comp. Syst., 2018

2017
Design and Performance Evaluation of Two Approaches to Obtain Anonymity in Transferable Electronic Ticketing Schemes.
MONET, 2017

Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban Areas.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing.
Security and Communication Networks, 2016

Working at the web search engine side to generate privacy-preserving user profiles.
Expert Syst. Appl., 2016

Building Privacy-Preserving Search Engine Query Logs for Data Monetization.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Multi-party Methods for Privacy-Preserving Web Search: Survey and Contributions.
Proceedings of the Advanced Research in Data Privacy, 2015

Electronic Ticketing: Requirements and Proposals Related to Transport.
Proceedings of the Advanced Research in Data Privacy, 2015

Efficient group signatures for privacy-preserving vehicular networks.
Telecommunication Systems, 2015

Design of a P2P network that protects users' privacy in front of Web Search Engines.
Computer Communications, 2015

2014
Distributed system for private web search with untrusted partners.
Computer Networks, 2014

Electronic Road Pricing System for Low Emission Zones to Preserve Driver Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2014

Semantic Anonymisation of Set-valued Data.
Proceedings of the ICAART 2014, 2014

Privacy-Preserving Electronic Toll System with Dynamic Pricing for Low Emission Zones.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

2013
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines.
Inf. Sci., 2013

Utility preserving query log anonymization via semantic microaggregation.
Inf. Sci., 2013

A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users.
Comput. J., 2013

Preserving the User's Privacy in Social Networking Sites.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Anonymous and Transferable Electronic Ticketing Scheme.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Using Search Results to Microaggregate Query Logs Semantically.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A trustworthy database for privacy-preserving video surveillance.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Preventing automatic user profiling in Web 2.0 applications.
Knowl.-Based Syst., 2012

User k-anonymity for privacy preserving data mining of query logs.
Inf. Process. Manage., 2012

A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability.
IEICE Transactions, 2012

A survey of electronic ticketing applied to transport.
Computers & Security, 2012

Study on poll-site voting and verification systems.
Computers & Security, 2012

Single-party private web search.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Using Profiling Techniques to Protect the User's Privacy in Twitter.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

Short-Term Linkable Group Signatures with Categorized Batch Verification.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2011
Exploiting social networks to provide privacy in personalized web search.
Journal of Systems and Software, 2011

Multi-party Private Web Search with Untrusted Partners.
Proceedings of the Security and Privacy in Communication Networks, 2011

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections.
Proceedings of the Foundations and Practice of Security, 2011

Improving Query Delay in Private Web Search.
Proceedings of the 2011 International Conference on P2P, 2011

2010
Using social networks to distort users' profiles generated by web search engines.
Computer Networks, 2010

Semantic Microaggregation for the Anonymization of Query Logs.
Proceedings of the Privacy in Statistical Databases, 2010

An electronic and secure automatic fare collection system with revocable anonymity for users.
Proceedings of the MoMM'2010, 2010

Verification Systems for Electronic Voting: A Survey.
Proceedings of the Electronic Voting 2010, 2010

E-Ticketing Scheme for Mobile Devices with Exculpability.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Secure and Scalable RFID Authentication Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Secure Many-to-One Communications in Wireless Sensor Networks.
Sensors, 2009

h(k)-private information retrieval from privacy-uncooperative queryable databases.">h(k)-private information retrieval from privacy-uncooperative queryable databases.
Online Information Review, 2009

Preserving user's privacy in web search engines.
Computer Communications, 2009

2007
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions.
Proceedings of the The Second International Conference on Availability, 2007

2006
Watermarking Numerical Data in the Presence of Noise.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2006

SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

On the Security of a Repaired Mental Poker Protocol.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Privacy homomorphisms for e-gambling and mental poker.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Protection of Components Based on a Smart-Card Enhanced Security Module.
Proceedings of the Critical Information Infrastructures Security, 2006

A Smart Card-Based Mental Poker System.
Proceedings of the Smart Card Research and Advanced Applications, 2006

A Secure E-Exam Management System.
Proceedings of the The First International Conference on Availability, 2006

2005
Dropout-Tolerant TTP-Free Mental Poker.
Proceedings of the Trust, 2005

Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Digital Chips for an On-Line Casino.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
On the Security of Noise Addition for Privacy in Statistical Databases.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

A Secure Electronic Examination Protocol using Wireless Networks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

On the Security of an Efficient TTP-Free Mental Poker Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Practical Mental Poker Without a TTP Based on Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2003

2000
A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000


  Loading...