Josep Domingo-Ferrer
Orcid: 0000-0001-7213-4962Affiliations:
- Rovira i Virgili University, Tarragona, Catalonia, Spain
According to our database1,
Josep Domingo-Ferrer
authored at least 373 papers
between 1989 and 2025.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2012, "For contributions to privacy, security, and functionality in statistical databases".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Neural Networks, 2025
2024
Federated learning-based natural language processing: a systematic literature review.
Artif. Intell. Rev., December, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
IEEE Trans. Neural Networks Learn. Syst., May, 2024
Neural Networks, 2024
CoRR, 2024
An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Defending Against Backdoor Attacks by Layer-wise Feature Analysis (Extended Abstract).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the IEEE International Conference on Fuzzy Systems, 2024
2023
Data Min. Knowl. Discov., September, 2023
Comput. Commun., July, 2023
IEEE Trans. Knowl. Data Eng., 2023
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing.
IEEE Trans. Dependable Secur. Comput., 2023
Knowl. Based Syst., 2023
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning.
ACM Comput. Surv., 2023
Conciliating Privacy and Utility in Data Releases via Individual Differential Privacy and Microaggregation.
CoRR, 2023
Multi-Task Faces (MTF) Data Set: A Legally and Ethically Compliant Collection of Face Images for Various Classification Tasks.
CoRR, 2023
CoRR, 2023
Appl. Intell., 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
2022
Int. J. Uncertain. Fuzziness Knowl. Based Syst., December, 2022
Knowl. Based Syst., 2022
IEEE Internet Things J., 2022
GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs).
CoRR, 2022
Comput. Commun., 2022
Tit-for-Tat Disclosure of a Binding Sequence of User Analyses in Safe Data Access Centers.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022
Proceedings of the Privacy in Statistical Databases - International Conference, 2022
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022
Proceedings of the Modeling Decisions for Artificial Intelligence, 2022
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
2021
General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model.
IEEE Trans. Dependable Secur. Comput., 2021
Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.
Ethics Inf. Technol., 2021
Achieving security and privacy in federated learning systems: Survey, research challenges and future directions.
Eng. Appl. Artif. Intell., 2021
The limits of differential privacy (and its misuse in data release and machine learning).
Commun. ACM, 2021
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021
Towards Machine Learning-Assisted Output Checking for Statistical Disclosure Control.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
2020
Sci. Eng. Ethics, 2020
Knowl. Based Syst., 2020
Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds.
Knowl. Inf. Syst., 2020
Inf. Fusion, 2020
Give more data, awareness and control to individual citizens, and they will help COVID-19 containment.
CoRR, 2020
Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2020) co-located with 36th Conference of the Spanish Society for Natural Language Processing (SEPLN 2020), 2020
ε-Differential Privacy for Microdata Releases Does Not Guarantee Confidentiality (Let Alone Utility).
Proceedings of the Privacy in Statistical Databases, 2020
Proceedings of the Privacy in Statistical Databases, 2020
Efficient Detection of Byzantine Attacks in Federated Learning Using Last Layer Biases.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
2019
Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams.
IEEE Trans. Inf. Forensics Secur., 2019
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges.
Comput. Commun., 2019
Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings.
Proceedings of the 18th IEEE International Conference On Trust, 2019
E2EJ: Anonymization of Spanish Medical Records using End-to-End Joint Neural Networks.
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019
ReCRF: Spanish Medical Document Anonymization using Automatically-crafted Rules and CRF.
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019
Proceedings of the Modeling Decisions for Artificial Intelligence, 2019
Proceedings of the Flexible Query Answering Systems - 13th International Conference, 2019
Proceedings of the Machine Learning and Knowledge Extraction, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018
Math. Comput. Sci., 2018
Differentially private data publishing via optimal univariate microaggregation and record perturbation.
Knowl. Based Syst., 2018
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds.
Inf. Sci., 2018
Int. J. Inf. Sec., 2018
Future Gener. Comput. Syst., 2018
Connecting Randomized Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation.
CoRR, 2018
On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective.
Proceedings of the Privacy in Statistical Databases, 2018
Multiparty Computation with Statistical Input Confidentiality via Randomized Response.
Proceedings of the Privacy in Statistical Databases, 2018
Proceedings of the Modeling Decisions for Artificial Intelligence, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees.
IEEE Trans. Inf. Forensics Secur., 2017
Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion.
Trans. Data Priv., 2017
Eng. Appl. Artif. Intell., 2017
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017
A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017
Proceedings of the Combinatorial Algorithms - 28th International Workshop, 2017
Steered Microaggregation: A Unified Primitive for Anonymization of Data Sets and Data Streams.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02347-7, 2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Prog. Artif. Intell., 2016
New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users.
Inf. Sci., 2016
Utility-preserving differentially private data releases via individual ranking microaggregation.
Inf. Fusion, 2016
Future Gener. Comput. Syst., 2016
Proceedings of the Privacy in Statistical Databases, 2016
Proceedings of the Privacy in Statistical Databases, 2016
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
2015
Proceedings of the Advanced Research in Data Privacy, 2015
Proceedings of the Advanced Research in Data Privacy, 2015
t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation.
