Josep Domingo Ferrer
#122,578
Most Influential Person Now
Spanish computer scientist
Josep Domingo Ferrer's AcademicInfluence.com Rankings
Josep Domingo Ferrercomputer-science Degrees
Computer Science
#5003
World Rank
#5287
Historical Rank
Information Security
#14
World Rank
#14
Historical Rank
Database
#2173
World Rank
#2286
Historical Rank

Download Badge
Computer Science
Why Is Josep Domingo Ferrer Influential?
(Suggest an Edit or Addition)According to Wikipedia, Josep Domingo Ferrer is a Distinguished Professor of Computer Science and an ICREA-Acadèmia Researcher at Universitat Rovira i Virgili, Tarragona, Catalonia, where he holds the UNESCO Chair in Data Privacy. He was named Fellow of the Institute of Electrical and Electronics Engineers in 2012 for contributions to privacy, security, and functionality in statistical databases.
Josep Domingo Ferrer's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Practical Data-Oriented Microaggregation for Statistical Disclosure Control (2002) (649)
- Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation (2005) (472)
- Efficient Remote Data Possession Checking in Critical Information Infrastructures (2008) (383)
- Statistical Disclosure Control (2012) (328)
- A Provably Secure Additive and Multiplicative Privacy Homomorphism (2002) (322)
- A Methodology for Direct and Indirect Discrimination Prevention in Data Mining (2013) (316)
- A Scalable Robust Authentication Protocol for Secure Vehicular Communications (2010) (309)
- Privacy and Data Protection by Design - from policy to engineering (2014) (265)
- Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications (2010) (228)
- Statistical Databases (2008) (215)
- On the complexity of optimal microaggregation for statistical disclosure control (2001) (208)
- Distributed Aggregate Privacy-Preserving Authentication in VANETs (2017) (194)
- Asymmetric Group Key Agreement (2009) (192)
- Statistical Disclosure Control: Hundepool/Statistical Disclosure Control (2012) (185)
- A Critique of k-Anonymity and Some of Its Enhancements (2008) (178)
- From t-Closeness-Like Privacy to Postrandomization via Information Theory (2010) (175)
- Disclosure control methods and information loss for microdata (2001) (161)
- Efficient multivariate data-oriented microaggregation (2006) (153)
- Enhancing data utility in differential privacy via microaggregation-based $$k$$k-anonymity (2014) (150)
- Security in wireless ad-hoc networks - A survey (2014) (150)
- Inference Control in Statistical Databases (2002) (141)
- A New Privacy Homomorphism and Applications (1996) (141)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (2014) (140)
- A polynomial-time approximation to optimal multivariate microaggregation (2008) (136)
- Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure Risk (2004) (135)
- Identity-based remote data possession checking in public clouds (2014) (126)
- Anonymous and secure aggregation scheme in fog-based public cloud computing (2018) (126)
- Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks (2009) (110)
- t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation (2015) (109)
- Discrimination prevention in data mining for intrusion and crime detection (2011) (107)
- H(k)-private Information Retrieval from Privacy-uncooperative Queryable Databases.">h(k)-private Information Retrieval from Privacy-uncooperative Queryable Databases (2009) (106)
- Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees (2016) (101)
- A Survey of Inference Control Methods for Privacy-Preserving Data Mining (2008) (96)
- Record linkage methods for multidatabase data mining (2003) (95)
- Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response (2015) (95)
- Inference Control in Statistical Databases, From Theory to Practice (2002) (90)
- Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata (2005) (89)
- Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges (2019) (87)
- Discrimination- and privacy-aware patterns (2015) (86)
- User-private information retrieval based on a peer-to-peer community (2009) (85)
- Big Data Privacy: Challenges to Privacy Principles and Models (2016) (84)
- Disclosure risk assessment in statistical microdata protection via advanced record linkage (2003) (84)
- Simulatable certificateless two-party authenticated key agreement protocol (2010) (83)
- A k-anonymous approach to privacy preserving collaborative filtering (2015) (83)
- Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment (2006) (82)
- Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics (2015) (80)
- From t-closeness to differential privacy and vice versa in data anonymization (2015) (79)
- Rule Protection for Indirect Discrimination Prevention in Data Mining (2011) (79)
- On the Security of Noise Addition for Privacy in Statistical Databases (2004) (79)
