Josep Domingo-Ferrer

Orcid: 0000-0001-7213-4962

Affiliations:
  • Rovira i Virgili University, Tarragona, Catalonia, Spain


According to our database1, Josep Domingo-Ferrer authored at least 373 papers between 1989 and 2025.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to privacy, security, and functionality in statistical databases".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MemberShield: A framework for federated learning with membership privacy.
Neural Networks, 2025

2024
Federated learning-based natural language processing: a systematic literature review.
Artif. Intell. Rev., December, 2024

Dual-Server-Based Lightweight Privacy-Preserving Federated Learning.
IEEE Trans. Netw. Serv. Manag., August, 2024

Enhanced Security and Privacy via Fragmented Federated Learning.
IEEE Trans. Neural Networks Learn. Syst., May, 2024

LFighter: Defending against the label-flipping attack in federated learning.
Neural Networks, 2024

Digital Forgetting in Large Language Models: A Survey of Unlearning Methods.
CoRR, 2024

An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024

Machine Learning in Finance.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Defending Against Backdoor Attacks by Layer-wise Feature Analysis (Extended Abstract).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

GLOR-FLEX: Local to Global Rule-Based EXplanations for Federated Learning.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2024

2023
Fair detection of poisoning attacks in federated learning on non-i.i.d. data.
Data Min. Knowl. Discov., September, 2023

Secure, accurate and privacy-aware fully decentralized learning via co-utility.
Comput. Commun., July, 2023

Data privacy: state of the art.
Trans. Data Priv., January, 2023

Utility-Preserving Privacy Protection of Textual Documents via Word Embeddings.
IEEE Trans. Knowl. Data Eng., 2023

Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

FL-Defender: Combating targeted attacks in federated learning.
Knowl. Based Syst., 2023

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning.
ACM Comput. Surv., 2023

Conciliating Privacy and Utility in Data Releases via Individual Differential Privacy and Microaggregation.
CoRR, 2023

Multi-Task Faces (MTF) Data Set: A Legally and Ethically Compliant Collection of Face Images for Various Classification Tasks.
CoRR, 2023

Database Reconstruction Is Not So Easy and Is Different from Reidentification.
CoRR, 2023

Explaining predictions and attacks in federated learning via random forests.
Appl. Intell., 2023

Defending Against Backdoor Attacks by Layer-wise Feature Analysis.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

2022
Generating Deep Learning Model-Specific Explanations at the End User's Side.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., December, 2022

Multi-Dimensional Randomized Response.
IEEE Trans. Knowl. Data Eng., 2022

Differentially private publication of database streams via hybrid video coding.
Knowl. Based Syst., 2022

Secure and Privacy-Preserving Federated Learning via Co-Utility.
IEEE Internet Things J., 2022

GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs).
CoRR, 2022

Defending against the Label-flipping Attack in Federated Learning.
CoRR, 2022

Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat.
Comput. Commun., 2022

Tit-for-Tat Disclosure of a Binding Sequence of User Analyses in Safe Data Access Centers.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

Generation of Synthetic Trajectory Microdata from Language Models.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

Bistochastic Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022

Measuring Fairness in Machine Learning Models via Counterfactual Examples.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022

Ethics by Design in Decentralized Computing.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model.
IEEE Trans. Dependable Secur. Comput., 2021

Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.
Ethics Inf. Technol., 2021

Achieving security and privacy in federated learning systems: Survey, research challenges and future directions.
Eng. Appl. Artif. Intell., 2021

The limits of differential privacy (and its misuse in data release and machine learning).
Commun. ACM, 2021

Explaining Image Misclassification in Deep Learning via Adversarial Examples.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021

Towards Machine Learning-Assisted Output Checking for Statistical Disclosure Control.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021

Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data Management.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

2020
Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph.
Sci. Eng. Ethics, 2020

Machine learning explainability via microaggregation and shallow decision trees.
Knowl. Based Syst., 2020

Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds.
Knowl. Inf. Syst., 2020

Differentially private data publishing via cross-moment microaggregation.
Inf. Fusion, 2020

Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.
CoRR, 2020

µ-ANT: semantic microaggregation-based anonymization tool.
Bioinform., 2020

Tumor Entity Recognition and Coding for Spanish Electronic Health Records.
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2020) co-located with 36th Conference of the Spanish Society for Natural Language Processing (SEPLN 2020), 2020

ε-Differential Privacy for Microdata Releases Does Not Guarantee Confidentiality (Let Alone Utility).
Proceedings of the Privacy in Statistical Databases, 2020

Detecting Bad Answers in Survey Data Through Unsupervised Machine Learning.
Proceedings of the Privacy in Statistical Databases, 2020

Efficient Detection of Byzantine Attacks in Federated Learning Using Last Layer Biases.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020

Explaining Misclassification and Attacks in Deep Learning via Random Forests.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020

Privacy-Preserving Computation of the Earth Mover's Distance.
Proceedings of the Information Security - 23rd International Conference, 2020

Fair Detection of Poisoning Attacks in Federated Learning.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Co-Utile Peer-to-Peer Decentralized Computing.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams.
IEEE Trans. Inf. Forensics Secur., 2019

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges.
Comput. Commun., 2019

Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings.
Proceedings of the 18th IEEE International Conference On Trust, 2019

E2EJ: Anonymization of Spanish Medical Records using End-to-End Joint Neural Networks.
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019

ReCRF: Spanish Medical Document Anonymization using Automatically-crafted Rules and CRF.
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019

Efficient Near-Optimal Variable-Size Microaggregation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019

Mitigating the Curse of Dimensionality in Data Anonymization.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019

Personal Big Data, GDPR and Anonymization.
Proceedings of the Flexible Query Answering Systems - 13th International Conference, 2019

Machine Learning Explainability Through Comprehensible Decision Trees.
Proceedings of the Machine Learning and Knowledge Extraction, 2019

18th Workshop on Privacy in the Electronic Society (WPES 2019).
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Tabular Data.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Synthetic Microdata.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

SDC Score.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Record Linkage.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Nonperturbative Masking Methods.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Noise Addition.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Microdata Rounding.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Microdata.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Microaggregation.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

<i>k</i>-Anonymity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Information Loss Measures.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Inference Control in Statistical Databases.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Disclosure Risk.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Data Rank/Swapping.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Record Matching.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018

Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges.
Math. Comput. Sci., 2018

Differentially private data publishing via optimal univariate microaggregation and record perturbation.
Knowl. Based Syst., 2018

Co-utile disclosure of private data in social networks.
Inf. Sci., 2018

Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds.
Inf. Sci., 2018

Dynamic group size accreditation and group discounts preserving anonymity.
Int. J. Inf. Sec., 2018

Anonymous and secure aggregation scheme in fog-based public cloud computing.
Future Gener. Comput. Syst., 2018

The future of statistical disclosure control.
CoRR, 2018

How to Avoid Reidentification with Proper Anonymization.
CoRR, 2018

Connecting Randomized Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation.
CoRR, 2018

Efficient privacy-preserving implicit authentication.
Comput. Commun., 2018

On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective.
Proceedings of the Privacy in Statistical Databases, 2018

Multiparty Computation with Statistical Input Confidentiality via Randomized Response.
Proceedings of the Privacy in Statistical Databases, 2018

Anonymization of Unstructured Data via Named-Entity Recognition.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2018

Big Data Anonymization Requirements vs Privacy Models.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017

Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion.
Trans. Data Priv., 2017

Co-Utility: Self-Enforcing protocols for the mutual benefit of participants.
Eng. Appl. Artif. Intell., 2017

Differentially Private Data Sets Based on Microaggregation and Record Perturbation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

Privacy-Preserving and Co-utile Distributed Social Credit.
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017

Steered Microaggregation: A Unified Primitive for Anonymization of Data Sets and Data Streams.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Factor Analysis for Anonymization.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02347-7, 2016

Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

Co-utility - Self-enforcing collaborative protocols with mutual help.
Prog. Artif. Intell., 2016

New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users.
Inf. Sci., 2016

Self-enforcing protocols via co-utile reputation management.
Inf. Sci., 2016

Utility-preserving differentially private data releases via individual ranking microaggregation.
Inf. Fusion, 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Gener. Comput. Syst., 2016

