Search the dblp DataBase
Josep Domingo-Ferrer :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Agusti Solanas , Antoni Martínez-Ballesté , Josep Domingo-Ferrer , Josep Maria Mateo-Sanz A 2d -Tree-Based Blocking Method for Microaggregating Very Large Data Sets. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:922-928 [Conf ] Francesc Sebé , Josep Domingo-Ferrer Short 3-Secure Fingerprinting Codes for Copyright Protection. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:316-327 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer , Francesc Sebé A Smart Card-Based Mental Poker System. [Citation Graph (0, 0)][DBLP ] CARDIS, 2006, pp:48-61 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer , Jordi Herrera-Joancomartí , Jordi Planes A Performance Comparison of Java Cards for Micropayment Implementation. [Citation Graph (0, 0)][DBLP ] CARDIS, 2000, pp:19-38 [Conf ] Josep Domingo-Ferrer Multi-Application Smart Cards and Encrypted Data Processing. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] Josep Domingo-Ferrer , Jordi Herrera-Joancomartí Efficient Smart-Card Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:221-228 [Conf ] Josep Domingo-Ferrer , Antoni Martínez-Ballesté , Francesc Sebé MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services. [Citation Graph (0, 0)][DBLP ] CARDIS, 2002, pp:125-134 [Conf ] Josep Domingo-Ferrer , Vicenç Torra Validating Distance-Based Record Linkage with Probabilistic Record Linkage. [Citation Graph (0, 0)][DBLP ] CCIA, 2002, pp:207-215 [Conf ] M. Mar Albà , Josep Domingo-Ferrer , Francesc Sebé Asynchronous Large-Scale Certification Based on Certificate Verification Trees. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Josep Domingo-Ferrer , Antoni Martínez-Ballesté STREAMOBILE: Pay-per-View Video Streaming to Mobile Devices Over the Internet. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2002, pp:418-422 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer , Miguel Soriano Practical Asymmetric Fingerprinting with a TTP. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:352-356 [Conf ] Josep Domingo-Ferrer , Llorenç Huguet i Rotger A cryptographic tool for programs protection. [Citation Graph (0, 0)][DBLP ] EUROCODE, 1990, pp:227-240 [Conf ] Josep Domingo-Ferrer Software Run-Time Protection: A Cryptographic Issue. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:474-480 [Conf ] Josep Domingo-Ferrer Untransferable Rights in a Client-Independent Server Environment. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:260-266 [Conf ] Josep Domingo-Ferrer , Llorenç Huguet i Rotger Full Secure Key Exchange and Authentication with no Previously Shared Secrets. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:665-669 [Conf ] Josep Domingo-Ferrer On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:180-190 [Conf ] Josep Domingo-Ferrer , Ricardo X. Sanchez del Castillo An implementable scheme for secure delegation of computing and data. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:445-451 [Conf ] Ramesh A. Dandekar , Josep Domingo-Ferrer , Francesc Sebé LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection. [Citation Graph (0, 0)][DBLP ] Inference Control in Statistical Databases, 2002, pp:153-162 [Conf ] Josep Domingo-Ferrer Advances in Inference Control in Statistical Databases: An Overview. [Citation Graph (0, 0)][DBLP ] Inference Control in Statistical Databases, 2002, pp:1-7 [Conf ] Francesc Sebé , Josep Domingo-Ferrer , Josep Maria Mateo-Sanz , Vicenç Torra Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets. [Citation Graph (0, 0)][DBLP ] Inference Control in Statistical Databases, 2002, pp:163-171 [Conf ] Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:17-29 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer , Andreu Riera , Joan Borrell Practical Mental Poker Without a TTP Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:280-294 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Secure Many-to-One Transmission of q-ary Symbols. [Citation Graph (0, 0)][DBLP ] INTELLCOMM, 2004, pp:85-91 [Conf ] Josep Domingo-Ferrer A Provably Secure Additive and Multiplicative Privacy Homomorphism. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:471-483 [Conf ] Josep Domingo-Ferrer , Jordi Herrera-Joancomartí Spending Programs: A Tool for Flexible Micropayments. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:1-13 [Conf ] Francesc Sebé , Josep Domingo-Ferrer Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. [Citation Graph (0, 0)][DBLP ] ISC, 2001, pp:420-432 [Conf ] Francesc Sebé , Josep Domingo-Ferrer , Jordi Herrera-Joancomartí Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:44-53 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:778-780 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer On the Security of an Efficient TTP-Free Mental Poker Protocol. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:781-0 [Conf ] Josep Domingo-Ferrer Networking in the New ICT Curricula. [Citation Graph (0, 0)][DBLP ] ITCC, 2003, pp:20-24 [Conf ] Josep Domingo-Ferrer , Jordi Herrera-Joancomartí Simple Collusion-Secure Fingerprinting Schemes for Images. [Citation Graph (0, 0)][DBLP ] ITCC, 2000, pp:128-132 [Conf ] Josep Domingo-Ferrer , Josep Maria Mateo-Sanz , Francesc Sebé Watermarking for Multilevel Access to Statistical Databases. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:243-248 [Conf ] Josep Domingo-Ferrer , Francesc Sebé Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:85-89 [Conf ] Josep Domingo-Ferrer , Francesc Sebé Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:152-157 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Computer Skills Training to (Middle-aged) Adults: Problems and Program. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:146-150 [Conf ] Antoni Martínez-Ballesté , Josep Domingo-Ferrer , Francesc Sebé MINPAY: a Multi-device INternet PAY-as-you-watch system. [Citation Graph (0, 0)][DBLP ] ITCC, 2003, pp:258-262 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Secure Large-Scale Bingo. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:758-762 [Conf ] Jordi Castellà-Roca , Josep Domingo-Ferrer , Francesc Sebé On the Security of a Repaired Mental Poker Protocol. [Citation Graph (0, 0)][DBLP ] ITNG, 2006, pp:664-668 [Conf ] Francesc Sebé , Josep Domingo-Ferrer , Agusti Solanas Noise-Robust Watermarking for Numerical Datasets. [Citation Graph (0, 0)][DBLP ] MDAI, 2005, pp:134-143 [Conf ] Agusti Solanas , Josep Domingo-Ferrer Watermarking Non-numerical Databases. [Citation Graph (0, 0)][DBLP ] MDAI, 2006, pp:239-250 [Conf ] Josep Maria Mateo-Sanz , Josep Domingo-Ferrer , Vicenç Torra Object Positioning Based on Partial Preferences. [Citation Graph (0, 0)][DBLP ] MDAI, 2004, pp:252-259 [Conf ] Josep Domingo-Ferrer , Antoni Martínez-Ballesté , Francesc Sebé Secure Reverse Communication in a Multicast Tree. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:807-816 [Conf ] Josep Domingo-Ferrer Microaggregation for Database and Location Privacy. [Citation Graph (0, 0)][DBLP ] NGITS, 2006, pp:106-116 [Conf ] Josep Domingo-Ferrer Anonymous Fingerprinting Based on Committed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:43-52 [Conf ] Josep Domingo-Ferrer , Francesc Sebé Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2006, pp:129-138 [Conf ] Josep Domingo-Ferrer , Francesc Sebé , Jordi Castellà-Roca On the Security of Noise Addition for Privacy in Statistical Databases. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2004, pp:149-161 [Conf ] Josep Maria Mateo-Sanz , Antoni Martínez-Ballesté , Josep Domingo-Ferrer Fast Generation of Accurate Synthetic Microdata. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2004, pp:298-306 [Conf ] Josep Maria Mateo-Sanz , Francesc Sebé , Josep Domingo-Ferrer Outlier Protection in Continuous Microdata Masking. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2004, pp:201-215 [Conf ] Vicenç Torra , John M. Abowd , Josep Domingo-Ferrer Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment. [Citation Graph (0, 0)][DBLP ] Privacy in Statistical Databases, 2006, pp:233-242 [Conf ] Josep Domingo-Ferrer , Anna Oganian , Vicenç Torra Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data. [Citation Graph (0, 0)][DBLP ] SSDBM, 2002, pp:227-231 [Conf ] Jordi Castellà-Roca , Francesc Sebé , Josep Domingo-Ferrer Dropout-Tolerant TTP-Free Mental Poker. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:30-40 [Conf ] Antoni Martínez-Ballesté , Francesc Sebé , Josep Domingo-Ferrer Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:261-268 [Conf ] Josep Domingo-Ferrer , Pieter H. Hartel Current directions in smart cards. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:4, pp:377-379 [Journal ] Francesc Sebé , Josep Domingo-Ferrer Scalability and security in biased many-to-one communication. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:1, pp:1-13 [Journal ] Josep Domingo-Ferrer Algorithm- sequenced access control. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:7, pp:639-652 [Journal ] Josep Maria Mateo-Sanz , Josep Domingo-Ferrer , Francesc Sebé Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:2, pp:181-193 [Journal ] Josep Domingo-Ferrer , Vicenç Torra Privacy in Data Mining. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:2, pp:117-119 [Journal ] Josep Domingo-Ferrer , Vicenç Torra Ordinal, Continuous and Heterogeneous k -Anonymity Through Microaggregation. [Citation Graph (0, 0)][DBLP ] Data Min. Knowl. Discov., 2005, v:11, n:2, pp:195-212 [Journal ] Josep Domingo-Ferrer Achieving Rights Untransferability with Client-Independent Servers. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:8, n:3, pp:263-271 [Journal ] Josep Domingo-Ferrer , Vicenç Torra Median-based aggregation operators for prototype construction in ordinal scales. [Citation Graph (0, 0)][DBLP ] Int. J. Intell. Syst., 2003, v:18, n:6, pp:633-655 [Journal ] Aïda Valls , Vicenç Torra , Josep Domingo-Ferrer Semantic-based aggregation for statistical disclosure control. [Citation Graph (0, 0)][DBLP ] Int. J. Intell. Syst., 2003, v:18, n:9, pp:939-951 [Journal ] Josep Domingo-Ferrer , Vicenç Torra A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection. [Citation Graph (0, 0)][DBLP ] International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:545-556 [Journal ] Josep Domingo-Ferrer , Josep Maria Mateo-Sanz , Anna Oganian , Aánge Torres On the Security of Microaggregation with Individual Ranking: Analytical Attacks. [Citation Graph (0, 0)][DBLP ] International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:477-492 [Journal ] Vicenç Torra , Josep Domingo-Ferrer Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases. [Citation Graph (0, 0)][DBLP ] International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:453-458 [Journal ] Josep Domingo-Ferrer Distributed User Identification by Zero-Knowledge Access Rights Proving. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1991, v:40, n:5, pp:235-239 [Journal ] Josep Domingo-Ferrer A New Privacy Homomorphism and Applications. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:60, n:5, pp:277-282 [Journal ] Josep Domingo-Ferrer , Vicenç Torra On the connections between statistical disclosure control for microdata and some artificial intelligence tools. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2003, v:151, n:, pp:153-170 [Journal ] Vicenç Torra , Josep Domingo-Ferrer , Josep Maria Mateo-Sanz , Michael Ng Regression for ordinal variables without underlying continuous variables. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:4, pp:465-474 [Journal ] Josep Domingo-Ferrer , Vicenç Torra I. Reventós Fuzzy Microaggregation for Microdata Protection. [Citation Graph (0, 0)][DBLP ] JACIII, 2003, v:7, n:2, pp:153-159 [Journal ] Josep Domingo-Ferrer , Vicenç Torra Selecting Potentially Relevant Records Using Re-identification Methods. [Citation Graph (0, 0)][DBLP ] New Generation Comput., 2004, v:22, n:3, pp:- [Journal ] Josep Domingo-Ferrer , Jordi Herrera-Joancomartí An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. [Citation Graph (0, 8)][DBLP ] SIGMOD Record, 1998, v:27, n:4, pp:62-67 [Journal ] Josep Domingo-Ferrer , Josep Maria Mateo-Sanz Practical Data-Oriented Microaggregation for Statistical Disclosure Control. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:1, pp:189-201 [Journal ] Francesc Sebé , Josep Domingo-Ferrer Collusion-secure and cost-effective detection of unlawful multimedia redistribution. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:382-389 [Journal ] Josep Domingo-Ferrer , Antoni Martínez-Ballesté , Josep Maria Mateo-Sanz , Francesc Sebé Efficient multivariate data-oriented microaggregation. [Citation Graph (0, 0)][DBLP ] VLDB J., 2006, v:15, n:4, pp:355-369 [Journal ] Vanesa Daza , Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:193-202 [Conf ] Alexandre Viejo , Francesc Sebé , Josep Domingo-Ferrer Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:185-198 [Conf ] Josep Domingo-Ferrer A Public-Key Protocol for Social Networks with Private Relationships. [Citation Graph (0, 0)][DBLP ] MDAI, 2007, pp:373-379 [Conf ] Jordi Castellà-Roca , Vanesa Daza , Josep Domingo-Ferrer , Jesús A. Manjón , Francesc Sebé , Alexandre Viejo An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MDAI, 2007, pp:380-392 [Conf ] Josep Domingo-Ferrer A Three-Dimensional Conceptual Framework for Database Privacy. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:193-202 [Conf ] Agusti Solanas , Josep Domingo-Ferrer , Antoni Martínez-Ballesté , Vanesa Daza A distributed architecture for scalable private RFID tag identification. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:9, pp:2268-2279 [Journal ] Josep Domingo-Ferrer , Joachim Posegga , Francesc Sebé , Vicenç Torra Advances in smart cards. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:9, pp:2219-2222 [Journal ] Francesc Sebé , Alexandre Viejo , Josep Domingo-Ferrer Secure many-to-one symbol transmission for implementation on smart cards. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:9, pp:2299-2307 [Journal ] A Critique of k-Anonymity and Some of Its Enhancements. [Citation Graph (, )][DBLP ] Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks. [Citation Graph (, )][DBLP ] Weighted network decapitation: the economics of iterated attack and defense. [Citation Graph (, )][DBLP ] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. [Citation Graph (, )][DBLP ] Location privacy via unlinkability: an alternative to cloaking and perturbation. [Citation Graph (, )][DBLP ] Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond. [Citation Graph (, )][DBLP ] Location Privacy in Location-Based Services: Beyond TTP-based Schemes. [Citation Graph (, )][DBLP ] Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications. [Citation Graph (, )][DBLP ] Safety and Privacy in Vehicular Communications. [Citation Graph (, )][DBLP ] The UNESCO Chair in Data Privacy Research in Vehicular Networks. [Citation Graph (, )][DBLP ] Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP ] A Genetic Approach to Multivariate Microaggregation for Database Privacy. [Citation Graph (, )][DBLP ] A Shared Steganographic File System with Error Correction. [Citation Graph (, )][DBLP ] The Functionality-Security-Privacy Game. [Citation Graph (, )][DBLP ] Coprivacy: Towards a Theory of Sustainable Privacy. [Citation Graph (, )][DBLP ] Peer-to-Peer Private Information Retrieval. [Citation Graph (, )][DBLP ] From t-Closeness to PRAM and Noise Addition Via Information Theory. [Citation Graph (, )][DBLP ] An Anonymity Model Achievable Via Microaggregation. [Citation Graph (, )][DBLP ] Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP ] Privacy homomorphisms for social networks with private relationships. [Citation Graph (, )][DBLP ] Secure and scalable many-to-one symbol transmission for sensor networks. [Citation Graph (, )][DBLP ] Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures. [Citation Graph (, )][DBLP ] User-private information retrieval based on a peer-to-peer community. [Citation Graph (, )][DBLP ] Recent progress in database privacy. [Citation Graph (, )][DBLP ] Search in 0.086secs, Finished in 0.091secs