- Microaggregation- and permutation-based anonymization of movement data (2012) (75)
- Probabilistic Analysis (2009) (71)
- Temporal Structure (2009) (71)
- Microaggregation for Database and Location Privacy (2006) (71)
- Hybrid microdata using microaggregation (2010) (70)
- TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids (2015) (69)
- Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections (2016) (68)
- Optimal data-independent noise for differential privacy (2013) (68)
- Generalization-based privacy preservation and discrimination prevention in data publishing and mining (2014) (65)
- Regression for ordinal variables without underlying continuous variables (2006) (65)
- Anonymization of nominal data based on semantic marginality (2013) (63)
- Location Privacy in Location-Based Services: Beyond TTP-based Schemes (2008) (63)
- Co-utile P2P ridesharing via decentralization and reputation management (2016) (63)
- Provably secure one-round identity-based authenticated asymmetric group key agreement protocol (2011) (62)
- The limits of differential privacy (and its misuse in data release and machine learning) (2020) (59)
- Probabilistic k-anonymity through microaggregation and data swapping (2012) (58)
- A Three-Dimensional Conceptual Framework for Database Privacy (2007) (58)
- A distributed architecture for scalable private RFID tag identification (2007) (56)
- LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection (2002) (55)
- Utility-preserving differentially private data releases via individual ranking microaggregation (2015) (55)
- Privacy homomorphisms for social networks with private relationships (2008) (54)
- Differential privacy via t-closeness in data publishing (2013) (53)
- Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications (2015) (50)
- Give more data, awareness and control to individual citizens, and they will help COVID-19 containment (2020) (50)
- Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond (2008) (50)
- Short collusion-secure fingerprints based on dual binary Hamming codes (2000) (49)
- Bridging Broadcast Encryption and Group Key Agreement (2011) (49)
- FRR: Fair remote retrieval of outsourced private medical records in electronic health networks (2014) (49)
- New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users (2015) (49)
- A bibliometric index based on the collaboration distance between cited and citing authors (2011) (47)
- Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search (2015) (47)
- Cloud Cryptography: Theory, Practice and Future Research Directions (2016) (47)
- Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets (2002) (46)
- FuturICT — The road towards ethical ICT (2012) (45)
- Outlier Protection in Continuous Microdata Masking (2004) (44)
- Identity-Based Authenticated Asymmetric Group Key Agreement Protocol (2010) (44)
- Fast transmission to remote cooperative groups: A new key management paradigm (2013) (43)
- On the privacy offered by (k, δ)-anonymity (2013) (42)
- Preserving Security and Privacy in Large-Scale VANETs (2011) (41)
- Query Profile Obfuscation by Means of Optimal Query Exchange between Users (2012) (40)
- Practical secure and privacy-preserving scheme for value-added applications in VANETs (2015) (39)
- Fast Generation of Accurate Synthetic Microdata (2004) (39)
- A COMPARATIVE STUDY OF MICROAGGREGATION METHODS (1998) (39)
- Short 3-Secure Fingerprinting Codes for Copyright Protection (2002) (39)
- Machine learning explainability via microaggregation and shallow decision trees (2020) (39)
- Improving the Utility of Differentially Private Data Releases via k-Anonymity (2013) (39)
- APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks (2011) (39)
- Simple collusion-secure fingerprinting schemes for images (2000) (38)
- A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation (2011) (37)
- Distributed multicast of fingerprinted content based on a rational peer-to-peer community (2013) (37)
- Anonymous Fingerprinting Based on Committed Oblivious Transfer (1999) (37)
- Semantic variance: An intuitive measure for ontology accuracy evaluation (2015) (36)
- Flexible attribute-based encryption applicable to secure e-healthcare records (2015) (36)
- On the Security of Microaggregation with Individual Ranking: Analytical Attacks (2002) (36)
- Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions (2020) (36)
- Safety and Privacy in Vehicular Communications (2009) (36)
- Coprivacy: Towards a Theory of Sustainable Privacy (2010) (36)
- Median‐based aggregation operators for prototype construction in ordinal scales (2003) (36)
- Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts (2016) (36)
- Comment on “Unique in the shopping mall: On the reidentifiability of credit card metadata” (2015) (35)
- Resampling for statistical confidentiality in contingency tables (1999) (34)
