Josep Domingo-Ferrer

According to our database1, Josep Domingo-Ferrer
  • authored at least 285 papers between 1989 and 2017.
  • has a "Dijkstra number"2 of four.

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to privacy, security, and functionality in statistical databases".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2017

Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees.
IEEE Trans. Information Forensics and Security, 2017

Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion.
Transactions on Data Privacy, 2017

Co-Utility: Self-Enforcing protocols for the mutual benefit of participants.
Eng. Appl. of AI, 2017

Differentially Private Data Sets Based on Microaggregation and Record Perturbation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2016

Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

Co-utility - Self-enforcing collaborative protocols with mutual help.
Progress in AI, 2016

New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users.
Inf. Sci., 2016

Self-enforcing protocols via co-utile reputation management.
Inf. Sci., 2016

Utility-preserving differentially private data releases via individual ranking microaggregation.
Information Fusion, 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Generation Comp. Syst., 2016

Big Data Privacy: Challenges to Privacy Principles and Models.
Data Science and Engineering, 2016

Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees.
CoRR, 2016

Privacy-aware loyalty programs.
Computer Communications, 2016

Rank-Based Record Linkage for Re-Identification Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2016

Anonymization in the Time of Big Data.
Proceedings of the Privacy in Statistical Databases, 2016

Co-utility for digital content protection and digital forgetting.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

t-closeness through microaggregation: Strict privacy with enhanced utility preservation.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

2015
Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach.
Proceedings of the Advanced Research in Data Privacy, 2015

Selected Privacy Research Topics in the ARES Project: An Overview.
Proceedings of the Advanced Research in Data Privacy, 2015

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation.
IEEE Trans. Knowl. Data Eng., 2015

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Information Forensics and Security, 2015

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Information Forensics and Security, 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Information Forensics and Security, 2015

From t-closeness to differential privacy and vice versa in data anonymization.
Knowl.-Based Syst., 2015

A k-anonymous approach to privacy preserving collaborative filtering.
J. Comput. Syst. Sci., 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

Semantic variance: An intuitive measure for ontology accuracy evaluation.
Eng. Appl. of AI, 2015

Discrimination- and privacy-aware patterns.
Data Min. Knowl. Discov., 2015

On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search.
CoRR, 2015

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation.
CoRR, 2015

Flexible Attribute-Based Encryption Applicable to Secure E-Healthcare Records.
CoRR, 2015

Flexible and Robust Privacy-Preserving Implicit Authentication.
CoRR, 2015

From t-closeness to differential privacy and vice versa in data anonymization.
CoRR, 2015

Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms.
CoRR, 2015

New Directions in Anonymization: Permutation Paradigm, Verifiability by Subjects and Intruders, Transparency to Users.
CoRR, 2015

Privacy and Data Protection by Design - from policy to engineering.
CoRR, 2015

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015

Supplementary Materials for "How to Avoid Reidentification with Proper Anonymization".
CoRR, 2015

Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation.
CoRR, 2015

Security and privacy in unified communications: Challenges and solutions.
Computer Communications, 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Computer Communications, 2015

Flexible and Robust Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Disclosure risk assessment via record linkage by a maximum-knowledge attacker.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Co-utile Collaborative Anonymization of Microdata.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015

Co-utility: Conciliating Individual Freedom and Common Good in the Crowd Based Business Model.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Privacy-preserving distributed statistical computation to a semi-honest multi-cloud.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Enhancing data utility in differential privacy via microaggregation-based $$k$$ k -anonymity.
VLDB J., 2014

Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints.
Multimedia Syst., 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
Journal of Biomedical Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Information Security, 2014

Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
Data Min. Knowl. Discov., 2014

Group Discounts Compatible with Buyer Privacy.
CoRR, 2014

Privacy-preserving Loyalty Programs.
CoRR, 2014

Security in wireless ad-hoc networks - A survey.
Computer Communications, 2014

Distance Computation between Two Private Preference Functions.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Fair pattern discovery.
Proceedings of the Symposium on Applied Computing, 2014

Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata.
Proceedings of the Privacy in Statistical Databases, 2014

Improving the Utility of Differential Privacy via Univariate Microaggregation.
Proceedings of the Privacy in Statistical Databases, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Group Discounts Compatible with Buyer Privacy.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Privacy-Preserving Loyalty Programs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Data Anonymization.
Proceedings of the Risks and Security of Internet and Systems, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03, 2014