Big Data Privacy: Challenges to Privacy Principles and Models.
Data Sci. Eng., 2016

Privacy-aware loyalty programs.
Comput. Commun., 2016

Rank-Based Record Linkage for Re-Identification Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2016

Anonymization in the Time of Big Data.
Proceedings of the Privacy in Statistical Databases, 2016

Co-utility for digital content protection and digital forgetting.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

2015
Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach.
Proceedings of the Advanced Research in Data Privacy, 2015

Selected Privacy Research Topics in the ARES Project: An Overview.
Proceedings of the Advanced Research in Data Privacy, 2015

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation.
IEEE Trans. Knowl. Data Eng., 2015

Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

From t-closeness to differential privacy and vice versa in data anonymization.
Knowl. Based Syst., 2015

A k-anonymous approach to privacy preserving collaborative filtering.
J. Comput. Syst. Sci., 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

Semantic variance: An intuitive measure for ontology accuracy evaluation.
Eng. Appl. Artif. Intell., 2015

Discrimination- and privacy-aware patterns.
Data Min. Knowl. Discov., 2015

On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015

Co-Utility: Self-Enforcing Protocols without Coordination Mechanisms.
CoRR, 2015

Privacy and Data Protection by Design - from policy to engineering.
CoRR, 2015

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015

Supplementary Materials for "How to Avoid Reidentification with Proper Anonymization".
CoRR, 2015

Security and privacy in unified communications: Challenges and solutions.
Comput. Commun., 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015

Flexible and Robust Privacy-Preserving Implicit Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Disclosure risk assessment via record linkage by a maximum-knowledge attacker.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Co-utile Collaborative Anonymization of Microdata.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015

Co-utility: Conciliating Individual Freedom and Common Good in the Crowd Based Business Model.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Privacy-preserving distributed statistical computation to a semi-honest multi-cloud.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Enhancing data utility in differential privacy via microaggregation-based <i>k</i>-anonymity.
VLDB J., 2014

Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints.
Multim. Syst., 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Inf. Secur., 2014

Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
Data Min. Knowl. Discov., 2014

Security in wireless ad-hoc networks - A survey.
Comput. Commun., 2014

Distance Computation between Two Private Preference Functions.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Fair pattern discovery.
Proceedings of the Symposium on Applied Computing, 2014

Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata.
Proceedings of the Privacy in Statistical Databases, 2014

Improving the Utility of Differential Privacy via Univariate Microaggregation.
Proceedings of the Privacy in Statistical Databases, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

Group Discounts Compatible with Buyer Privacy.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Privacy-Preserving Loyalty Programs.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Data Anonymization.
Proceedings of the Risks and Security of Internet and Systems, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Direct and Indirect Discrimination Prevention Methods.
Proceedings of the Discrimination and Privacy in the Information Society, 2013

Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.
IEEE Trans. Knowl. Data Eng., 2013

Optimal data-independent noise for differential privacy.
Inf. Sci., 2013

Anonymization of nominal data based on semantic marginality.
Inf. Sci., 2013

On the privacy offered by (k, δ)-anonymity.
Inf. Syst., 2013

Distributed multicast of fingerprinted content based on a rational peer-to-peer community.
Comput. Commun., 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Clust. Comput., 2013

Improving the Utility of Differentially Private Data Releases via k-Anonymity.
Proceedings of the 12th IEEE International Conference on Trust, 2013

On the Connection between t-Closeness and Differential Privacy for Data Releases.
Proceedings of the SECRYPT 2013, 2013

Differential privacy via t-closeness in data publishing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Facility Location and Social Choice via Microaggregation.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013

Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Security in Wireless Ad Hoc Networks.
Proceedings of the Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, 2013

2012
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
IEEE Trans. Dependable Secur. Comput., 2012

Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Microaggregation- and permutation-based anonymization of movement data.
Inf. Sci., 2012

Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario.
Inf. Sci., 2012

Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search.
Inf. Sci., 2012

Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios.
Inf. Fusion, 2012

Sensitivity-Independent differential Privacy via Prior Knowledge Refinement.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

FuturICT - The Road towards Ethical ICT
CoRR, 2012

Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes
CoRR, 2012

Predictive protocol for the scalable identification of RFID tags through collaborative readers.
Comput. Ind., 2012

