Secure remote electronic voting system and cryptographic protocols and computer programs employed AR Jorba, JC Roca US Patent 7,260,552, 2007 | 179 | 2007 |
Preserving user’s privacy in web search engines J Castellà-Roca, A Viejo, J Herrera-Joancomartí Computer Communications 32 (13-14), 1541-1551, 2009 | 126 | 2009 |
On the security of noise addition for privacy in statistical databases J Domingo-Ferrer, F Sebé, J Castella-Roca Privacy in statistical databases 3050, 149-161, 2004 | 100 | 2004 |
Using social networks to distort users' profiles generated by web search engines A Viejo, J Castellā-Roca Computer Networks 54 (9), 1343-1357, 2010 | 86 | 2010 |
h (k)‐private information retrieval from privacy‐uncooperative queryable databases J Domingo‐Ferrer, A Solanas, J Castellà‐Roca Online Information Review 33 (4), 720-744, 2009 | 81 | 2009 |
A secure e-exam management system J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa First International Conference on Availability, Reliability and Security …, 2006 | 79 | 2006 |
User k-anonymity for privacy preserving data mining of query logs G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca Information Processing & Management 48 (3), 476-487, 2012 | 77 | 2012 |
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines D Sánchez, J Castellà-Roca, A Viejo Information Sciences 218, 17-30, 2013 | 73 | 2013 |
A survey of electronic ticketing applied to transport M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ... Computers & Security 31 (8), 925-939, 2012 | 54 | 2012 |
Exploiting social networks to provide privacy in personalized web search A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz Journal of Systems and Software 84 (10), 1734-1745, 2011 | 49 | 2011 |
Utility preserving query log anonymization via semantic microaggregation M Batet, A Erola, D Sánchez, J Castellà-Roca Information Sciences 242, 49-63, 2013 | 44 | 2013 |
Preventing automatic user profiling in Web 2.0 applications A Viejo, D Sánchez, J Castellà-Roca Knowledge-Based Systems 36, 191-205, 2012 | 38 | 2012 |
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer RFIDSec 7055, 147-162, 2011 | 37 | 2011 |
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ... The Computer Journal 56 (10), 1198-1215, 2013 | 28 | 2013 |
Efficient group signatures for privacy-preserving vehicular networks L Malina, A Vives-Guasch, J Castella-Roca, A Viejo, J Hajny Telecommunication Systems 58, 293-311, 2015 | 25 | 2015 |
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ... IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012 | 25 | 2012 |
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor S Oviedo, J Quiroga, C Borras Dyna 78 (170), 214-220, 2011 | 25* | 2011 |
Semantic microaggregation for the anonymization of query logs A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010 | 25 | 2010 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013 | 24 | 2013 |
Multi-party private web search with untrusted partners C Romero-Tris, J Castella-Roca, A Viejo Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 24 | 2012 |