2013
Direct and Indirect Discrimination Prevention Methods.
Proceedings of the Discrimination and Privacy in the Information Society, 2013

Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.
IEEE Trans. Knowl. Data Eng., 2013

Optimal data-independent noise for differential privacy.
Inf. Sci., 2013

Anonymization of nominal data based on semantic marginality.
Inf. Sci., 2013

On the privacy offered by (k, δ)-anonymity.
Inf. Syst., 2013

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.
CoRR, 2013

Distributed multicast of fingerprinted content based on a rational peer-to-peer community.
Computer Communications, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

Improving the Utility of Differentially Private Data Releases via k-Anonymity.
Proceedings of the 12th IEEE International Conference on Trust, 2013

On the Connection between t-Closeness and Differential Privacy for Data Releases.
Proceedings of the SECRYPT 2013, 2013

Differential privacy via t-closeness in data publishing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Facility Location and Social Choice via Microaggregation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
IEEE Trans. Dependable Sec. Comput., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Microaggregation- and permutation-based anonymization of movement data.
Inf. Sci., 2012

Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario.
Inf. Sci., 2012

Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search.
Inf. Sci., 2012

Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios.
Information Fusion, 2012

Sensitivity-Independent differential Privacy via Prior Knowledge Refinement.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

FuturICT - The Road towards Ethical ICT
CoRR, 2012

Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes
CoRR, 2012

Predictive protocol for the scalable identification of RFID tags through collaborative readers.
Computers in Industry, 2012

Differential Privacy through Knowledge Refinement.
Proceedings of the 2012 International Conference on Privacy, 2012

Hybrid Microdata via Model-Based Clustering.
Proceedings of the Privacy in Statistical Databases, 2012

Anonymization Methods for Taxonomic Microdata.
Proceedings of the Privacy in Statistical Databases, 2012

Marginality: A Numerical Mapping for Enhanced Exploitation of Taxonomic Attributes.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

Injecting Discrimination and Privacy Awareness Into Pattern Discovery.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

A Study on the Impact of Data Anonymization on Anti-discrimination.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Probabilistic k-anonymity through microaggregation and data swapping.
Proceedings of the FUZZ-IEEE 2012, 2012

Statistical Disclosure Control
Wiley, ISBN: 978-1-1183-4821-5, 2012

2011
Microdata Masking Techniques.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A bibliometric index based on the collaboration distance between cited and citing authors.
J. Informetrics, 2011

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Co-citations and Relevance of Authors and Author Groups.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Computer Networks, 2011

Decapitation of networks with and without weights and direction: The economics of iterated attack and defense.
Computer Networks, 2011

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

Rule Protection for Indirect Discrimination Prevention in Data Mining.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Rational enforcement of digital oblivion.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

Discrimination prevention in data mining for intrusion and crime detection.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications.
IEEE Trans. Vehicular Technology, 2010

From t-Closeness-Like Privacy to Postrandomization via Information Theory.
IEEE Trans. Knowl. Data Eng., 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Hybrid microdata using microaggregation.
Inf. Sci., 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Coprivacy: Towards a Theory of Sustainable Privacy.
Proceedings of the Privacy in Statistical Databases, 2010

Rational Privacy Disclosure in Social Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

User Privacy in Web Search.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

A Bibliometric Index Based on Collaboration Distances.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Privacy-preserving publication of trajectories using microaggregation.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Tabular Data.
Proceedings of the Encyclopedia of Database Systems, 2009

Synthetic Microdata.
Proceedings of the Encyclopedia of Database Systems, 2009

SDC Score.
Proceedings of the Encyclopedia of Database Systems, 2009

Record Linkage.
Proceedings of the Encyclopedia of Database Systems, 2009

PRAM.
Proceedings of the Encyclopedia of Database Systems, 2009

Non-Perturbative Masking Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Noise Addition.
Proceedings of the Encyclopedia of Database Systems, 2009

Microdata Rounding.
Proceedings of the Encyclopedia of Database Systems, 2009

Microaggregation.
Proceedings of the Encyclopedia of Database Systems, 2009

Microdata.
Proceedings of the Encyclopedia of Database Systems, 2009

k-Anonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

Information Loss Measures.
Proceedings of the Encyclopedia of Database Systems, 2009

Inference Control in Statistical Databases.
Proceedings of the Encyclopedia of Database Systems, 2009

