Jordi Forné

Orcid: 0000-0002-8401-3292

Affiliations:
  • Polytechnic University of Catalonia, Spain


According to our database1, Jordi Forné authored at least 108 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An overview of proposals towards the privacy-preserving publication of trajectory data.
Int. J. Inf. Sec., December, 2024

m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing.
IEEE Trans. Inf. Forensics Secur., 2024

A Taxonomy of Syntactic Privacy Notions for Continuous Data Publishing.
IEEE Access, 2024

On the Necessity of Counterfeits and Deletions for Continuous Data Publishing.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2024

2023
SoK: Differentially Private Publication of Trajectory Data.
Proc. Priv. Enhancing Technol., April, 2023

2022
Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
A Survey of the Role of Viewability Within the Online Advertising Ecosystem.
IEEE Access, 2021

A Measurement Study of Online Tracking and Advertising in Ibero-America.
IEEE Access, 2021

2020
Mathematically optimized, recursive prepartitioning strategies for <i>k</i>-anonymous microaggregation of large-scale datasets.
Expert Syst. Appl., 2020

Preserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis.
Eng. Appl. Artif. Intell., 2020

The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data.
Eng. Appl. Artif. Intell., 2020

A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes.
Comput. Secur., 2020

Analyzing and Testing Viewability Methods in an Advertising Network.
IEEE Access, 2020

INRISCO: INcident monitoRing in Smart COmmunities.
IEEE Access, 2020

Measuring Online Advertising Viewability and Analyzing its Variability Across Different Dimensions.
Proceedings of the WIMS 2020: The 10th International Conference on Web Intelligence, Mining and Semantics, Biarritz, France, June 30, 2020

2019
Efficient <i>k</i>-anonymous microaggregation of multivariate numerical data via principal component analysis.
Inf. Sci., 2019

A novel dynamic reputation-based source routing protocol for mobile ad hoc networks.
EURASIP J. Wirel. Commun. Netw., 2019

On the regulation of personal data distribution in online advertising platforms.
Eng. Appl. Artif. Intell., 2019

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

2018
Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs.
Sensors, 2018

Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
IEEE Access, 2018

Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling.
IEEE Access, 2018

2017
On web user tracking of browsing patterns for personalised advertising.
Int. J. Parallel Emergent Distributed Syst., 2017

Shall I post this now? Optimized, delay-based privacy protection in social networks.
Knowl. Inf. Syst., 2017

p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017

Coherent, automatic address resolution for vehicular ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017

On the Anonymity Risk of Time-Varying User Profiles.
Entropy, 2017

Online advertising: Analysis of privacy threats and protection approaches.
Comput. Commun., 2017

Computational Improvements in Parallelized K-Anonymous Microaggregation of Large Databases.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
k-Anonymous microaggregation with preservation of statistical dependence.
Inf. Sci., 2016

On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

2015
Privacy-Enhancing Technologies and Metrics in Personalized Information Systems.
Proceedings of the Advanced Research in Data Privacy, 2015

A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.
Sensors, 2015

Entropy-Based Privacy against Profiling of User Mobility.
Entropy, 2015

On content-based recommendation and user privacy in social-tagging systems.
Comput. Stand. Interfaces, 2015

Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

MobilitApp: Analysing Mobility Data of Citizens in the Metropolitan Area of Barcelona.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

You Never Surf Alone. Ubiquitous Tracking of Users' Browsing Habits.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
Privacy-Preserving Enhanced Collaborative Tagging.
IEEE Trans. Knowl. Data Eng., 2014

On collaborative anonymous communications in lossy networks.
Secur. Commun. Networks, 2014

Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles.
Netw. Protoc. Algorithms, 2014

Measuring the privacy of user profiles in personalized information systems.
Future Gener. Comput. Syst., 2014

Reconciling privacy and efficient utility management in smart cities.
Trans. Emerg. Telecommun. Technol., 2014

Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems.
Entropy, 2014

Smart Deferral of Messages for Privacy Protection in Online Social Networks.
CoRR, 2014

Optimizing the design parameters of threshold pool mixes for anonymity and delay.
Comput. Networks, 2014

2013
A modification of the k-means method for quasi-unsupervised learning.
Knowl. Based Syst., 2013

A modification of the Lloyd algorithm for k-anonymous quantization.
Inf. Sci., 2013

On the measurement of privacy as an attacker's estimation error.
Int. J. Inf. Sec., 2013