- A Public-Key Protocol for Social Networks with Private Relationships (2007) (34)
- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling (2000) (33)
- From t-Closeness to PRAM and Noise Addition Via Information Theory (2008) (33)
- Privacy in Statistical Databases: k-Anonymity Through Microaggregation (2006) (33)
- Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints (2014) (32)
- Asymmetric group key agreement protocol for open networks and its application to broadcast encryption (2011) (32)
- Privacy-preserving publication of trajectories using microaggregation (2010) (32)
- Network Database (2009) (32)
- Co-Utility: Self-Enforcing protocols for the mutual benefit of participants (2017) (32)
- Anonymous fingerprinting of electronic information with automatic identification of redistributers (1998) (31)
- Direct and Indirect Discrimination Prevention Methods (2013) (30)
- Network Topology (2009) (29)
- Information Seeking (2009) (28)
- Disclosure risk assessment via record linkage by a maximum-knowledge attacker (2015) (27)
- Information-theoretic disclosure risk measures in statistical disclosure control of tabular data (2002) (27)
- Privacy and Data Protection by Design (2015) (27)
- Co-utile Collaborative Anonymization of Microdata (2015) (26)
- Self-enforcing protocols via co-utile reputation management (2016) (26)
- Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges (2018) (26)
- A Privacy Homomorphism Allowing Field Operations on Encrypted Data (1998) (26)
- A co-utility approach to the mesh economy: the crowd-based business model (2017) (26)
- Injecting Discrimination and Privacy Awareness Into Pattern Discovery (2012) (26)
- On the connections between statistical disclosure control for microdata and some artificial intelligence tools (2003) (25)
- Measuring risk and utility of anonymized data using information theory (2009) (25)
- Peer-to-Peer Private Information Retrieval (2008) (25)
- Aggregation techniques for statistical confidentiality (2002) (24)
- Validating Distance-Based Record Linkage with Probabilistic Record Linkage (2002) (24)
- Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks (2009) (24)
- Multivariate Microaggregation Based Genetic Algorithms (2006) (24)
- Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search (2012) (23)
- Provably secure threshold public-key encryption with adaptive security and short ciphertexts (2012) (22)
- A measure of variance for hierarchical nominal attributes (2008) (22)
- A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection (2002) (22)
- Multi-application smart cards and encrypted data, processing (1997) (22)
- Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data (2014) (22)
- Rational Privacy Disclosure in Social Networks (2010) (21)
- A Genetic Approach to Multivariate Microaggregation for Database Privacy (2007) (21)
- Privacy Preserving Collaborative Filtering with k-Anonymity through Microaggregation (2013) (21)
- Co-utility: Self-enforcing protocols without coordination mechanisms (2015) (21)
- Disclosure risk assessment in statistical data protection (2004) (21)
- Distance-based and probabilistic record linkage for re-identification of records with categorical variables ∗ (2002) (20)
- Advances in Inference Control in Statistical Databases: An Overview (2002) (20)
- Machine Learning Explainability Through Comprehensible Decision Trees (2019) (20)
- Towards Fuzzy c-means Based Microaggregation (2002) (19)
- Co-utility (2016) (19)
- On intuitionistic fuzzy clustering for its application to privacy (2008) (19)
- Recent progress in database privacy (2009) (18)
- Differentially private data publishing via optimal univariate microaggregation and record perturbation (2018) (18)
- Simultaneous authentication and secrecy in identity-based data upload to cloud (2013) (18)
- On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective (2018) (18)
- Fuzzy Microaggregation for Microdata Protection (2003) (18)
- On reliability indices of communication networks (2009) (17)
- On the Compatibility of Big Data Driven Research and Informed Consent: The Example of the Human Brain Project (2016) (17)
- Efficient Smart-Card Based Anonymous Fingerprinting (1998) (17)
- Invertible spread-spectrum watermarking for image authentication and multilevel access to precision-critical watermarked images (2002) (17)
- A Study on the Impact of Data Anonymization on Anti-discrimination (2012) (17)
- Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata (2014) (17)
- Coprivacy: an introduction to the theory and applications of co-operative privacy (2011) (16)
- Anonymization in the Time of Big Data (2016) (16)
- Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication (2011) (15)
- Resource Scheduling (2009) (15)
- Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams (2019) (15)
- DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution (2013) (15)
