Publications

    Conference Papers

    2017

  • J. Soria-Comas and J. Domingo-Ferrer, "A non-parametric model for accurate and provably private synthetic data sets", International Conference on Availability, Reliability and Security - ARES 2017, Reggio Calabria, Italy, Aug 2017. Best paper award. [DOI] [PDF]
  • J. Castellà-Roca, M. Mut-Puigserver, M. M. Payeras-Capellà, A. Viejo and C.Anglès-Tafalla, "Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban Areas", 3rd International Workshop on Vehicular Networking and Intelligent Transportation Systems - VENITS2017, Vancouver (Canada), Aug 2017.
  • 2016

  • J. Salas, "Faster Univariate Microaggregation for Power Law Distributions: k-degree-Anonymity for Big Graphs", PDDM16 - The 1st IEEE ICDM International Workshop on Privacy and Discrimination in Data Mining, Barcelona (Spain), Dec 2016. [DOI]
  • A. Nigussie Turi, J. Domingo-Ferrer and D. Sánchez, "Filtering P2P loans based on co-utile reputation", 13th International Conference on Applied Computing - AC 2016, Mannheim, Germany, In IADIS Press, pp. 139-146, ISBN: 978-989-8533-56, Oct 2016. [PDF]
  • J. Castellà-Roca, M. Mut-Puigserver, M. M. Payeras-Capellà, A. Viejo and C. Anglès-Tafalla, "Control Seguro y Anónimo para el Acceso de Vehículos a Zonas Urbanas de Tráfico Restringido", XIV Reunión Española Sobre Criptología y Seguridad de la Información - RECSI 2016, Maó, Spain, Oct 2016.
  • M. Trujillo Vanrell, M. Mut Puigserver, M. Payeras-Capellà, J.Castellà-Roca and Ll. Huguet, "Uso actual de la criptografía sobre curva elíptica", XIV Reunión Española Sobre Criptología y Seguridad de la Información - RECSI 2016, Maó, Spain, Oct 2016.
  • A. Blanco-Justicia and J. Domingo-Ferrer, "Autenticación implícita eficiente y con privacidad", XIV Reunión Española Sobre Criptología y Seguridad de la Información - RECSI 2016, Maó, Spain, Oct 2016. [PDF]
  • M. Batet and D. Sánchez, "Improving Semantic Relatedness Assessments: Ontologies Meet Textual Corpora", International Conference on Knowledge-Based and Intelligent Information & Engineering Systems - KES 2016, York, UK, In Procedia Computer Science 96, pp. 365-374, ISBN: , Sep 2016. [DOI]
  • L. Martínez-Sanahuja and D. Sánchez, "Evaluating the Suitability of Web Search Engines as Proxies for Knowledge Discovery from the Web", International Conference on Knowledge-Based and Intelligent Information & Engineering Systems - KES 2016, York (UK), Sep 2016. [DOI]
  • R. Jardí-Cedó, M. Mut-Puigserver, J. Castellà-Roca, M. M. Payeras-Capellà and A. Viejo, "Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones", 9th International Conference on Security of Information and Networks - SIN’16, New Jersey, USA, In Proceedings of the 9th International Conference on Security of Information and Networks, pp. 158-165, ISBN: , Jul 2016. [DOI]
  • J. Bondia-Barceló, J. Castellà-Roca and A. Viejo, "Building Privacy-Preserving Search Engine Query Logs for Data Monetization", 13th IEEE International Conference on Advanced and Trusted Computing - ATC’16, Toulouse, France, Jul 2016. [DOI]
  • G. Ouffoué, A. M. Ortiz, A. R. Cavalli, W. Mallouli, J. Domingo-Ferrer, D. Sánchez, F. Zaidi, "Intrusion detection and attack tolerance for cloud environments: the CLARUS approach", Second IEEE International Workshop on Security Testing and Monitoring - STAM 2016, Nara, Japan, In 36th IEEE Intl. Conf. on Distributed Computing Systems Workshops, ICDS Workshops, pp. 61-66, ISBN: 2332-5666, Jun 2016. [DOI] [PDF]
  • J. Domingo-Ferrer and D. Megías, "Co-utility for digital content protection and digital forgetting", MedHocNet 2016-15th Annual Mediterranean Ad Hoc Networking Workshop, Vilanova i la Geltrú, Jun 2016. [DOI] [PDF]
  • O. Farràs and J. Ribes-Gonzalez, "Searchable encryption for geo-referenced data", MedHocNet 2016-15th Annual Mediterranean Ad Hoc Networking Workshop, Vilanova i la Geltrú, Jun 2016. [DOI] [PDF]
  • J. Soria-Comas, J. Domingo-Ferrer, D. Sánchez and S. Martínez, "t-Closeness through microaggregation: strict privacy with enhanced utility preservation (extended abstract)", 32nd IEEE International Conference on Data Engineering-ICDE 2016, Helsinki, Finland, In IEEE Computer Society, pp. 1464-1465, ISBN: 978-1-5090-2020, May 2016. [DOI] [PDF]
  • M. Imran-Daud, D. Sánchez and A. Viejo , "Ontology-based Access Control Management: Two Use Cases", ICAART 2016, Rome (Italy), In Proceedings of the 8th International Conference on Agents and Artificial Intelligence, pp. 244-249, ISBN: 978-989-758-172, Feb 2016. [DOI] [PDF]
  • 2015