Differential Privacy through Knowledge Refinement.
Proceedings of the 2012 International Conference on Privacy, 2012

Hybrid Microdata via Model-Based Clustering.
Proceedings of the Privacy in Statistical Databases, 2012

Anonymization Methods for Taxonomic Microdata.
Proceedings of the Privacy in Statistical Databases, 2012

Marginality: A Numerical Mapping for Enhanced Exploitation of Taxonomic Attributes.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

Injecting Discrimination and Privacy Awareness Into Pattern Discovery.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

A Study on the Impact of Data Anonymization on Anti-discrimination.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Probabilistic k-anonymity through microaggregation and data swapping.
Proceedings of the FUZZ-IEEE 2012, 2012

Statistical Disclosure Control
Wiley, ISBN: 978-1-1183-4821-5, 2012

2011
Microdata Masking Techniques.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A bibliometric index based on the collaboration distance between cited and citing authors.
J. Informetrics, 2011

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Co-citations and Relevance of Authors and Author Groups.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011

Decapitation of networks with and without weights and direction: The economics of iterated attack and defense.
Comput. Networks, 2011

A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

Rule Protection for Indirect Discrimination Prevention in Data Mining.
Proceedings of the Modeling Decision for Artificial Intelligence, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Rational enforcement of digital oblivion.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

Discrimination prevention in data mining for intrusion and crime detection.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A Scalable Robust Authentication Protocol for Secure Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications.
IEEE Trans. Veh. Technol., 2010

From t-Closeness-Like Privacy to Postrandomization via Information Theory.
IEEE Trans. Knowl. Data Eng., 2010

Simulatable certificateless two-party authenticated key agreement protocol.
Inf. Sci., 2010

Hybrid microdata using microaggregation.
Inf. Sci., 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Coprivacy: Towards a Theory of Sustainable Privacy.
Proceedings of the Privacy in Statistical Databases, 2010

Rational Privacy Disclosure in Social Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

User Privacy in Web Search.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

A Bibliometric Index Based on Collaboration Distances.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Privacy-preserving publication of trajectories using microaggregation.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Tabular Data.
Proceedings of the Encyclopedia of Database Systems, 2009

Synthetic Microdata.
Proceedings of the Encyclopedia of Database Systems, 2009

SDC Score.
Proceedings of the Encyclopedia of Database Systems, 2009

Record Linkage.
Proceedings of the Encyclopedia of Database Systems, 2009

Proceedings of the Encyclopedia of Database Systems, 2009

Non-Perturbative Masking Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Noise Addition.
Proceedings of the Encyclopedia of Database Systems, 2009

Microdata Rounding.
Proceedings of the Encyclopedia of Database Systems, 2009

Microaggregation.
Proceedings of the Encyclopedia of Database Systems, 2009

Microdata.
Proceedings of the Encyclopedia of Database Systems, 2009

k-Anonymity.
Proceedings of the Encyclopedia of Database Systems, 2009

Information Loss Measures.
Proceedings of the Encyclopedia of Database Systems, 2009

Inference Control in Statistical Databases.
Proceedings of the Encyclopedia of Database Systems, 2009

Disclosure Risk.
Proceedings of the Encyclopedia of Database Systems, 2009

Data Rank/Swapping.
Proceedings of the Encyclopedia of Database Systems, 2009

Record Matching.
Proceedings of the Encyclopedia of Database Systems, 2009

Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Secure Many-to-One Communications in Wireless Sensor Networks.
Sensors, 2009

h(k)-private information retrieval from privacy-uncooperative queryable databases.">h(k)-private information retrieval from privacy-uncooperative queryable databases.
Online Inf. Rev., 2009

Erratum to "A measure of variance for hierarchical nominal attributes".
Inf. Sci., 2009

Recent progress in database privacy.
Data Knowl. Eng., 2009

User-private information retrieval based on a peer-to-peer community.
Data Knowl. Eng., 2009

On reliability indices of communication networks.
Comput. Math. Appl., 2009

Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

The Functionality-Security-Privacy Game.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

Safety and Privacy in Vehicular Communications.
Proceedings of the Privacy in Location-Based Applications, 2009