A collaborative protocol for anonymous reporting in vehicular ad hoc networks.
Comput. Stand. Interfaces, 2013

2012
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012

2011
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
Proceedings of the Security Technology, 2011

A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
From t-Closeness-Like Privacy to Postrandomization via Information Theory.
IEEE Trans. Knowl. Data Eng., 2010

Optimized query forgery for private information retrieval.
IEEE Trans. Inf. Theory, 2010

PREON: An efficient cascade revocation mechanism for delegation paths.
Comput. Secur., 2010

Pervasive authentication and authorization infrastructures for mobile users.
Comput. Secur., 2010

Private location-based information retrieval through user collaboration.
Comput. Commun., 2010

RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks.
Comput. Networks, 2010

A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression.
Proceedings of the Trust, 2010

2009
Certificate status validation in mobile ad hoc networks.
IEEE Wirel. Commun., 2009

Design and implementation of a lightweight online certificate validation service.
Telecommun. Syst., 2009

2008
<i>H</i>-OCSP: A protocol to reduce the processing burden in online certificate status validation.
Electron. Commer. Res., 2008

From t-Closeness to PRAM and Noise Addition Via Information Theory.
Proceedings of the Privacy in Statistical Databases, 2008

Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms.
Proceedings of the The Third International Conference on Availability, 2008

Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols.
Proceedings of the The Third International Conference on Availability, 2008

2007
WAP PKI and certification path validation.
Int. J. Internet Protoc. Technol., 2007

Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks.
Comput. Commun., 2007

MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Proceedings of the SECRYPT 2007, 2007

Reducing the Computational Cost of Certification Path Validation in Mobile Payment.
Proceedings of the Public Key Infrastructure, 2007

Securing Agents against Malicious Host in an Intrusion Detection System.
Proceedings of the Critical Information Infrastructures Security, 2007

A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS.
Proceedings of the The Second International Conference on Availability, 2007

2006
Punishing Malicious Hosts with the Cryptographic Traces Approach.
New Gener. Comput., 2006

Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture.
J. Comput., 2006

Secure brokerage mechanisms for mobile electronic commerce.
Comput. Commun., 2006

Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains.
Proceedings of the Computational Science and Its Applications, 2006

PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios.
Proceedings of the Critical Information Infrastructures Security, 2006

PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model.
Proceedings of the The First International Conference on Availability, 2006

2005
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).
Proceedings of the Trust, 2005

A Lightweight Delegated Privileges Revocation Scheme Based on Coding.
Proceedings of the Applied Public Key Infrastructure, 2005

Design of an Enhanced PKI for Ubiquitous Networks.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Cooperative Agents and Software Fingerprinting for Security in Intrusion Detection Systems based on Autonomous Agents.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

2004
Certificate revocation system implementation based on the Merkle hash tree.
Int. J. Inf. Sec., 2004

Reducing the Communication Overhead of an Offline Revocation Dictionary.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Detecting and Proving Manipulation Attacks in Mobile Agent Systems.
Proceedings of the Mobility Aware Technologies and Applications, 2004

Security Issues in Virtual Grid Environments.
Proceedings of the Computational Science, 2004

Punishing manipulation attacks in mobile agent systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

CERVANTES - A Certificate Validation Test-Bed.
Proceedings of the Public Key Infrastructure, 2004

2003
E-MHT. An Efficient Protocol for Certificate Status Checking.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A Certificate Status Checking Protocol for the Authenticated Dictionary.
Proceedings of the Computer Network Security, 2003

Efficient Offline Certificate Revocation.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Implementation of an Efficient Authenticated Dictionary for Certificate Revocation.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A protocol for detecting malicious hosts based on limiting the execution time of mobile agents.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts.
Proceedings of the Web Engineering, International Conference, 2003

Protocols for Malicious Host Revocation.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Evaluation of Revocation Systems with a JAVA Test-bed.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Evaluation of Certificate Revocation Policies: OCSP vs. Overissued-CRL.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

1997
Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA.
PhD thesis, 1997

1996
An Integrated Solution for Secure Communications over B-ISDN.
Proceedings of the Communications and Multimedia Security II, 1996

1993
Secure Data Transmission in Extended Ethernet Environments.
IEEE J. Sel. Areas Commun., 1993

Implementation of a security system in a local area network environment.
Proceedings of the 18th Conference on Local Computer Networks, 1993

A Particular Solution to Provide Secure Communications in an Ethernet Environment.
Proceedings of the CCS '93, 1993


  Loading...