  • M. Rodriguez-Garcia, M. Batet and D. Sánchez, "Semantic Noise: Privacy-protection of Nominal Microdata through Uncorrelated Noise Addition", 27th International Conference on Tools with Artificial Intelligence - ICTAI 2015, Vietri Sul Mare, Italy, Nov 2015. [DOI] [PDF]
  • A. Turi, J. Domingo-Ferrer, D. Sánchez and D. Osmani, "Co-Utility: Conciliating Individual Freedom and Common Good for the Crowd-based Business Model", 2015 IEEE Intl. Conf. on e-Business Engineering (ICEBE 2015), Beijing, China, Nov 2015. [DOI] [PDF]
  • E. Batista, F. Casino and A. Solanas, "Wandering Detection Methods in Smart Cities: Currentand New Approaches", The 1st IEEE International Smart Cities Conference - ISC2 2015, Guadalajara, Mexico, Oct 2015. [DOI]
  • F. Casino, E. Batista and A. Solanas, "Context-Aware Recommender for Smart Health", 1st IEEE Workshop on Security and Privacy in the Cloud-SPC 2015, Guadalajara, Mexico, Oct 2015. [DOI]
  • J. Domingo-Ferrer, S. Ricci and J. Soria-Comas, "Disclosure risk assessment via record linkage by a maximum-knowledge attacker", 13th Annual International Conference on Privacy, Security and Trust-PST 2015, Izmir, Turkey, Sep 2015. [DOI] [PDF]
  • A. Calviño, S. Ricci and J. Domingo-Ferrer, "Privacy-preserving distributed statistical computation to a semi-honest multi-cloud", 1st IEEE Workshop on Security and Privacy in the Cloud-SPC 2015, Florence, Italy, Sep 2015. [DOI] [PDF]
  • F. Casino, P. Lopez-Iturri, E. Aguirre, L. Azpilicueta, A. Solanas and F. Falcone, "Dense Wireless Sensor Network Design for the Implementation of Smart Health Environments", IEEE-APSTopical Conference on Antennas and Propagation in Wireless Communications - APWC 2015, Torino, Italy, Sep 2015. [DOI]
  • F. Casino, L. Azpilicueta, P. Lopez-Iturri, E. Aguirre, F. Falcone and A. Solanas, "Hybrid-based Optimization of Wireless Channel Characterization for Health Services in Medical Complex En-vironments", The 6th International Conference on Information, Intelligence, Systems and Applications - IISA 2015, Corfu, Greece, Jul 2015. [DOI]
  • A. Ortiz de Lejarazu, P. Lopez-Iturri, E. Aguirre, L. Azpilicueta, F. Falcone, F. Casino and A. Solanas, "Challenges in the Implementation of Context-Aware Scenarios within Emergency Rooms", The 6th International Conference on Information, Intelligence, Systems and Applications - IISA2015, Corfu, Greece, Jul 2015. [DOI]
  • E. Batista, F. Borras, F. Casino and A. Solanas, "A Study on the Detection of WanderingPatterns in Human Trajectories", The 6th International Conference on Information, Intelligence, Systems and Applications - IISA 2015, Corfu, Greece, Jul 2015. [DOI]
  • C. Patsakis, A. Zigomitros and A. Solanas, "Privacy-Aware Genome Mining: Server-Assisted Protocols for Private Set Intersection and Pattern Matching", 28th IEEE International Symposium on Computer-Based Medical Systems - CBMS 2015, São Carlos and Ribeirão Preto - Brazil, Jun 2015. [DOI]
  • J. Domingo-Ferrer, Q. Wu and A. Blanco, "Flexible and robust privacy-preserving implicit authentication", IFIP SEC 2015-Intl. Information Security and Privacy Conference, Hamburg, Germany, In IFIP AICT 455, Springer, pp. 18-34, ISBN: 978-3-319-18466, May 2015. [DOI] [PDF]
  • C. Patsakis, A. Papageorgiou, F. Falcone and A. Solanas, "S-health as a driver towards better emergency response systems in urban environments", 10th IEEE International Symposium on Medical Measurements and Applications - MeMea 2015, Torino, Italy, May 2015. [DOI]
  • J. Domingo-Ferrer, J. Soria-Comas and O. Ciobotaru, "Co-utility: self-enforcing protocols without coordination mechanisms", International Conference on Industrial Engineering and Operations Management-IEOM 2015, Dubai, United Arab Emirates, In Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management, IEEE, pp. 1-17, ISBN: 978-1-4799-6064, Mar 2015. [DOI] [PDF]
  • A. Solanas, E. Batista, F. Borras, A. Martínez-Ballesté and C. Patsakis, "Wandering Analysis with Mobile Phones - On the Relation Between Randomness and Wandering", 5th International Conference on Pervasive and Embedded Computing and Communication Systems - PECCS 2015, Angers, France, Feb 2015.
  • D. Sánchez, A. Viejo, "Privacy Risk Assessment of Textual Publications in Social Networks", International Conference on Agents and Artificial Intelligence - ICAART’15, Lisboa, Portugal, Jan 2015. [DOI]
  • M. Batet and D. Sánchez, "Ontology Selection for Semantic Similarity Assessment", International Conference on Agents and Artificial Intelligence - ICAART’15, Lisbon, Portugal, Jan 2015. [DOI] [PDF]
  • 2014

  • M. Batet and D. Sánchez, "A Semantic Approach for Ontology Evaluation", IEEE International Conference on Tools with Artificial Intelligence - ICTAI 2014, Limassol, Cyprus, Nov 2014. [DOI] [PDF]
  • R. Jardí-Cedó, M. Mut-Puigserver, M. M. Payeras-Capella, J. Castellà-Roca, A. Viejo, "Sistema de Telepeaje en Zonas Urbanas", 13th Reunión Española sobre Criptología y Seguridad de la Información - RECSI’ 14, Alacant, Spain, Sep 2014. [PDF]
  • J. Domingo-Ferrer and A. Blanco-Justicia, "Privacy-preserving group discounts", RECSI 2014, Alacant, Spain, In Actas de la XIII Reunion Española sobre Criptologa y Seguridad de la Informacion, pp. 69-73, ISBN: 978-84-9717-323, Sep 2014. [DOI]
  • H. Deng, Q. Wu, B. Qin, S. S. M. Chow, J. Domingo-Ferrer and W. Shi, "Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data", 9th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2014, Kyoto, Japan, Jun 2014. [DOI] [PDF]
  • A. Blanco, J. Domingo-Ferrer, O. Farràs and D. Sánchez, "Distance computation between two private preference functions", IFIP International Information Security and Privacy Conference - SEC 2014, Marrakech, Morocco, In IFIP AICT 428, pp. 460-470, ISBN: 978-3-642-55414, Jun 2014. [DOI] [PDF]
  • A. Martinez-Balleste, J. O. Casanovas-Marsal, A. Solanas, F. Casino, M. Garcia-Martinez, "An autonomous system to assess, display and communicate the pain level in newborns", Medical Measurements and Applications (MeMeA), 2014 IEEE International Symposium on, In IEEE, pp. 1-5, ISBN: , Jun 2014. [DOI]
  • M. Batet and D. Sánchez, "Privacy protection of textual medical documents", Network Operations and Management Symposium - NOMS 2014, Krakow, Poland, In Network Operations and Management Symposium (NOMS), 2014 IEEE, pp. 1-6, ISBN: , May 2014. [DOI] [PDF]
  • A. Zigomitros, A. Solanas and C. Patsakis, "The role of inference in the anonymization of medical records", 27th International Symposium on Computer-based Medical Systems (IEEE CBMS 2014), New York, USA, May 2014. [DOI]
  • M. Batet, A. Erola, D. Sánchez and J. Castellà-Roca, "Semantic Anonymisation of Set-valued Data", 6th International Conference on Agents and Artificial Intelligence - ICAART 2014, Angers, France, Mar 2014. [DOI] [PDF]
  • S. Hajian, A. Monreale, D. Pedreschi, J. Domingo-Ferrer and F. Giannotti, "Fair pattern discovery", 29th Symposium on Applied Computing - ACM SAC 2014, Gyeongju, Korea, Mar 2014. [DOI] [PDF]
  • A. Martínez-Ballesté, A. Solanas, M. Vives, H.A. Rashwan, "Privacy in Pervasive Video Surveillance-Trust through Technology and Users Cooperation", 4th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2014), Lisbon, Portugal, Jan 2014. [DOI]
  • 2013