The UNESCO Chair in Data Privacy Research in Vehicular Networks.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Measuring risk and utility of anonymized data using information theory.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009

Weighted network decapitation: the economics of iterated attack and defense.
Proceedings of the Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, 2009

2008
A Survey of Inference Control Methods for Privacy-Preserving Data Mining.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Statistical Databases.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng., 2008

Editorial.
Trans. Data Priv., 2008

On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems.
Trans. Data Priv., 2008

A measure of variance for hierarchical nominal attributes.
Inf. Sci., 2008

Secure and scalable many-to-one symbol transmission for sensor networks.
Comput. Commun., 2008

Privacy homomorphisms for social networks with private relationships.
Comput. Networks, 2008

A polynomial-time approximation to optimal multivariate microaggregation.
Comput. Math. Appl., 2008

An Anonymity Model Achievable Via Microaggregation.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

From t-Closeness to PRAM and Noise Addition Via Information Theory.
Proceedings of the Privacy in Statistical Databases, 2008

Peer-to-Peer Private Information Retrieval.
Proceedings of the Privacy in Statistical Databases, 2008

A Shared Steganographic File System with Error Correction.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

On intuitionistic fuzzy clustering for its application to privacy.
Proceedings of the FUZZ-IEEE 2008, 2008

Location Privacy in Location-Based Services: Beyond TTP-based Schemes.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

Location privacy via unlinkability: an alternative to cloaking and perturbation.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

A Critique of k-Anonymity and Some of Its Enhancements.
Proceedings of the The Third International Conference on Availability, 2008

2007
A distributed architecture for scalable private RFID tag identification.
Comput. Networks, 2007

Secure many-to-one symbol transmission for implementation on smart cards.
Comput. Networks, 2007

Scalability and security in biased many-to-one communication.
Comput. Networks, 2007

Advances in smart cards.
Comput. Networks, 2007

A Three-Dimensional Conceptual Framework for Database Privacy.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

A Public-Key Protocol for Social Networks with Private Relationships.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.
Proceedings of the Advances in Information and Computer Security, 2007

A Genetic Approach to Multivariate Microaggregation for Database Privacy.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

On Partial Anonymity in Secret Sharing.
Proceedings of the Public Key Infrastructure, 2007

2006
Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures.
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006

Efficient multivariate data-oriented microaggregation.
VLDB J., 2006

Regression for ordinal variables without underlying continuous variables.
Inf. Sci., 2006

Watermarking Numerical Data in the Presence of Noise.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2006

Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2006

Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation.
Proceedings of the Privacy in Statistical Databases, 2006

Microaggregation for Database and Location Privacy.
Proceedings of the Next Generation Information Technologies and Systems, 2006

Watermarking Non-numerical Databases.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2006

On the Security of a Repaired Mental Poker Protocol.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Privacy in Statistical Databases: k-Anonymity Through Microaggregation.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Privacy homomorphisms for e-gambling and mental poker.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Establishing a benchmark for re-identification methods and its validation using fuzzy clustering.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

A Smart Card-Based Mental Poker System.
Proceedings of the Smart Card Research and Advanced Applications, 2006

A 2<sup>d</sup>-Tree-Based Blocking Method for Microaggregating Very Large Data Sets.
Proceedings of the The First International Conference on Availability, 2006

2005
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata.
Data Min. Knowl. Discov., 2005

Ordinal, Continuous and Heterogeneous <i>k</i>-Anonymity Through Microaggregation.
Data Min. Knowl. Discov., 2005

Privacy in Data Mining.
Data Min. Knowl. Discov., 2005

Dropout-Tolerant TTP-Free Mental Poker.
Proceedings of the Trust, 2005

Noise-Robust Watermarking for Numerical Datasets.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks.
Proceedings of the Artificial Intelligence Research and Development, 2005

2004
Selecting Potentially Relevant Records Using Re-identification Methods.
New Gener. Comput., 2004

Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Outlier Protection in Continuous Microdata Masking.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

Fast Generation of Accurate Synthetic Microdata.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

On the Security of Noise Addition for Privacy in Statistical Databases.
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004

