Guillermo Navarro-Arribas

Orcid: 0000-0003-3535-942X

Affiliations:
  • Universitat Autònoma de Barcelona


According to our database1, Guillermo Navarro-Arribas authored at least 81 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federify: A Verifiable Federated Learning Scheme Based on zkSNARKs and Blockchain.
IEEE Access, 2024

Attribute Disclosure Risk in Smart Meter Data.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024

2023
Attribute disclosure risk for k-anonymity: the case of numerical data.
Int. J. Inf. Sec., December, 2023

Message anonymity on predictable opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2023

2022
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization.
Int. J. Inf. Sec., 2022

2021
Agents in a privacy-preserving world.
Trans. Data Priv., 2021

The space of models in machine learning: using Markov chains to model transitions.
Prog. Artif. Intell., 2021

2020
A fair protocol for data trading based on Bitcoin transactions.
Future Gener. Comput. Syst., 2020

Explaining Recurrent Machine Learning Models: Integral Privacy Revisited.
Proceedings of the Privacy in Statistical Databases, 2020

Dynamic Features Spaces and Machine Learning: Open Problems and Synthetic Data Sets.
Proceedings of the Integrated Uncertainty in Knowledge Modelling and Decision Making, 2020

2019
LockDown: Balance Availability Attack against Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

On the Difficulty of Hiding the Balance of Lightning Network Channels.
IACR Cryptol. ePrint Arch., 2019

Data Privacy.
Proceedings of the Data Science in Practice, 2019

2018
Cryptocurrency Networks: A New P2P Paradigm.
Mob. Inf. Syst., 2018

Bitcoin private key locked transactions.
Inf. Process. Lett., 2018

Synthetic generation of spatial graphs.
Int. J. Intell. Syst., 2018

Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Probabilistic Metric Spaces for Privacy by Design Machine Learning Algorithms: Modeling Database Changes.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Double-spending Prevention for Bitcoin zero-confirmation transactions.
IACR Cryptol. ePrint Arch., 2017

Analysis of the Bitcoin UTXO set.
IACR Cryptol. ePrint Arch., 2017

Provenance and Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

On the Applicability of Onion Routing on Predictable Delay-Tolerant Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Big Data Privacy and Anonymization.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

Integral Privacy.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Data Privacy: A Survey of Results.
Proceedings of the Advanced Research in Data Privacy, 2015

Advanced Research on Data Privacy in the ARES Project.
Proceedings of the Advanced Research in Data Privacy, 2015

Data Privacy with R R.
Proceedings of the Advanced Research in Data Privacy, 2015

Supervised learning using a symmetric bilinear form for record linkage.
Inf. Fusion, 2015

Spherical microaggregation: Anonymizing sparse vector spaces.
Comput. Secur., 2015

Onion Routing in Deterministic Delay Tolerant Networks.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Data privacy.
WIREs Data Mining Knowl. Discov., 2014

QR Steganography - A Threat to New Generation Electronic Voting Systems.
Proceedings of the SECRYPT 2014, 2014

JPEG-Based Microdata Protection.
Proceedings of the Privacy in Statistical Databases, 2014

Rank Swapping for Stream Data.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2014

2013
A Bloom Filter Based Model for Decentralized Authorization.
Int. J. Intell. Syst., 2013

Towards a private vector space model for confidential documents.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Dynamic Anonymous Index for Confidential Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Vector Space Model Anonymization.
Proceedings of the Artificial Intelligence Research and Development, 2013

2012
User k-anonymity for privacy preserving data mining of query logs.
Inf. Process. Manag., 2012

Information fusion in data privacy: A survey.
Inf. Fusion, 2012

Information fusion in the context of data privacy.
Inf. Fusion, 2012

Improving record linkage with supervised learning for disclosure risk assessment.
Inf. Fusion, 2012

Choquet integral for record linkage.
Ann. Oper. Res., 2012

Towards efficient access control in a mobile agent based wireless sensor network.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Flexible secure inter-domain interoperability through attribute conversion.
Inf. Sci., 2011

Fuzzy Role-Based Access Control.
Inf. Process. Lett., 2011

On the Declassification of Confidential Documents.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

Fuzzy methods for database protection.
Proceedings of the 7th conference of the European Society for Fuzzy Logic and Technology, 2011

Intra-role Progression in RBAC: An RPG-Like Access Control Scheme.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
An efficient and secure agent code distribution service.
Softw. Pract. Exp., 2010

Promoting the development of secure mobile agent applications.
J. Syst. Softw., 2010

Privacy-preserving data-mining through micro-aggregation for web-based e-commerce.
Internet Res., 2010

Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents.
Comput. Commun., 2010

Semantic Microaggregation for the Anonymization of Query Logs.
Proceedings of the Privacy in Statistical Databases, 2010

Towards Semantic Microaggregation of Categorical Data for Confidential Documents.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

On the Applications of Aggregation Operators in Data Privacy.
Proceedings of the Integrated Uncertainty Management and Applications [revised papers from the International Symposium on Integrated Uncertainty Management and Applications, 2010

Towards Privacy Preserving Information Retrieval through Semantic Microaggregation.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

2009
Full mobile agent interoperability in an IEEE-FIPA context.
J. Syst. Softw., 2009

A Survey on Cross-Site Scripting Attacks
CoRR, 2009

Agent mobility architecture based on IEEE-FIPA standards.
Comput. Commun., 2009

A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor.
Proceedings of the Emerging Challenges for Security, 2009

An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments.
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, 2009

Tree-Based Microaggregation for the Anonymization of Search Logs.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

A new framework to automate constrained microaggregation.
Proceedings of the Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, 2009

2007
FIPA-based Interoperable Agent Mobility Proposal
CoRR, 2007

Prevention of Cross-Site Scripting Attacks on Current Web Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications.
Proceedings of the Critical Information Infrastructures Security, 2007

FIPA-Based Interoperable Agent Mobility.
Proceedings of the Multi-Agent Systems and Applications V, 2007

2006
Secure Integration of Distributed Medical Data Using Mobile Agents.
IEEE Intell. Syst., 2006

SMARTCOP - A Smart Card Based Access Control for the Protection of Network Security Components.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Protection of Components Based on a Smart-Card Enhanced Security Module.
Proceedings of the Critical Information Infrastructures Security, 2006

Enabling Mobile Agents Interoperability Through FIPA Standards.
Proceedings of the Cooperative Information Agents X, 10th International Workshop, 2006

2005
Distributed Authorization Framework for Mobile Agents.
Proceedings of the Mobility Aware Technologies and Applications, 2005

An XML Standards Based Authorization Framework for Mobile Agents.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Digital Chips for an On-Line Casino.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Amapola: A Simple Infrastructure for Ubiquitous Computing.
Proceedings of the Intelligence in Communication Systems, 2005

Approximating Saml Using Similarity Based Imprecision.
Proceedings of the Intelligence in Communication Systems, 2005

Access control with safe role assignment for mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2002
Role-Based Access Control for E-commerce Sea-of-Data Applications.
Proceedings of the Information Security, 5th International Conference, 2002


  Loading...