  • C. Patsakis and A.Solanas, "Privacy as a Product: A case study in the m-Health", Fourth International Conference on Information, Intelligence, Systems and Applications - IISA 2013, Piraeus, Greece, Oct 2013. [DOI]
  • A. Vives-Guasch, M. M. Payeras-Capellà, M. Mut-Puigserver, J. Castellà-Roca and J.L. Ferrer-Gomila, "Anonymous and Transferable Electronic Ticketing Scheme", 8th DPM International Workshop on Data Privacy Management - DPM2013, Egham, UK, Sep 2013. [DOI] [PDF]
  • A. Erola and J.Castellà-Roca, "Using search results to microaggregate query logs semantically", 8th DPM International Workshop on Data Privacy Management - DPM2013, Egham, UK, Sep 2013. [DOI] [PDF]
  • F. Casino, J. Domingo-Ferrer, C. Patsakis, D. Puig and A. Solanas, "Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation", 10th IEEE International Conference on e-Business Engineering (ICEBE 2013), Coventry, United Kingdom, Sep 2013. [DOI] [PDF]
  • C. Patsakis and A. Solanas, "Trading Privacy in the Cloud: A Fairer Way to Share Private Information", 10th IEEE International Conference on e-Business Engineering (ICEBE 2013), Coventry, United Kingdom, Sep 2013. [DOI] [PDF]
  • F. Casino, C. Patsakis, D. Puig and A. Solanas, "On Privacy Preserving Collaborative Filtering: Current Trends, Open Problems, and New Issues", 10th IEEE International Conference on e-Business Engineering (ICEBE 2013), Coventry, United Kingdom, Sep 2013. [DOI] [PDF]
  • A. Viejo, J. Castellà-Roca and G. Rufián, "Preserving the User's Privacy in Social Networking Sites", 10th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2013, Prague, Czech Republic , Aug 2013. [DOI] [PDF]
  • D. Sánchez, M. Batet, A. Viejo, "Detecting Term Relationships to Improve Textual Document Sanitization", Pacific Asia Conference on Information Systems- PACIS 2013, Jeju Island, Korea, Aug 2013. [DOI] [PDF]
  • J. Soria-Comas and J. Domingo-Ferrer, "Differential privacy via t-closeness in data publishing", 11th Annual Conference on Privacy, Security and Trust-PST 2013, Tarragona, Catalonia, In IEEE Computer Society, pp. 27-35, ISBN: 978-1-4673-5839, Jul 2013. [DOI] [PDF]
  • J. Domingo-Ferrer, "On the connection between t-closeness and differential privacy for data releases", 10th International Conference on Security and Cryptography-SECRYPT 2013, Reykjavik, Iceland, Jul 2013. [DOI]
  • J. Soria-Comas, J. Domingo-Ferrer, David Sánchez and Sergio Martínez, "Improving the utility of differentially private data releases via k-anonymity", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications -IEEE TrustCom 2013, Melbourne, Australia, Jul 2013. [DOI] [PDF]
  • A. Viejo and D. Sánchez, "Providing Useful and Private Web Search by Means of Social Network Profiling", Eleventh Annual Conference on Privacy, Security and Trust - PST2013, Tarragona, Catalonia, Jul 2013. [DOI] [PDF]
  • A. Martínez-Ballesté, A. Solanas and J.F. Martínez-Cerdá, "A Framework to Assess the Computer Security Skills of People in the Information Society", World Congress on Engineering - WCE 2013, London (UK), Jul 2013.
  • D. Megías and J. Domingo-Ferrer, "DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution", IEEE Congress on Evolutionary Computation, Cancun, Mexico, In IEEE Computer Society, pp. 2376-2383, ISBN: 978-1-4799-0452, Jun 2013. [DOI] [PDF]
  • L. Zhang, Q. Wu, B. Qin, J. Domingo-Ferrer and P. Zeng, "A Generic Construction of Proxy Signatures from Certificateless Signatures", IEEE AINA 2013, Barcelona, Spain, In IEEE Computer Society, pp. 259-266, ISBN: 978-1-4673-5550, Mar 2013. [DOI] [PDF]
  • P. A. Pérez-Martínez, A. Martínez-Ballesté and A. Solanas, "Privacy in smart cities: A case study of smart public parking", Third International Conference on Pervasive and Embeded Computing and Communications Systems - PECCS 2013, Barcelona, Spain, Mar 2013. [DOI]
  • A. Martínez-Ballesté, H. Rashwan, J. Castellà-Roca and D. Puig, "A Trustworthy Database for Privacy-Preserving Video Surveillance", Privacy and Anonymity in the Information Society - PAIS 2013, Genoa (Italy), Mar 2013. [DOI]
  • 2012

  • S. Hajian and J. Domingo-Ferrer, "A study on the impact of data anonymization on anti-discrimination", IEEE 12th International Conference on Data Mining, Brussels, Belgium, Dec 2012. [DOI] [PDF]
  • L. Zhang, Q. Wu, B. Qin and J. Domingo-Ferrer, "Practical privacy for value-added applications in vehicular ad hoc networks", The 6th International Conference on Network and System Security - NSS 2012, Wu Yi Shan, Fujian, China, Nov 2012. [DOI] [PDF]
  • L. Malina, J. Castellà-Roca, A. Vives-Guasch and J. Hajny, "Short-term Linkable Group Signatures with Categorized Batch Verification", 5th International Symposium on Foundations and Practice of Security - FPS 2012, Montreal, Canada, Oct 2012. [DOI]
  • A. Viejo, J. Castellà-Roca O.Bernado and J.M. Mateo-Sanz, "Single-party private web search", 10th Privacy, Security and Trust - PST2012, Paris, France, Oct 2012. [DOI] [PDF]
  • A. Erola and J. Castellà-Roca, "Anonimización de registros de búsqueda mediante la semántica de las consultas", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 279-284, ISBN: 978-84-615-9933, Sep 2012.
  • S. Hajian, J. Domingo-Ferrer and A. Martínez-Ballesté, "Antidiscriminación en la detección de delitos e intrusiones", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 63-68, ISBN: 978-84-615-9933, Sep 2012.
  • D. Castellà, C. Romero-Tris, A. Viejo, J. Castellà-Roca, F. Solsona and F. Giné, "Diseño de una red P2P optimizada para la privatización de consultas en WSEs", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 273-278, ISBN: 978-84-615-9933, Sep 2012. [PDF]
  • C. Romero-Tris, J. Castellà-Roca and A. Viejo, "Privacidad en Motores de Búsqueda con un Protocolo Multi-usuario con Atacantes Internos", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 285-290, ISBN: 978-84-615-9933, Sep 2012. [PDF]
  • J. Soria-Comas, J. Domingo-Ferrer and D. Rebollo-Monedero, "k-Anonimato Probabilístico", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 249-254, ISBN: 978-84-615-9933, Sep 2012.
  • A. Vives-Guasch, M. Mut-Puigserver, M. Magdalena Payeras-Capellà, J. Castellà-Roca and J.L. Ferrer-Gomila, "Sistema de billetes electrónicos anónimo y transferible", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 255-260, ISBN: 978-84-615-9933, Sep 2012.
  • R. Jardí-Cedó, X. Taixés-Ventosa and J. Castellà-Roca, "Un Método de Detección de Integridad de una Urna Digital en Grandes Elecciones", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 193-198, ISBN: 978-84-615-9933, Sep 2012. [PDF]
  • D. Megias and J. Domingo-Ferrer, "Fingerprinting automático de contenidos digitales inspirado en las secuencias de ADN", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 205-210, ISBN: 978-84-615-9933, Sep 2012.
  • S. Martínez, R. Tomàs, M. Valls and V. Mateu, "Criptografía ordenable para bases de datos", RECSI 2012, Donostia, Spain, In Actas de la XII Reunión Española sobre Criptología y Seguridad de la Información, pp. 35-40, ISBN: 978-84-615-9933, Sep 2012.
  • J. Soria-Comas and J. Domingo-Ferrer, "Differential privacy through knowledge refinement", ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2012), Amsterdam, The Netherlands, In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), pp. 702-707, ISBN: 978-1-4673-5638, Sep 2012. [DOI] [PDF]
  • B. Qin, H. Wang, Q. Wu, J. Liu and J. Domingo-Ferrer, "An Identity based Signcryption Scheme in the Standard Model", 4-th International Conference on Intelligent Networking and Collaborative Systems - INCOS 2012, Bucharest, Romania, Sep 2012. [DOI]
  • H. Wang, B. Qin and J. Domingo-Ferrer, "An Improved Binary Authentication Tree Algorithm for Vehicular Networks", 4-th International Conference on Intelligent Networking and Collaborative Systems - INCOS 2012, Bucharest, Romania, Sep 2012. [DOI] [PDF]
  • S. Martínez, D. Sánchez and A. Valls, "Towards k-anonymous non-numerical data via Semantic Resampling", Information Processing and Management of Uncertainty in Knowledge-Based Systems - IPMU 2012, Catania, Italy, In Proceedings of IPMU 2012, Part IV, CCIS 300, pp. 519-528, ISBN: 1865-0929, Jul 2012. [DOI] [PDF]
  • J. Domingo-Ferrer and J. Soria-Comas, "Differential privacy: optimal noise and data quality in SDC", EURO 2012: XXV European Conference on Operations Research, Vilnius, Lithuania, Jul 2012.
  • M. Bras-Amorós and A. Vico-Oton, "On the Maximal Gap of an Ideal and the Feng-Rao Numbers", Iberian Meeting on Numerical Semigroups, Vila-Real, Portugal, Jul 2012.
  • M. Bras-Amorós and A. Vico-Oton, "Non-homogeneous Patterns on Numerical Semigroups", Iberian Meeting on Numerical Semigroups, Vila-Real, Portugal, Jul 2012. [DOI]
  • J. Soria-Comas and J. Domingo-Ferrer, "Probabilistic k-anonymity through microaggregation and data swapping", FUZZ-IEEE 2012, IEEE International Conference on Fuzzy Systems, Brisbane, Australia, Jun 2012. [DOI] [PDF]
  • H. Wang, Y. Zhang and B. Qin, "Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers", 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications - IEEE TrustCom-12, Liverpool, UK, Jun 2012. [DOI]
  • A. Martínez-Ballesté, H. Rashwan, D. Puig and A. Paniza Fullana, "Toward a Trustworthy Privacy in Pervasive Video Surveillance Systems", IEEE International Conference on Pervasive Computing an Communications - PERCOM 2012, Mar 2012. [DOI]
  • K. Stokes and V. Torra, "n-Confusion: a generalization of k-anonymity", PAIS 2012, Berlin, Germany, Mar 2012. [DOI]
  • J. Herranz, F. Laguillaumie, B. Libert and C. Ràfols, "Short Attribute-Based Signatures for Threshold Predicates", RSA Conference, San Francisco, USA, Feb 2012. [DOI]
  • 2011