Secure Reverse Communication in a Multicast Tree.
Proceedings of the NETWORKING 2004, 2004

Object Positioning Based on Partial Preferences.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2004

Secure Large-Scale Bingo.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Computer Skills Training to (Middle-aged) Adults: Problems and Program.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

On the Security of an Efficient TTP-Free Mental Poker Protocol.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Secure Many-to-One Transmission of q-ary Symbols.
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004

On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments.
Proceedings of the Public Key Infrastructure, 2004

2003
Collusion-secure and cost-effective detection of unlawful multimedia redistribution.
IEEE Trans. Syst. Man Cybern. Part C, 2003

Disclosure risk assessment in statistical microdata protection via advanced record linkage.
Stat. Comput., 2003

Fuzzy Microaggregation for Microdata Protection.
J. Adv. Comput. Intell. Intell. Informatics, 2003

On the connections between statistical disclosure control for microdata and some artificial intelligence tools.
Inf. Sci., 2003

Semantic-based aggregation for statistical disclosure control.
Int. J. Intell. Syst., 2003

Median-based aggregation operators for prototype construction in ordinal scales.
Int. J. Intell. Syst., 2003

MINPAY: a Multi-device INternet PAY-as-you-watch system.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Networking in the New ICT Curricula.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Practical Mental Poker Without a TTP Based on Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2003

Practical Asymmetric Fingerprinting with a TTP.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Practical Data-Oriented Microaggregation for Statistical Disclosure Control.
IEEE Trans. Knowl. Data Eng., 2002

Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002

A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002

On the Security of Microaggregation with Individual Ranking: Analytical Attacks.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002

Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data.
Proceedings of the 14th International Conference on Scientific and Statistical Database Management, 2002

Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

A Provably Secure Additive and Multiplicative Privacy Homomorphism.
Proceedings of the Information Security, 5th International Conference, 2002

Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

Advances in Inference Control in Statistical Databases: An Overview.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002

STREAMOBILE: Pay-per-View Video Streaming to Mobile Devices Over the Internet.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Validating Distance-Based Record Linkage with Probabilistic Record Linkage.
Proceedings of the Topics in Artificial Intelligence, 5th Catalonian Conference on AI, 2002

MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

Short 3-Secure Fingerprinting Codes for Copyright Protection.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Current directions in smart cards.
Comput. Networks, 2001

Watermarking for Multilevel Access to Statistical Databases.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Oblivious Image Watermarking Robust against Scaling and Geometric Distortions.
Proceedings of the Information Security, 4th International Conference, 2001

Mobile Agent Route Protection through Hash-Based Mechanisms.
Proceedings of the Progress in Cryptology, 2001

Asynchronous Large-Scale Certification Based on Certificate Verification Trees.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Simple Collusion-Secure Fingerprinting Schemes for Images.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000

A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000

1999
Anonymous Fingerprinting Based on Committed Oblivious Transfer.
Proceedings of the Public Key Cryptography, 1999

Spending Programs: A Tool for Flexible Micropayments.
Proceedings of the Information Security, Second International Workshop, 1999

1998
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents.
SIGMOD Rec., 1998

Efficient Smart-Card Based Anonymous Fingerprinting.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
Multi-application smart cards and encrypted data, processing.
Future Gener. Comput. Syst., 1997

An implementable scheme for secure delegation of computing and data.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
A New Privacy Homomorphism and Applications.
Inf. Process. Lett., 1996

Achieving Rights Untransferability with Client-Independent Servers.
Des. Codes Cryptogr., 1996

1993
Untransferable Rights in a Client-Independent Server Environment.
Proceedings of the Advances in Cryptology, 1993

1991
Distributed User Identification by Zero-Knowledge Access Rights Proving.
Inf. Process. Lett., 1991

Algorithm- sequenced access control.
Comput. Secur., 1991

1990
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures.
Comput. Secur., 1990

Software Run-Time Protection: A Cryptographic Issue.
Proceedings of the Advances in Cryptology, 1990

A cryptographic tool for programs protection.
Proceedings of the EUROCODE '90, 1990

1989
Full Secure Key Exchange and Authentication with no Previously Shared Secrets.
Proceedings of the Advances in Cryptology, 1989


  Loading...