Disclosure Risk.
Proceedings of the Encyclopedia of Database Systems, 2009

Data Rank/Swapping.
Proceedings of the Encyclopedia of Database Systems, 2009

Record Matching.
Proceedings of the Encyclopedia of Database Systems, 2009

Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2009

Secure Many-to-One Communications in Wireless Sensor Networks.
Sensors, 2009

h(k)-private information retrieval from privacy-uncooperative queryable databases.">h(k)-private information retrieval from privacy-uncooperative queryable databases.
Online Information Review, 2009

Erratum to "A measure of variance for hierarchical nominal attributes".
Inf. Sci., 2009

Recent progress in database privacy.
Data Knowl. Eng., 2009

User-private information retrieval based on a peer-to-peer community.
Data Knowl. Eng., 2009

On reliability indices of communication networks.
Computers & Mathematics with Applications, 2009

Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

The Functionality-Security-Privacy Game.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

Safety and Privacy in Vehicular Communications.
Proceedings of the Privacy in Location-Based Applications, 2009

The UNESCO Chair in Data Privacy Research in Vehicular Networks.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Measuring risk and utility of anonymized data using information theory.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009

Weighted network decapitation: the economics of iterated attack and defense.
Proceedings of the Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, 2009

2008
A Survey of Inference Control Methods for Privacy-Preserving Data Mining.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Statistical Databases.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng., 2008

Editorial.
Trans. Data Privacy, 2008

On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems.
Trans. Data Privacy, 2008

A measure of variance for hierarchical nominal attributes.
Inf. Sci., 2008

Secure and scalable many-to-one symbol transmission for sensor networks.
Computer Communications, 2008

Privacy homomorphisms for social networks with private relationships.
Computer Networks, 2008

A polynomial-time approximation to optimal multivariate microaggregation.
Computers & Mathematics with Applications, 2008

An Anonymity Model Achievable Via Microaggregation.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

From t-Closeness to PRAM and Noise Addition Via Information Theory.
Proceedings of the Privacy in Statistical Databases, 2008

Peer-to-Peer Private Information Retrieval.
Proceedings of the Privacy in Statistical Databases, 2008

A Shared Steganographic File System with Error Correction.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

On intuitionistic fuzzy clustering for its application to privacy.
Proceedings of the FUZZ-IEEE 2008, 2008

Location Privacy in Location-Based Services: Beyond TTP-based Schemes.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

Location privacy via unlinkability: an alternative to cloaking and perturbation.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

A Critique of k-Anonymity and Some of Its Enhancements.
Proceedings of the The Third International Conference on Availability, 2008

2007
A distributed architecture for scalable private RFID tag identification.
Computer Networks, 2007

Secure many-to-one symbol transmission for implementation on smart cards.
Computer Networks, 2007

Scalability and security in biased many-to-one communication.
Computer Networks, 2007

Advances in smart cards.
Computer Networks, 2007

A Three-Dimensional Conceptual Framework for Database Privacy.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

A Public-Key Protocol for Social Networks with Private Relationships.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.
Proceedings of the Advances in Information and Computer Security, 2007

A Genetic Approach to Multivariate Microaggregation for Database Privacy.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

On Partial Anonymity in Secret Sharing.
Proceedings of the Public Key Infrastructure, 2007

2006
Efficient multivariate data-oriented microaggregation.
VLDB J., 2006

Regression for ordinal variables without underlying continuous variables.
Inf. Sci., 2006

Watermarking Numerical Data in the Presence of Noise.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2006

Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2006

Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation.
Proceedings of the Privacy in Statistical Databases, 2006

Microaggregation for Database and Location Privacy.
Proceedings of the Next Generation Information Technologies and Systems, 2006

Watermarking Non-numerical Databases.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2006

On the Security of a Repaired Mental Poker Protocol.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Privacy in Statistical Databases: k-Anonymity Through Microaggregation.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Privacy homomorphisms for e-gambling and mental poker.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Establishing a benchmark for re-identification methods and its validation using fuzzy clustering.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

A Smart Card-Based Mental Poker System.
Proceedings of the Smart Card Research and Advanced Applications, 2006

A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets.
Proceedings of the The First International Conference on Availability, 2006

2005
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata.
Data Min. Knowl. Discov., 2005

Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation.
Data Min. Knowl. Discov., 2005

Privacy in Data Mining.
Data Min. Knowl. Discov., 2005

Dropout-Tolerant TTP-Free Mental Poker.
Proceedings of the Trust, 2005

Noise-Robust Watermarking for Numerical Datasets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks.
Proceedings of the Artificial Intelligence Research and Development, 2005