  • B. Qin, Q. Wu, J. Domingo-Ferrer and W. Susilo, "Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication", Third International Conf. on Intelligent Networking and Collaborative Systems - IEEE INCoS 2011, Fukuoka, Japan, Nov 2011. [DOI] [PDF]
  • R. Trujillo-Rasua, A. Martínez-Ballesté and A. Solanas, "Revisión de protocolos para la identificación escalable, segura y privada en sistemas RFID", 5as Jornadas Científicas sobre RFID, Tarragona, Spain, Nov 2011. [PDF]
  • C. Romero-Tris, A. Viejo and J. Castellà-Roca, "Improving query delay in private web search", International Workshop on Securing Information in Distributed Environments and Ubiquitous Systems - SIDEUS 2011, Barcelona, Spain, Oct 2011. [DOI] [PDF]
  • J. Domingo-Ferrer and R. Trujillo-Rasua, "Anonymization of Trajectory Data", 7th Joint UNECE/Eurostat Work Session on SDC, Tarragona, Catalonia, Oct 2011. [PDF]
  • R. Trujillo-Rasua and A. Solanas, "Scalable Trajectory-based Protocol for RFID Tags Identification", IEEE International Conference on RFID-Technology and Applications - RFID-TA 2011, Sitges (Spain), Sep 2011. [DOI] [PDF]
  • J.Meléndez, X.Gironés and D. Puig, "Supervised texture segmentation through a multi-level pixel-based classifier based on specifically designed filter", International Conference on Image Processing - ICIP 2011, Brussels, Belgium, In 2011 18th IEEE International Conference on Image Processing, pp. 2925-2928, ISBN: 978-1-4577-1302, Sep 2011. [DOI] [PDF]
  • C. Romero-Tris, J. Castellà-Roca and A. Viejo, "Multi-party private web search with untrusted partners", 7th International Conference on Security and Privacy in Communication Networks - SecureComm\'11, London, UK, In Lecture Notes of the Institute for Computer Sciences, Vol 96, pp. 261-280, ISBN: 1867-8211, Sep 2011. [DOI] [PDF]
  • M. Bras-Amorós and A. Vico-Oton, "On the Geil-Matsumoto Bound", Third International Castle Meeting on Coding Theory and Applications, Cardona, Spain, Sep 2011. [DOI]
  • M. Bras-Amorós, "Ordinarization Transform of a Numerical Semigroup", European Conference on Combinatorics, Graph Theory and Applications - EuroComb 2011, Budapest, Hungary, Sep 2011. [DOI]
  • A. P. Isern-Deyà, A.Vives-Guasch, M.M. Payeras-Capellà, M. Mut-Puigserver, J. Castellà-Roca, "Sistema de Tarificación Automático con Anonimato Revocable: Evaluación de Rendimiento", X Jornadas de Ingeniería Telemática - JITEL 2011, Santander, Spain, Sep 2011.
  • M. Bras-Amorós, "Semigroups, Codes, and Privacy Applications", Algebraic Geometry Modeling in Information Theory, Soria, Spain, Jul 2011.
  • K. Stokes and V. Torra, "On some clustering approaches for graphs", IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Taipei, Taiwan, Jun 2011. [DOI] [PDF]
  • J. Pujol-Ahullo, R. Jardi-Cedo, J. Castella-Roca, O. Farràs , "TTP SmartCard - based ElGamal Cryptosystem using Threshold Scheme for Electronic Elections ", Foundations & Practice of Security 2011 - FPS 2011, Paris, France, May 2011. [DOI] [PDF]
  • P. A. Pérez-Martinez and A. Solanas, "W3-privacy: the three dimensions of user privacy in LBS", Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing - MOBIHOC 2011, París, France, May 2011. [PDF]
  • S. Hajian, J. Domingo-Ferrer and A. Martínez-Ballesté, "Discrimination prevention in data mining for intrusion and crime detection", IEEE Symposium Series in Computational Intelligence in Cyber Security - CICS 2011, Paris, France, Apr 2011. [DOI] [PDF]
  • K. Stokes and M. Bras-Amorós, "On query self-submission in peer-to-peer user-private information retrieval", 4th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2011) collocate with EDBT/ICDT, Uppsala, Sweden, In Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, ISBN: 978-1-4503-0528, Mar 2011. [DOI]
  • J. Domingo-Ferrer, "Rational Enforcement of Digital Oblivion", 4th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2011) collocate with EDBT/ICDT, Uppsala, Sweden, In Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, ISBN: 978-1-4503-0528, Mar 2011. [DOI] [PDF]
  • 2010

