Jordi Forné
Orcid: 0000-0002-8401-3292Affiliations:
- Polytechnic University of Catalonia, Spain
According to our database1,
Jordi Forné
authored at least 108 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An overview of proposals towards the privacy-preserving publication of trajectory data.
Int. J. Inf. Sec., December, 2024
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Access, 2024
Proceedings of the Modeling Decisions for Artificial Intelligence, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
2022
J. King Saud Univ. Comput. Inf. Sci., 2022
2021
IEEE Access, 2021
IEEE Access, 2021
2020
Mathematically optimized, recursive prepartitioning strategies for <i>k</i>-anonymous microaggregation of large-scale datasets.
Expert Syst. Appl., 2020
Preserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis.
Eng. Appl. Artif. Intell., 2020
The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data.
Eng. Appl. Artif. Intell., 2020
A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes.
Comput. Secur., 2020
IEEE Access, 2020
Measuring Online Advertising Viewability and Analyzing its Variability Across Different Dimensions.
Proceedings of the WIMS 2020: The 10th International Conference on Web Intelligence, Mining and Semantics, Biarritz, France, June 30, 2020
2019
Efficient <i>k</i>-anonymous microaggregation of multivariate numerical data via principal component analysis.
Inf. Sci., 2019
EURASIP J. Wirel. Commun. Netw., 2019
Eng. Appl. Artif. Intell., 2019
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019
2018
Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs.
Sensors, 2018
IEEE Access, 2018
Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling.
IEEE Access, 2018
2017
Int. J. Parallel Emergent Distributed Syst., 2017
Knowl. Inf. Syst., 2017
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017
Int. J. Ad Hoc Ubiquitous Comput., 2017
Comput. Commun., 2017
Computational Improvements in Parallelized K-Anonymous Microaggregation of Large Databases.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
2016
Inf. Sci., 2016
On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.
Sensors, 2015
Comput. Stand. Interfaces, 2015
Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
MobilitApp: Analysing Mobility Data of Citizens in the Metropolitan Area of Barcelona.
Proceedings of the Internet of Things. IoT Infrastructures, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
2014
IEEE Trans. Knowl. Data Eng., 2014
Secur. Commun. Networks, 2014
Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles.
Netw. Protoc. Algorithms, 2014
Future Gener. Comput. Syst., 2014
Trans. Emerg. Telecommun. Technol., 2014
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems.
Entropy, 2014
CoRR, 2014
Comput. Networks, 2014
2013
Knowl. Based Syst., 2013
Int. J. Inf. Sec., 2013
Comput. Stand. Interfaces, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Data Knowl. Eng., 2012
2011
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
Proceedings of the Security Technology, 2011
A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
IEEE Trans. Knowl. Data Eng., 2010
IEEE Trans. Inf. Theory, 2010
Comput. Secur., 2010
Comput. Secur., 2010
Comput. Commun., 2010
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010
Proceedings of the Trust, 2010
2009
Telecommun. Syst., 2009
2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the The Third International Conference on Availability, 2008
Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols.
Proceedings of the The Third International Conference on Availability, 2008
2007
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks.
Comput. Commun., 2007
MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
New Gener. Comput., 2006
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture.
J. Comput., 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Critical Information Infrastructures Security, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Cooperative Agents and Software Fingerprinting for Security in Intrusion Detection Systems based on Autonomous Agents.
Proceedings of the IASTED International Conference on Databases and Applications, 2005
2004
Int. J. Inf. Sec., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Computational Science, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Public Key Infrastructure, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
1997
Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA.
PhD thesis, 1997
1996
An Integrated Solution for Secure Communications over B-ISDN.
Proceedings of the Communications and Multimedia Security II, 1996
1993
IEEE J. Sel. Areas Commun., 1993
Proceedings of the 18th Conference on Local Computer Networks, 1993
Proceedings of the CCS '93, 1993