2004
Selecting Potentially Relevant Records Using Re-identification Methods.
New Generation Comput., 2004

Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Outlier Protection in Continuous Microdata Masking.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

Fast Generation of Accurate Synthetic Microdata.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

On the Security of Noise Addition for Privacy in Statistical Databases.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

Secure Reverse Communication in a Multicast Tree.
Proceedings of the NETWORKING 2004, 2004

Object Positioning Based on Partial Preferences.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2004

Secure Large-Scale Bingo.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Computer Skills Training to (Middle-aged) Adults: Problems and Program.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

On the Security of an Efficient TTP-Free Mental Poker Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Secure Many-to-One Transmission of q-ary Symbols.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments.
Proceedings of the Public Key Infrastructure, 2004

2003
Collusion-secure and cost-effective detection of unlawful multimedia redistribution.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2003

Disclosure risk assessment in statistical microdata protection via advanced record linkage.
Statistics and Computing, 2003

Fuzzy Microaggregation for Microdata Protection.
JACIII, 2003

On the connections between statistical disclosure control for microdata and some artificial intelligence tools.
Inf. Sci., 2003

Semantic-based aggregation for statistical disclosure control.
Int. J. Intell. Syst., 2003

Median-based aggregation operators for prototype construction in ordinal scales.
Int. J. Intell. Syst., 2003

MINPAY: a Multi-device INternet PAY-as-you-watch system.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Networking in the New ICT Curricula.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Practical Mental Poker Without a TTP Based on Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2003

Practical Asymmetric Fingerprinting with a TTP.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Practical Data-Oriented Microaggregation for Statistical Disclosure Control.
IEEE Trans. Knowl. Data Eng., 2002

Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002

A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002

On the Security of Microaggregation with Individual Ranking: Analytical Attacks.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002

Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data.
Proceedings of the 14th International Conference on Scientific and Statistical Database Management, 2002

Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

A Provably Secure Additive and Multiplicative Privacy Homomorphism.
Proceedings of the Information Security, 5th International Conference, 2002

Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

Advances in Inference Control in Statistical Databases: An Overview.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

STREAMOBILE: Pay-per-View Video Streaming to Mobile Devices Over the Internet.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Validating Distance-Based Record Linkage with Probabilistic Record Linkage.
Proceedings of the Topics in Artificial Intelligence, 5th Catalonian Conference on AI, 2002

MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

Short 3-Secure Fingerprinting Codes for Copyright Protection.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Current directions in smart cards.
Computer Networks, 2001

Watermarking for Multilevel Access to Statistical Databases.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.
Proceedings of the Information Security, 4th International Conference, 2001

Mobile Agent Route Protection through Hash-Based Mechanisms.
Proceedings of the Progress in Cryptology, 2001

Asynchronous Large-Scale Certification Based on Certificate Verification Trees.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Simple Collusion-Secure Fingerprinting Schemes for Images.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000

A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Anonymous Fingerprinting Based on Committed Oblivious Transfer.
Proceedings of the Public Key Cryptography, 1999

Spending Programs: A Tool for Flexible Micropayments.
Proceedings of the Information Security, Second International Workshop, 1999

1998
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents.
SIGMOD Record, 1998

Efficient Smart-Card Based Anonymous Fingerprinting.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Multi-application smart cards and encrypted data, processing.
Future Generation Comp. Syst., 1997

An implementable scheme for secure delegation of computing and data.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
A New Privacy Homomorphism and Applications.
Inf. Process. Lett., 1996

Achieving Rights Untransferability with Client-Independent Servers.
Des. Codes Cryptography, 1996

Multi-Application Smart Cards and Encrypted Data Processing.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

1993
Untransferable Rights in a Client-Independent Server Environment.
Proceedings of the Advances in Cryptology, 1993

1991
Distributed User Identification by Zero-Knowledge Access Rights Proving.
Inf. Process. Lett., 1991

Algorithm- sequenced access control.
Computers & Security, 1991

1990
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures.
Computers & Security, 1990

Software Run-Time Protection: A Cryptographic Issue.
Proceedings of the Advances in Cryptology, 1990

A cryptographic tool for programs protection.
Proceedings of the EUROCODE '90, 1990

1989
Full Secure Key Exchange and Authentication with no Previously Shared Secrets.
Proceedings of the Advances in Cryptology, 1989


  Loading...