  • B. Qin, L. Zhang, Q. Wu and J. Domingo-Ferrer, "Secure compression of privacy-preserving witnesses in vehicular ad hoc networks", 1st International Workshop on Vehicular Communications and Networking - VECON 2010, Nov 2010. [DOI]
  • J. Domingo-Ferrer, M. Sramka and R. Trujillo, "Privacy preserving Publication of Trajectories Using Microaggregation", SPRINGL 2010-3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, San José (USA), Nov 2010. [DOI] [PDF]
  • L. Zhang, Q. Wu, J. Domingo-Ferrer and B. Qin, "Hierarchical Certificateless Signatures", TrustCom 2010, Kowloon, Hong Kong, In Proceedings of TRUSTCOM 2010-IEEE/IFIP 8th Intl. Conference on Embedded and Ubiquitous Computing-EUC 2010, IEEE Computer Society Press, pp. 572-577, ISBN: 978-0-7695-4322, Nov 2010. [DOI] [PDF]
  • A. Vives-Guasch, J. Castellà-Roca, M. Payeras-Capellà and M. M. Puigserver, "An Electronic and secure automatic fare Collection system with revocable anonymity for users", 8th International conference on advances on Mobile computing and multimedia - MoMM 2010, Paris, France, Nov 2010. [DOI]
  • Q. Wu, B. Qin, L. Zhang and J. Domingo-Ferrer, "Ad hoc broadcast encryption", 17th ACM Conference on Computer and Communications Security - CCS 2010, Chicago (USA), Oct 2010. [DOI] [PDF]
  • A. Erola-Cañellas, J. Domingo-Ferrer and J. Castellà-Roca, "Ofuscación del per fil del usuario de un motor de búsqueda mediante una red social y protocolos criptográfi cos", XI Reunión Española sobre Criptología-RECSI 2010, Tarragona, Sep 2010.
  • A. Vives-Guasch, J. Castellà-Roca, M. Mut and M. Payeras-Capella, "Sistema de peajes electrónicos seguro con anonimato revocable", XI Reunión Española sobre Criptología-RECSI 2010, Tarragona, Sep 2010.
  • J. Domingo-Ferrer and Ú. González-Nicolás, "El juego de recuperación de información con privacidad de usuario por pares", XI Reunión Española sobre Criptología-RECSI 2010, Tarragona, Sep 2010.
  • M. Bras-Amoròs, A. Vico-Oton, "On the Size of the Colluder Set in Fingerprinting Attacks", XI Reunión Española sobre Criptología-RECSI 2010, Tarragona, Sep 2010.
  • F, Sebé, J.Pujolàs and T. Lairla, "Paralelización del algoritmo Rho de Pollard con requisitos de memoria negligibles", XI Reunión Española sobre Criptología y Seguridad de la Información, Tarragona, Sep 2010.
  • V. Mateu, J. M. Miret and F. Sebé, "Adaptación de una prueba de mezcla de votos para su uso con la cifra ElGamal", XI Reunión Española sobre Criptología y Seguridad de la Información, Tarragona, Sep 2010.
  • A. Fernández-Mir, J. Castellà-Roca and A. Viejo, "Protocolo de autenticación RFID escalable", Reunión Española sobre Criptología y Seguridad de la Información-RECSI 2010, Tarragona, Spain, Sep 2010.
  • R. Jardí-Cedó, J. Pujol-Ahulló, and J. Castellà-Roca, "Estudio de los sistemas de verificación para votaciones electrónicas presenciales", Reunión Española sobre Criptología y Seguridad de la Información-RECSI 2010, Tarragona, Spain, Sep 2010. [PDF]
  • G. Navarro-Arribas, V. Torra, A. Erola, J. Castellà-Roca, "Microagregación para la k-anonimidad en logs de buscadores Web", Reunión Española sobre Criptología y Seguridad de la Información-RECSI 2010, Tarragona, Spain, Sep 2010.
  • M. Bras-Amoròs, K. Stokes, M. Greferath, "Problems Related to Combinatorial Con figurations with Applications to P2P-User Private Information Retrieval", 19th International Symposium on Mathematical Theory of Networks and Systems - MTNS 2010, Budapest, Hungary, Jul 2010.
  • J. M. Miret, D. Sadornil, F. Sebé, J. G. Tena, "Caminos de isogenias entre curvas elípticas sobre cuerpos finitos", VII Jornadas de Matemática Discreta y Algorítmica, Castro Urdiales, Spain, Jul 2010.
  • J. Pujol-Ahulló, R. Jardí-Cedó, J. Castellà-Roca, "Verification Systems for Electronic Voting: A Survey", 4th International Conference on Electronic Voting - EVOTE2010, Bregenz, Austria, Jul 2010. [PDF]
  • A. Solanas, U. Gonzáles-Nicolás and A. Martínez-Ballesté, "A variable-MDAV-based partitioning strategy to continuous multivariate microaggregation with genetic algorithms", The 2010 International Joint Conference on Neural Networks (IJCNN 2010) , Barcelona, Spain, Jul 2010. [DOI] [PDF]
  • M. Sramka, "A privacy attack that removes the majority of the noise from perturbed data", The 2010 International Joint Conference on Neural Networks (IJCNN 2010), Barcelona, Spain, Jul 2010. [DOI] [PDF]
  • M. Bras-Amoròs and K. Stokes, "On the existence of combinatorial configurations", 3rd International Workshop on Optimal Network Topologies (IWONT), Barcelona, Spain, Jun 2010.
  • R. Trujillo Rasua B. Martin and G. Avoine, "The Poulidor Distance-Bounding Protocol", Workshop on RFID Security -- RFIDSec10, Istanbul (Turkey), Jun 2010. [DOI] [PDF]
  • J. Domingo-Ferrer and K.Stokes, "The zeta function and data mining", Second workshop on zeta functions in algebra and geometry, Palma de Mallorca, Spain, May 2010.
  • M. Sramka, R. Safavi-Naini, J. Denzinger, M. Askari, "A Practice-oriented Framework for Measuring Privacy and Utility in Data Sanitization Systems", 3rd International Workshop on Privacy and Anonymity in the Information Society (PAIS 2010) collocated with EDBT/ICDT, Lausanne (Switzerland), Mar 2010. [DOI] [PDF]
  • K. Stokes and M. Bras-Amorós, "The semigroup of combinatorial configurations", Iberian meeting on numerical semigroups, Granada (Spain), Feb 2010. [DOI]
  • 2009