- Improving the Utility of Differential Privacy via Univariate Microaggregation (2014) (15)
- Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios (2012) (15)
- A 2/sup d/-tree-based blocking method for microaggregating very large data sets (2006) (15)
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts (2010) (14)
- Predictive protocol for the scalable identification of RFID tags through collaborative readers (2012) (14)
- Anonymization of Unstructured Data via Named-Entity Recognition (2018) (14)
- Practical Mental Poker Without a TTP Based on Homomorphic Encryption (2003) (14)
- Current Directions in Statistical Data Protection (2004) (14)
- Smart Card Research and Advanced Applications (2000) (13)
- Extending microaggregation procedures using defuzzification methods for categorical variables (2002) (13)
- A Performance Comparison of Java Cards for Micropayment Implementation (2001) (13)
- Data mining methods for linking data coming from several sources (2004) (13)
- Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds (2018) (13)
- Steered Microaggregation: A Unified Primitive for Anonymization of Data Sets and Data Streams (2017) (13)
- Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security (2014) (13)
- Scattering codes to implement short 3-secure fingerprinting for copyright protection (2002) (12)
- Decapitation of networks with and without weights and direction: The economics of iterated attack and defense (2011) (12)
- Differentially private data publishing via cross-moment microaggregation (2020) (12)
- STREAMOBILE: pay-per-view video streaming to mobile devices over the Internet (2002) (12)
- Noise-Robust Watermarking for Numerical Datasets (2005) (11)
- Rank-Based Record Linkage for Re-Identification Risk Assessment (2016) (11)
- Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation (2006) (11)
- Privacy-preserving distributed statistical computation to a semi-honest multi-cloud (2015) (11)
- Appendix ( Data use-oriented evaluation ) to article “ Enhancing Data Utility in Differential Privacy via Microaggregation-based k-Anonymity ” (2014) (11)
- Data Confidentiality (2009) (11)
- Privacy-aware loyalty programs (2016) (11)
- Scalability and security in biased many-to-one communication (2007) (11)
- Dropout-Tolerant TTP-Free Mental Poker (2005) (11)
- Flexible and Robust Privacy-Preserving Implicit Authentication (2015) (11)
- Rational enforcement of digital oblivion (2011) (11)
- Fair detection of poisoning attacks in federated learning on non-i.i.d. data (2020) (10)
- Wiley Series in Survey Methodology (2012) (10)
- ε-Differential Privacy for Microdata Releases Does Not Guarantee Confidentiality (Let Alone Utility) (2020) (10)
- How to Avoid Reidentification with Proper Anonymization (2018) (10)
- On the security of an efficient TTP-free mental poker protocol (2004) (10)
- General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model (2020) (9)
- Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach (2016) (9)
- Security in Wireless Ad Hoc Networks (2013) (9)
- Collusion-secure and cost-effective detection of unlawful multimedia redistribution (2003) (9)
- Secure and Privacy-Preserving Federated Learning via Co-Utility (2021) (9)
- Advances in smart cards (2007) (9)
- Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings (2019) (9)
- Oblivious Image Watermarking Robust against Scaling and Geometric Distortions (2001) (9)
- Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks (2012) (8)
- Protein Sequence (2009) (8)
- Differentially Private Data Sets Based on Microaggregation and Record Perturbation (2017) (8)
- Marginality: A Numerical Mapping for Enhanced Exploitation of Taxonomic Attributes (2012) (8)
- On the Security of a Repaired Mental Poker Protocol (2006) (8)
- Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario (2012) (8)
- Secure Reverse Communication in a Multicast Tree (2004) (8)
- Privacy-Preserving Loyalty Programs (2014) (8)
- Secure Many-to-One Communications in Wireless Sensor Networks (2009) (7)
- Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement (2013) (7)
- Connecting Randomized Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation (2018) (7)
- Metadata Repository (2009) (7)
- An implementable scheme for secure delegation of computing and data (1997) (7)
- Distance Computation between Two Private Preference Functions (2014) (7)
- Practical asymmetric fingerprinting with a TTP (2003) (7)
- Aggregation Methods to Evaluate Multiple Protected Versions of the Same Confidential Data Set (2002) (7)
- An Anonymity Model Achievable Via Microaggregation (2008) (7)
- The future of statistical disclosure control (2018) (7)
- A Shared Steganographic File System with Error Correction (2008) (6)
- Watermarking Non-numerical Databases (2006) (6)
- Secure and scalable many-to-one symbol transmission for sensor networks (2008) (6)
