Josep Domingo-Ferrer

From MaRDI portal
(Redirected from Person:433085)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Mitigating the curse of dimensionality in data anonymization
Modeling Decisions for Artificial Intelligence
2024-02-23Paper
Privacy-Preserving Computation of the Earth Mover’s Distance
 
2023-03-21Paper
Bistochastic Privacy
 
2022-12-09Paper
Differentially Private Data Sets Based on Microaggregation and Record Perturbation
Modeling Decisions for Artificial Intelligence
2022-11-04Paper
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
Information Sciences
2020-09-08Paper
Co-utile disclosure of private data in social networks
Information Sciences
2020-09-08Paper
Self-enforcing protocols via co-utile reputation management
Information Sciences
2020-01-06Paper
Discrimination- and privacy-aware patterns
Data Mining and Knowledge Discovery
2019-01-29Paper
Some basics on privacy techniques, anonymization and their big data challenges
Mathematics in Computer Science
2018-11-01Paper
Privacy-preserving and co-utile distributed social credit
 
2018-06-15Paper
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
IEEE Transactions on Computers
2017-05-16Paper
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
IEEE Transactions on Computers
2017-05-16Paper
Generalization-based privacy preservation and discrimination prevention in data publishing and mining
Data Mining and Knowledge Discovery
2016-08-04Paper
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
Information Sciences
2016-07-11Paper
Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
Information Sciences
2016-07-08Paper
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement
Information Security and Cryptology
2015-12-02Paper
SENSITIVITY-INDEPENDENT DIFFERENTIAL PRIVACY VIA PRIOR KNOWLEDGE REFINEMENT
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2015-09-30Paper
Optimal data-independent noise for differential privacy
Information Sciences
2015-09-24Paper
Robust distributed privacy-preserving secure aggregation in vehicular communication
 
2015-08-10Paper
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences
2012-10-25Paper
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
RFID. Security and Privacy
2012-08-20Paper
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences
2012-07-13Paper
Bridging broadcast encryption and group key agreement
Lecture Notes in Computer Science
2011-12-02Paper
Fully distributed broadcast encryption
Provable Security
2011-09-16Paper
scientific article; zbMATH DE number 5901694 (Why is no real title available?)
 
2011-05-31Paper
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Information and Communications Security
2010-12-17Paper
Identity-based authenticated asymmetric group key agreement protocol
Lecture Notes in Computer Science
2010-07-20Paper
On reliability indices of communication networks
Computers & Mathematics with Applications
2010-06-28Paper
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences
2010-03-11Paper
scientific article; zbMATH DE number 5633832 (Why is no real title available?)
 
2009-11-16Paper
A comparative study of microaggregation methods
 
2009-07-23Paper
Asymmetric Group Key Agreement
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
A Public-Key Protocol for Social Networks with Private Relationships
Modeling Decisions for Artificial Intelligence
2009-02-17Paper
Privacy homomorphisms for social networks with private relationships
Computer Networks
2009-01-20Paper
A Shared Steganographic File System with Error Correction
Modeling Decisions for Artificial Intelligence
2008-11-25Paper
A polynomial-time approximation to optimal multivariate microaggregation
Computers & Mathematics with Applications
2008-05-14Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
A distributed architecture for scalable private RFID tag identification
Computer Networks
2007-06-04Paper
Secure many-to-one symbol transmission for implementation on smart cards
Computer Networks
2007-06-04Paper
Scalability and security in biased many-to-one communication
Computer Networks
2006-12-07Paper
WATERMARKING NUMERICAL DATA IN THE PRESENCE OF NOISE
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2006-09-12Paper
scientific article; zbMATH DE number 5034474 (Why is no real title available?)
 
2006-06-22Paper
Modeling Decisions for Artificial Intelligence
Lecture Notes in Computer Science
2005-08-26Paper
A CRITIQUE OF THE SENSITIVITY RULES USUALLY EMPLOYED FOR STATISTICAL TABLE PROTECTION
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2004-11-01Paper
ON THE SECURITY OF MICROAGGREGATION WITH INDIVIDUAL RANKING: ANALYTICAL ATTACKS
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2004-11-01Paper
Editorial: TRENDS IN AGGREGATION AND SECURITY ASSESSMENT FOR INFERENCE CONTROL IN STATISTICAL DATABASES
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
2004-11-01Paper
Selecting potentially relevant records using re-identification methods
New Generation Computing
2004-10-01Paper
scientific article; zbMATH DE number 2087736 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2087737 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2087725 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2080168 (Why is no real title available?)
 
2004-08-04Paper
Disclosure risk assessment in statistical data protection.
Journal of Computational and Applied Mathematics
2004-03-15Paper
scientific article; zbMATH DE number 2044548 (Why is no real title available?)
 
2004-02-18Paper
scientific article; zbMATH DE number 2016114 (Why is no real title available?)
 
2003-12-10Paper
scientific article; zbMATH DE number 1986067 (Why is no real title available?)
 
2003-09-26Paper
Median-based aggregation operators for prototype construction in ordinal scales
International Journal of Intelligent Systems
2003-08-20Paper
scientific article; zbMATH DE number 1950352 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1941261 (Why is no real title available?)
 
2003-06-29Paper
On the connections between statistical disclosure control for microdata and some artificial intelligence tools
Information Sciences
2003-06-09Paper
scientific article; zbMATH DE number 1857510 (Why is no real title available?)
 
2003-01-22Paper
scientific article; zbMATH DE number 2015502 (Why is no real title available?)
 
2003-01-01Paper
Resampling for statistical confidentiality in contingency tables
Computers & Mathematics with Applications
2001-07-15Paper
scientific article; zbMATH DE number 1394327 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1341865 (Why is no real title available?)
 
1999-11-29Paper
scientific article; zbMATH DE number 1107713 (Why is no real title available?)
 
1998-04-03Paper
Achieving rights untransferability with client-independent servers
Designs, Codes and Cryptography
1996-10-13Paper
Distributed user identification by zero-knowledge access rights proving
Information Processing Letters
1992-06-28Paper


Research outcomes over time


This page was built for person: Josep Domingo-Ferrer