  • M.Sramka, R. Safavi-Naini, J. Denzinger, "An Attack on the Privacy of Sanitized Data That Fuses the Outputs of Multiple Data Miners", International workshop on Privacy Aspects of Data Mining (PADM 2009) collocated with 9th IEEE Intern, Miami Beach, USA, Dec 2009. [DOI] [PDF]
  • J.Domingo-Ferrer, "Weighted Network Decapitation: The Economics of Iterated Attack and Defense", ACM First International Workshop on Privacy and Anonymity for Very Large Datasets (PAVLAD 2009) with, Hong Khon, China, Nov 2009. [DOI]
  • P. A. Pérez-Martínez and A. Solanas, "Location Privacy Through Users? Collaboration: A Distributed Pseudonymizer", Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies - , Sliema, Malta, Oct 2009. [DOI]
  • C. Mauri, A. Solanas, T. Granollers, N. Parés, J. Bag´es and M. García, "Entorno Activo Multimodal para Personas con Paralisis Cerebral", IV Jornadas Iberoamericanas de Tecnologíaas de Apoyo a la Discapacidad, Madrid, Spain, Oct 2009.
  • S. Bermudo, J. A. Rodríguez Velázquez, J. M. Sigarreta and I. G. Yero, "On geodetic set of a graph", Colouring, Independence and Domination: A Workshop on Graph Theory (CID-2009), Szklarska Poreba (Poland), Sep 2009.
  • J. M. Sigarreta, I.. G. Yero, S. Bermudo and J. A. Rodríguez, "On decomposition of graphs into offensive k-alliances", Cologne-Twente Workshop on Graphs and Combinatorial Optimization (CTW-09), Paris (France), Jun 2009.
  • W. Chen, B. Qin, Q. Wu, L. Zhang and H. Zhang, "ID-based Partially Blind Signatures: A Scalable Solution to Multi-Bank E-Cash", International Conference on Signal Processing Systems - ICSPS 2009, Singapore, Singapore, May 2009. [DOI] [PDF]
  • A. Viejo, F. Sebé and J. Domingo-Ferrer, "Aggregation of trustworthy announcement messages in vehicular ad hoc networks", 2009 IEEE 69th Vehicular Technology Conference VTC2009-Spring, Barcelona (Spain), Apr 2009. [DOI] [PDF]
  • J. Domingo-Ferrer and D. Rebollo-Monedero, "Measuring risk and utility of anonymized data using information theory", 2nd International Workshop on Privacy and Anonymity in the Information Society (PAIS 2009) collocate with EDBT/ICDT, Saint-Petersburg (Russia), Mar 2009. [DOI]
  • M. Bras-Amorós, J. Domingo-Ferrer and K. Stokes, "Configuraciones combinatóricas y recuperación privada de información por pares", Nuevos Avances en Criptografía y Codificación de la Información - RSME 2009, Oviedo (Spain), Feb 2009.
  • D. Rebollo-Monedero, J. Forné, L. Subirats, A. Solanas and A. Martínez-Ballesté, "A collaborative protocol for private retrieval of location-based information", IADIS International Conference e-Society 2009, Barcelona (Spain), Feb 2009. [PDF]
  • 2008

  • R. Di Pietro, D. Ma, C. Soriente and G. Tsudik, "POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks", 27th International Symposium on Reliable Distributed Systems - IEEE SRDS 2008, Napoli (Italy), Oct 2008. [DOI] [PDF]
  • A. Solanas, J. Domingo-Ferrer and A. Martínez-Ballesté, "Location Privacy in Location-Based Services: Beyond TTP-based Schemes", 1st International Workshop on Privacy in Location-Based Applications (PILBA 2008) within 13th Europe, Málaga (Spain), Oct 2008. [PDF]
  • U. González-Nicolás Gambí­n and A. Solanas, "Protección de la Privacidad mediante Microagregación Multivariante basada en Algoritmos Genéticos: Selección por Ruleta vs. Selección Uniforme", Reunión Española de Criptologí­a y Seguridad de la Información (RECSI), Sep 2008. [PDF]
  • G. Pujol, A. Martí­nez-Ballesté, J.M. Mateo-Sanz and A.Solanas, "Postprocesado para Microagregación Multivariante: Un estudio con datos reales ", Reunión Española de Criptologí­a y Seguridad de la Información (RECSI), Sep 2008. [PDF]
  • Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik, "Scalable and Efficient Provable Data Possession", International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Sep 2008. [DOI] [PDF]
  • Roberto Di Pietro and Andrea Cirulli, "PEAC: A Probabilistic, Efficient and resilient Authentication protocol for broadcast Communications", International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Sep 2008. [DOI]
  • Alessandro Colantonio, Roberto Di Pietro and Alberto Ocello, "Leveraging Lattices to Improve Role Mining", IFIP International Information Security Conference (SEC 2008), Sep 2008.
  • Roberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica and Luigi V. Mancini, "A Live Digital Forensic System for Windows Network", IFIP International Information Security Conference (SEC 2008), Sep 2008. [DOI]
  • Michele Albano, Steano Chessa and Roberto Di Pietro, "Information Assurance in Critical Infrastructures via Wireless Sensor Networks", International Conference on Information Assurance and Security (IAS 2008), Sep 2008. [DOI] [PDF]
  • Vanesa Daza, Josep Domingo-Ferrer and Francesc Sebé, "Votación electrónica tolerante a fallos para escenarios móviles", Reunión Española de Criptologí­a y Seguridad de la Información (RECSI), Sep 2008.
  • Francesc Sebé and Josep Domingo-Ferrer, "Un sistema de marca de agua de espectro expandido tolerante a ataques de transposición y supresión", Reunión Española de Criptologí­a y Seguridad de la Información (RECSI), Sep 2008.
  • F. Sebé, J. Domingo-Ferrer and A. Solanas, "Un nuevo modelo de anonimato para microdatos", VI Jornadas de Matemática Discreta y Algorí­timica, Jul 2008.
  • J.M. Mateo-Sanz, C. Olive, D. Puigjaner and A. Solanas, "Una nueva metodologí­a docente para la enseñanza-aprendizaje en entornos virtuales: el caso de la Estadí­stica", Congreso Internacional de Docencia Universitaria e Innovación, Jul 2008.
  • M. Bras-Amorós, J. Domingo-Ferrer, "On Overlapping of Digital Straight Lines", VI Jornadas de Matemática Discreta y Algorí­timica, Jul 2008.
  • M. Bras-Amorós, "Bounding the Number of Numerical Semigroups of a Given Genus by Means of Generating Trees", VI Jornadas de Matemática Discreta y Algorí­timica, Jul 2008.
  • Vicenç Torra, Sadaaki Miyamoto, Yasunori Endo and Josep Domingo-Ferrer, "On Intuitionistic fuzzy clustering for its application to privacy", International Conference on Fuzzy Systems (FUZZ 2008), Jul 2008. [DOI] [PDF]
  • M. Gheorghita, A. Solanas and J.Forne, "Location Privacy in Chain-Based Protocols for Location-Based Services", The Third International Conference on Digital Telecommunications (ICDT08), Bucharest (Romania), Jul 2008. [DOI] [PDF]
  • Agusti Solanas, Glòria Pujol, Antoni Martí­nez Ballesté and Josep M. Mateo-Sanz, "A Post-processing Method to Lessen k-Anonymity Dissimilarities", 1st International Workshop on Privacy and Security by means of Artificial Intelligence (PSAI), Mar 2008. [DOI] [PDF]
  • Agusti Solanas, Francesc Sebé and Josep Domingo-Ferrer, "Micro-aggregation-Based Heuristics for p-sensitive k-anonymity: One Step Beyond", 1st International Workshop on Privacy and Anonymity in the Information Society (PAIS) collocated with EDBT/ICDT, Mar 2008. [DOI] [PDF]
  • Josep Domingo-Ferrer and Vicenç Torra, "A critique of k-anonimity and some of its enhacements", Proceedings of ARES/PSAI 2008, Mar 2008. [DOI] [PDF]
  • M. Bras-Amorós, "Results on Numerical Semigroups with Applications to Algebraic Geometry Codes", Iberian Meeting on Numerical Semigroups, Mar 2008.
  • M. Bras-Amorós, "Optimized Evaluation Codes Guaranteeing Correction of Generic Errors", 4th Workshop on Coding and Systems, Mar 2008.
  • 2007