IEEE Trans. Knowl. Data Eng., 2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2015
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015
Knowl. Based Syst., 2015
J. Comput. Syst. Sci., 2015
Int. J. Inf. Sec., 2015
Eng. Appl. Artif. Intell., 2015
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015
Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015
Supplementary Materials for "How to Avoid Reidentification with Proper Anonymization".
CoRR, 2015
Comput. Commun., 2015
Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015
Co-utility: Conciliating Individual Freedom and Common Good in the Crowd Based Business Model.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Enhancing data utility in differential privacy via microaggregation-based <i>k</i>-anonymity.
VLDB J., 2014
Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints.
Multim. Syst., 2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014
Inf. Sci., 2014
IET Inf. Secur., 2014
Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
Data Min. Knowl. Discov., 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata.
Proceedings of the Privacy in Statistical Databases, 2014
Proceedings of the Privacy in Statistical Databases, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the Discrimination and Privacy in the Information Society, 2013
IEEE/ACM Trans. Netw., 2013
IEEE Trans. Knowl. Data Eng., 2013
Distributed multicast of fingerprinted content based on a rational peer-to-peer community.
Comput. Commun., 2013
Clust. Comput., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013
Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the Mobile Ad Hoc Networking: Cutting Edge Directions, Second Edition, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012
Inf. Sci., 2012
Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario.
Inf. Sci., 2012
Inf. Sci., 2012
Inf. Fusion, 2012
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012
Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes
CoRR, 2012
Predictive protocol for the scalable identification of RFID tags through collaborative readers.
Comput. Ind., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Privacy in Statistical Databases, 2012
Proceedings of the Privacy in Statistical Databases, 2012
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Proceedings of the FUZZ-IEEE 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
A bibliometric index based on the collaboration distance between cited and citing authors.
J. Informetrics, 2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense.
Comput. Networks, 2011
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Modeling Decision for Artificial Intelligence, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Knowl. Data Eng., 2010
Inf. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the Privacy in Statistical Databases, 2010
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Proceedings of the Encyclopedia of Database Systems, 2009
Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009
h(k)-private information retrieval from privacy-uncooperative queryable databases.">h(k)-private information retrieval from privacy-uncooperative queryable databases.
Online Inf. Rev., 2009
Inf. Sci., 2009
Data Knowl. Eng., 2009
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009
Proceedings of the Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
IEEE Trans. Knowl. Data Eng., 2008
Trans. Data Priv., 2008
Comput. Commun., 2008
Comput. Networks, 2008
Comput. Math. Appl., 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the Privacy in Statistical Databases, 2008
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008
Proceedings of the FUZZ-IEEE 2008, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Comput. Networks, 2007
Comput. Networks, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks.
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Public Key Infrastructure, 2007
2006
Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures.
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006
Inf. Sci., 2006
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2006
Proceedings of the Privacy in Statistical Databases, 2006
Proceedings of the Privacy in Statistical Databases, 2006
Proceedings of the Next Generation Information Technologies and Systems, 2006
Proceedings of the Modeling Decisions for Artificial Intelligence, 2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006
Establishing a benchmark for re-identification methods and its validation using fuzzy clustering.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
A 2<sup>d</sup>-Tree-Based Blocking Method for Microaggregating Very Large Data Sets.
Proceedings of the The First International Conference on Availability, 2006
2005
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata.
Data Min. Knowl. Discov., 2005
Data Min. Knowl. Discov., 2005
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005
Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks.
Proceedings of the Artificial Intelligence Research and Development, 2005
2004
New Gener. Comput., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004
Proceedings of the Privacy in Statistical Databases: CASC Project International Workshop, 2004
Proceedings of the NETWORKING 2004, 2004
Proceedings of the Modeling Decisions for Artificial Intelligence, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Intelligence in Communication Systems, IFIP International Conference, 2004
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments.
Proceedings of the Public Key Infrastructure, 2004
2003
IEEE Trans. Syst. Man Cybern. Part C, 2003
Disclosure risk assessment in statistical microdata protection via advanced record linkage.
Stat. Comput., 2003
J. Adv. Comput. Intell. Intell. Informatics, 2003
On the connections between statistical disclosure control for microdata and some artificial intelligence tools.
Inf. Sci., 2003
Int. J. Intell. Syst., 2003
Int. J. Intell. Syst., 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data.
Proceedings of the 14th International Conference on Scientific and Statistical Database Management, 2002
Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Proceedings of the Information Security, 5th International Conference, 2002
Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002
LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection.
Proceedings of the Inference Control in Statistical Databases, From Theory to Practice, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Proceedings of the Topics in Artificial Intelligence, 5th Catalonian Conference on AI, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Progress in Cryptology, 2001
Asynchronous Large-Scale Certification Based on Certificate Verification Trees.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling.
Proceedings of the Information Security, Third International Workshop, 2000
A Performance Comparison of Java Cards for Micropayment Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2000
1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents.
SIGMOD Rec., 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Future Gener. Comput. Syst., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Des. Codes Cryptogr., 1996
1993
Proceedings of the Advances in Cryptology, 1993
1991
Inf. Process. Lett., 1991
1990
Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures.
Comput. Secur., 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989