- Sensitivity-Independent differential Privacy via Prior Knowledge Refinement (2012) (6)
- Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data (2016) (6)
- Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes (2013) (6)
- µ-ANT: semantic microaggregation-based anonymization tool (2019) (6)
- Software Run-Time Protection: A Cryptographic Issue (1991) (6)
- Co-Utile Peer-to-Peer Decentralized Computing (2020) (6)
- Data Anonymization (2014) (6)
- Privacy homomorphisms for e-gambling and mental poker (2006) (6)
- Fair pattern discovery (2014) (6)
- Indexing the Past (2009) (6)
- Local synthesis for disclosure limitation that satisfies probabilistic k-anonymity criterion (2017) (6)
- An Improved Binary Authentication Tree Algorithm for Vehicular Networks (2012) (6)
- Lightweight Blockchain-based Platform for GDPR-Compliant Personal Data Management (2021) (6)
- Privacy-Preserving Technologies (2020) (6)
- Watermarking Numerical Data in the Presence of Noise (2006) (5)
- Multi-Dimensional Randomized Response (2020) (5)
- Semantic‐based aggregation for statistical disclosure control (2003) (5)
- Spending Programs: A Tool for Flexible Micropayments (1999) (5)
- A New Identity Based Signcryption Scheme in the Standard Model (2012) (5)
- Personal Big Data, GDPR and Anonymization (2019) (5)
- Beyond Informed Consent—Investigating Ethical Justifications for Disclosing, Donating or Sharing Personal Data in Research (2017) (5)
- Enhancing watermark robustness through mixture of watermarked digital objects (2002) (5)
- Disclosure Risk (2009) (5)
- KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models (2021) (5)
- Information Loss in Continuous Hybrid Microdata: Subdomain-Level Probabilistic Measures (2006) (5)
- A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets (2006) (5)
- Co-utile disclosure of private data in social networks (2018) (5)
- Transactional Business Processes (2005) (5)
- A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning (2022) (5)
- Utility-Preserving Privacy Protection of Textual Documents via Word Embeddings (2023) (5)
- Efficient Detection of Byzantine Attacks in Federated Learning Using Last Layer Biases (2020) (5)
- On the security of cell suppression in contingency tables with quantitative factors (1996) (5)
- On the connection between t-closeness and differential privacy for data releases (2013) (5)
- Database Anonymization (2016) (5)
- The Functionality-Security-Privacy Game (2009) (5)
- Pattern Discovery (2004) (5)
- Ad hoc broadcast encryption (2010) (5)
- Asynchronous Large-Scale Certification Based on Certificate Verification Trees (2001) (4)
- Canvas White Paper 4 – Technological Challenges in Cybersecurity (2017) (4)
- Current directions in smart cards (2001) (4)
- Achieving Rights Untransferability with Client-Independent Servers (1996) (4)
- Big Data Mining, Fairness and Privacy (2011) (4)
- Full Secure Key Exchange and Authentication with no Previously Shared Secrets (1990) (4)
- Efficient privacy-preserving implicit authentication (2018) (4)
- MINPAY: a multi-device Internet pay-as-you-watch system (2003) (4)
- Hierarchical Certificateless Signatures (2010) (4)
- Defending against the Label-flipping Attack in Federated Learning (2022) (4)
- Problems in the Undertakings of the Collaborative Economy: Co-utile Solutions (2018) (4)
- Security and privacy in unified communications: Challenges and solutions (2015) (4)
- Multiparty Computation with Statistical Input Confidentiality via Randomized Response (2018) (4)
- Text Retrieval (2009) (4)
- Erratum to "A measure of variance for hierarchical nominal attributes" (2009) (4)
- Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings (2004) (4)
- Co-utility: Conciliating Individual Freedom and Common Good in the Crowd Based Business Model (2015) (4)
- Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings (2006) (4)
- MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services (2002) (4)
- Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach (2015) (4)
- Fully Distributed Broadcast Encryption (2011) (4)
- Non-Perturbative Masking Methods (2009) (4)
- A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience (2014) (4)
- Explaining Misclassification and Attacks in Deep Learning via Random Forests (2020) (4)
- Restricted Data (2009) (4)
- Privacy in Statistical Databases, CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings (2006) (4)
- Algorithm- sequenced access control (1991) (4)
- Privacy in Statistical Databases (2014) (4)
- Time-Constrained Transaction Management (2009) (4)
- Anonymization of trajectory data (2011) (4)
- Synthetic Microdata (2009) (4)
- Microaggregation Heuristics for p-Sensitive k-Anonymity (2007) (4)
- Service Bus (2009) (4)
- Secure many-to-one symbol transmission for implementation on smart cards (2007) (4)