  • Antoni Martinez-Balleste and Agusti Solanas, "Privacy in the Information and Communication Technologies", IEEE Intl. Conf. on Granular Computing, Nov 2007. [PDF]
  • Agusti Solanas, "A Study of Convex Hull Intersection in Clustering with Cardinality Constraints", XXX Congreso Nacional de Estadí­stica e Investigación Operativa, Sep 2007. [PDF]
  • Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer y Jesús Manjón, "Comunicaciones Privadas en Redes Ad-hoc Vehiculares", Actas del II Simposio sobre Seguridad Informática (CED'07), Zaragoza (Spain), Sep 2007. [PDF]
  • Jordi Aragones, Antoni Martinez-Ballesté and Agusti Solanas, "A Brief Survey on RFID Privacy and Security", World Congress on Engineering WCE-07, Jul 2007. [PDF]
  • Antoni Martí­nez-Ballesté, Agusti Solanas, Josep Domingo-Ferrer and Josep M. Mateo-Sanz, "A genetic approach to multivariate microaggregation for database privacy", 23rd International Conference on Data Engineering. Workshop on Privacy Data Management, Apr 2007. [DOI] [PDF]
  • Cesar Mauri, T. Granollers and Agusti Solanas, "On the Assessment of the Interaction Quality of Users with Cerebral Palsy", Second International Conference on Availability, Reliability and Security (ARES 2007), Apr 2007. [DOI] [PDF]
  • 2006

  • Cesar Mauri, Toni Granollers, Jesús Lorés and Agusti Solanas, "La Accesibilidad en Telecentros Públicos: Una Experiencia Real", Interacció 2006, Nov 2006.
  • Jordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer and Francesc Sebé, "Cálculo distribuido de permutaciones y sus aplicaciones al juego electrónico", Actas de la Reunión Española sobre Criptologí­a y Seguridad de la Información-RECSI 2006, Sep 2006. [PDF]
  • Agusti­ Solanas, Antoni Martí­nez-Ballesté, Josep Domingo-Ferrer and Susana Bujalance, "Privacidad en bases de datos: k-anonimato a través de la microagregación", Actas de la Reunión Española sobre Criptologí­a y Seguridad de la Información-RECSI 2006, Sep 2006. [PDF]
  • Agusti Solanas, Antoni Martí­nez-Ballesté, Josep M. Mateo-Sanz and Josep Domingo-Ferrer, "Multivariate microaggregation based on genetic algorithms", IEEE IS 2006, Varna (Bulgaria), In Proceedings of the 3rd IEEE Conference on Intelligent Systems , ISBN: 1-4244-0196-8, Sep 2006. [DOI] [PDF]
  • Agusti Solanas, Antoni Martí­nez-Ballesté, Josep Domingo-Ferrer, "V-MDAV: A multivariate microaggregation with variable group size", COMPSTAT2006, Rome (Italy), In Proceedings of COMPSTAT2006, ISBN: 3-7908-1708-2, Aug 2006. [PDF]
  • Vicenç Torra and Josep Domingo-Ferrer, "Establishing a benchmark for re-identification methods and its validation using fuzzy clustering", 2006 IEEE World Congress on Computational Intelligence, Jul 2006. [DOI] [PDF]
  • Josep Domingo-Ferrer, Vicenç Torra, Josep M. Mateo-Sanz and Francesc Sebé, "Re-identification and synthetic data generators: a case study", Information Processing and Management of Uncertainty in Knowledge-Based Systems-IPMU2006, Paris (France), Jul 2006. [PDF]
  • Jordi Castellà-Roca, Josep Domingo-Ferrer and Francesc Sebé, "On the security of a repaired mental poker protocol", 3rd Intl. Conf. on Information Technology: New Generations-ITNG2006, Las Vegas (USA), Apr 2006. [DOI] [PDF]
  • Josep Domingo-Ferrer, Agusti­ Solanas and Antoni Martí­nez-Ballesté, "Privacy in statistical databases: k-anonymity through microaggregation", Proceedings of IEEE Granular Computing 2006, Jan 2006. [DOI] [PDF]
  • Jordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer and Francesc Sebé, "Privacy homomorphisms for e-gambling and mental poker", IEEE Granular Computing 2006, In Proceedings of IEEE Granular Computing 2006, pp. 788-791, ISBN: 1-4244-0133-X, Jan 2006. [DOI] [PDF]
  • Agusti Solanas, Antoni Martinez-Ballesté, Josep M. Mateo-Sanz and Josep Domingo-Ferrer, "A 2d-tree-based blocking method for microaggregating very large data sets", ARES/DAWAM2006, Vienna (Austria), In Proceedings of ARES/DAWAM2006, pp. 922-928, ISBN: 0-7695-2567-9, Jan 2006. [DOI] [PDF]
  • 2005

  • Josep Domingo-Ferrer, Francesc Sebé and Antoni Martí­nez-Ballesté, "On multicast fingerprinting and collusion security", 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distri, Nov 2005. [DOI] [PDF]
  • A. Solanas, E. Romero, S. Gómez, J. M. Sopena, R. Alquézar and J. Domingo-Ferrer, "Feature selection and outlier detection with genetic algorithms and neural networks", 8th Catalan Conference on Artificial Intelligence, Alguer (Italy), Oct 2005. [PDF]
  • Agusti Solanas, Josep Domingo-Ferrer, Francesc Sebé and Susana Bujalance, "Un nuevo sistema de marca de agua para bases de datos numéricas", III Simposio Español de Comercio Electrónico SCE05, Jun 2005. [PDF]
  • Josep Domingo-Ferrer, "k-Anonymat par micro-agrégation", Actes du Quatriéme Colloque francophone sur les sondages, Jan 2005. [PDF]
  • Francesc Sebé, Josep Domingo-Ferrer, Agusti Solanas and Susana Bujalance, "Marcaje robusto de datos numéricos", I Simposio sobre Seguridad Informática-SSI05, Granada (Spain), In Actas del I Simposio sobre Seguridad Informática-SSI05, pp. 69-74, ISBN: 84-9732-447-1, Jan 2005. [PDF]
  • Joaquin Garcia, Fréderic Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, and Jose A. Ortega-Ruiz, "Protecting on-line casinos against fraudulent player drop-out", EEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2005, Jan 2005. [DOI] [PDF]
  • Jordi Castellà-Roca, Guillermo Navarro, Jose A. Ortega-Ruiz and Joaquin Garcí­a, "Digital chips for an on-line casino", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2005, Jan 2005. [DOI] [PDF]
  • 2004

  • Joaquim Camps, Antoni Martí­nez-Ballesté y Josep Domingo-Ferrer, "Análisis Crí­tico de los sistemas de huella digital para multicast", VIII Reunión Española sobre Criptología y Seguridad de la Información - RECSI 2004, Jan 2004. [PDF]
  • Jordi Castellà-Roca, Francesc Sebé and Josep Domingo-Ferrer, "Abandono de jugadores en esquemas distribuidos de juego de cartas", VIII Reunión Española sobre Criptología y Seguridad de la Información - RECSI 2004, Jan 2004. [PDF]
  • Josep Domingo-Ferrer, "Discussion on new data release techniques", Proceedings of the 3rd Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality, Monog, Jan 2004. [DOI] [PDF]
  • Vicenç Torra, Josep Domingo-Ferrer and Àngel Torres, "Data mining methods for linking data coming from several sources", Proceedings of the 3rd Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality, Monog, Jan 2004. [PDF]
  • Anna Oganian, Josep Domingo-Ferrer and Vicenç Torra, "Internal intrusion scenarios in inference control of tabular databases", Information Processing and Management of Uncertainty in Knowledge-Based Systems-IPMU2004, Jan 2004. [PDF]
  • Antoni Martí­nez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer, "Secure large-scale bingo", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2004, Jan 2004. [DOI] [PDF]
  • J. Herrera-Joancomarti, J. Prieto-Blàzquez and J. Castellà-Roca, "A secure electronic examination protocol using wireless networks", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC 2004, Jan 2004. [DOI] [PDF]
  • Antoni Martí­nez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer, "Computer skills training to (mililed-aged) adults: problems and program", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2004, Jan 2004. [DOI] [PDF]
  • Jordi Castellà-Roca and Josep Domingo-Ferrer, "A non-repudiable bitstring commitment scheme based on a public-key cryptosystem", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2004, Jan 2004. [DOI] [PDF]
  • Jordi Castellà-Roca and Josep Domingo-Ferrer, "On the security of an efficient TTP-free mental poker protocol", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2004, Jan 2004. [DOI] [PDF]
  • 2003

  • Antoni Martí­nez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer, "Aspectos prácticos de la protección de propiedad intelectual en contenidos multimedia", Actas del II Simposio Español de Comercio Electrónico, Jan 2003. [PDF]
  • Josep Domingo-Ferrer, "Networking in the new ICT curricula", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2003, Jan 2003. [DOI] [PDF]
  • Josep Domingo-Ferrer, Antoni Martí­nez-Ballesté and Francesc Sebé, "MINPAY: a Multi-device INternet PAY-as-you-watch system", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2003, Jan 2003. [DOI] [PDF]
  • 2002

  • Francesc Sebé and Josep Domingo-Ferrer, "Códigos para huella digital seguros contra confabulaciones de hasta tres atacantes", Actas de la VII Reunión Española sobre Criptologí­a y Seguridad de la Información, Jan 2002.
  • Josep Domingo-Ferrer and Anna Oganian, "Una medida de riesgo de revelación basada en teorí­a de la información para secreto estadí­stico de datos tabulares", Actas de la VII Reunión Española sobre Criptologí­a y Seguridad de la Información, Jan 2002.
  • Josep Domingo-Ferrer, Anna Oganian and Vicenç Torra, "Information-theoretic disclosure risk measures in statistical disclosure control of tabular data", Proceedings of the 14th Intl. Conf. on Scientific and Statistical DataBase Management, Jan 2002. [DOI] [PDF]
  • Josep Domingo-Ferrer, Antoni Martí­nez-Ballesté and Francesc Sebé, "MICROCAST: Smart card based (micro)pay-per-view for multicast services", Proceedings of IFIP/USENIX 5th Smart Card Research and Advanced Application Conference-CARDIS2002, Jan 2002. [PDF]
  • Josep Domingo-Ferrer and Antoni Martí­nez-Ballesté, "STREAMOBILE: Pay-per-view video streaming to mobile devices over the Internet", Proceedings of the 13th International Workshop on Database and Expert Systems Applications DEXA2, Jan 2002. [DOI] [PDF]
  • Josep Domingo-Ferrer and Vicenç Torra, "Extending microaggregation procedures using defuzzification methods for categorical variables", Proceedings of the First International Symposium on Intelligent Systems (IS2002), Jan 2002. [DOI] [PDF]
  • Josep Domingo-Ferrer and Vicenç Torra, "Approximating fuzzy measures by hierarchically decomposable ones", Proceedings of the Fifth International Conference on Information Fusion. FUSION2002, Jan 2002. [DOI] [PDF]
  • Josep Domingo-Ferrer and Francesc Sebé, "Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2002, Jan 2002. [DOI] [PDF]
  • Josep Domingo-Ferrer and Francesc Sebé, "Enhancing watermark robustness through mixture of watermarked digital objects", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2002, Jan 2002. [DOI] [PDF]
  • 2001

  • Josep Domingo-Ferrer, Josep M. Mateo-Sanz and Vicenç Torra, "Comparing SDC methods for microdata on the basis of information loss and disclosure risk", Pre-proceedings of ETK-NTTS2001, Jan 2001. [PDF]
  • Josep Domingo-Ferrer, Josep M. Mateo-Sanz and Francesc Sebé, "Watermarking for multilevel access to statistical databases", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2001, Jan 2001. [DOI] [PDF]
  • 2000

  • Josep Domingo-Ferrer, Jordi Herrera Joancomartí­ and Francesc Sebé, "Un esquema de watermarking robusto para imágenes", VI Reunión sobre Criptologí­a y Seguridad de la Información - RECSI 2000, Jan 2000.
  • Josep Domingo-Ferrer and Jordi Herrera Joancomartí­, "Códigos duales de Hamming para esquemas de fingerprinting seguros contra confabulaciones", VI Reunión sobre Criptologí­a y Seguridad de la Información - RECSI 2000, Jan 2000.
  • Jordi Castellà, Jordi Planes, Josep Domingo-Ferrer and Jordi Herrera Joancomartí­, "Análisis comparativo de tarjetas Java para aplicaciones de comercio electrónico", VI Reunión sobre Criptologí­a y Seguridad de la Información - RECSI 2000, Jan 2000. [PDF]
  • Josep Domingo-Ferrer, Josep M. Mateo-Sanz and R. X. Sánchez del Castillo, "Cryptographic techniques in statistical data protection", Proceedings of the Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality, Jan 2000.
  • Jordi Castellà, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí­ and Jordi Planes, "A performance comparison of Java Cards for micropayment implementation", Smart Card Research and Advanced Application-Proc. of IFIP CARDIS2000, Jan 2000. [DOI] [PDF]
  • Josep Domingo-Ferrer and Jordi Herrera-Joancomartí, "Simple collusion-secure fingerprinting schemes for images", IEEE Intl. Conf. on Information Technology: Coding and Computing-ITCC2000, Jan 2000. [DOI] [PDF]
  • 1998

  • Josep M. Mateo-Sanz and Josep Domingo-Ferrer, "A method for data-oriented multivariate microaggregation", Statistical data protection - SDP 1998, Lisbon, In Statistical data protection. Proceedings of the conference, pp. 89-99, ISBN: 92-828-1712-1, Mar 1998. [DOI] [PDF]
  • J. Castilla, J. Domingo-Ferrer and R. X. Sánchez del Castillo, "Dike: A Prototype for Secure Delegation of Statistical Data", Statistical data protection - SDP 1998, Lisbon (Portugal), In Statistical data protection. Proceedings of the conference, pp. 177-186, ISBN: 92-828-1712-1, Mar 1998. [PDF]
  • Josep Domingo-Ferrer, "Marcaje anónimo de información con identificación automática de compradores deshonestos", Actas de la V Reunión Española sobre Criptologí­a y Seguridad de la Información, Jan 1998.
  • Josep Domingo-Ferrer and Jordi Herrera-Joancomartí­, "Un homomorfismo de privacidad entre cuerpos basado en fracciones de Farey", Actas de la V Reunión Española sobre Criptologí­a y Seguridad de la Información, Jan 1998.
  • 1996

  • Josep Domingo-Ferrer and Josep M. Mateo-Sanz, "On the security of cell suppression in contingency tables with quantitative factors", Proceedings of the 3rd International Seminar on Statistical Confidentiality, Jan 1996. [PDF]
  • Josep Domingo-Ferrer, "Privacy homomorphisms for subcontracting statistical computation", Proceedings of the 3rd International Seminar on Statistical Confidentiality, Jan 1996. [PDF]
  • Josep Domingo-Ferrer, "Un homomorfismo de privacidad aditivo y multiplicativo", Actas de la IV Reunión Española sobre Criptologí­a, Jan 1996.
  • Josep Domingo-Ferrer, "Multi-application smart cards and encrypted data processing", Smart Card Research and Advanced Application - CARDIS1996, Jan 1996. [DOI] [PDF]