- A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off (2017) (4)
- Anonymization Methods for Taxonomic Microdata (2012) (4)
- Privacy in Statistical Databases, Lecture Notes in Computer Science 7556 (2012) (3)
- Watermarking for multilevel access to statistical databases (2001) (3)
- MICROAGGREGATION FOR PROTECTING INDIVIDUAL DATA PRIVACY (2004) (3)
- Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph (2020) (3)
- Differential Privacy through Knowledge Refinement (2012) (3)
- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs (2013) (3)
- On Partial Anonymity in Secret Sharing (2007) (3)
- Untransferable Rights in a Client-Independent Server Environment (1994) (3)
- Co-utility for digital content protection and digital forgetting (2016) (3)
- A nonrepudiable bitstring commitment scheme based on a public-key cryptosystem (2004) (3)
- Explaining predictions and attacks in federated learning via random forests (2022) (3)
- Non-Perturbative Masking (2009) (3)
- Supplementary Materials for "How to Avoid Reidentification with Proper Anonymization" (2015) (3)
- Hybrid Microdata via Model-Based Clustering (2012) (3)
- Translingual Information Retrieval (2009) (3)
- A Generic Construction of Proxy Signatures from Certificateless Signatures (2013) (3)
- On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems (2008) (3)
- Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings (2008) (3)
- Performance Benchmark (2009) (2)
- Topological Data Structure (2009) (2)
- A Bibliometric Index Based on Collaboration Distances (2010) (2)
- Critique to Burmester and Le attack to Sebé and Domingo-Ferrer fingerprinting scheme (2004) (2)
- Location privacy via unlinkability: an alternative to cloaking and perturbation (2008) (2)
- Microaggregation-and Permutation-Based Anonymization of Mobility Data (2012) (2)
- Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks (2005) (2)
- FL-Defender: Combating Targeted Attacks in Federated Learning (2022) (2)
- Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures (1990) (2)
- A Scheme for Anonymous Electronic CommerceUsing Secure Intelligent Trade AgentsJosep (1998) (2)
- A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets (2017) (2)
- Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases (2006) (2)
- Co-utile Ridesharing (2018) (2)
- An anonymous electronic commerce scheme with an off-line authority and untrusted agents (1998) (2)
- Measuring Fairness in Machine Learning Models via Counterfactual Examples (2022) (2)
- Database Protection (2009) (2)
- Privacy-Preserving Computation of the Earth Mover's Distance (2020) (2)
- Selected Privacy Research Topics in the ARES Project: An Overview (2015) (2)
- ReCRF: Spanish Medical Document Anonymization using Automatically-crafted Rules and CRF (2019) (2)
- Data Manipulation Language (2009) (2)
- EUL to OGD: A simulated attack on two social survey datasets (2014) (2)
- Tabular Data (2009) (2)
- Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2010, Corfu, Greece, September 22-24, 2010. Proceedings (2010) (2)
- Robust distributed privacy-preserving secure aggregation in vehicular communication ∗† by (2012) (2)
- Secure compression of privacy-preserving witnesses in vehicular ad hoc networks (2010) (2)
- Assessing Disclosure Risk via Record Linkage by a Maximum-Knowledge Intruder (2015) (2)
- ESSNET-SDC Deliverable Report on Synthetic Data Files (2009) (2)
- Computer skills training to (middle-aged) adults: problems and program (2004) (2)
- Efficient Near-Optimal Variable-Size Microaggregation (2019) (2)
- Enhanced Security and Privacy via Fragmented Federated Learning (2022) (2)
- Big Data Anonymization Requirements vs Privacy Models (2018) (2)
- Microdata masking as permutation (2015) (2)
- E2EJ: Anonymization of Spanish Medical Records using End-to-End Joint Neural Networks (2019) (2)
- Data Access Issues (2012) (2)
- Multimodal Databases (2009) (2)
- GRAIMATTER Green Paper: Recommendations for disclosure control of trained Machine Learning (ML) models from Trusted Research Environments (TREs) (2022) (2)
- Modeling Decisions for Artificial Intelligence (2014) (1)
- Secret-Key Encryption (2009) (1)
- Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases (2002) (1)
- Establishing a benchmark for re-identification methods and its validation using fuzzy clustering (2006) (1)
- Secure Many-to-One Transmission of q-ary Symbols (2004) (1)
- Explaining Image Misclassification in Deep Learning via Adversarial Examples (2021) (1)
- Statistical Decision Techniques (2009) (1)
- Disclosure Control by Computer Scientists : An Overview and an Application of Microaggregation to Mobility Data Anonymization (2011) (1)
- Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat (2022) (1)
- Mobile Agent Route Protection through Hash-Based Mechanisms (2001) (1)
- Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation (2019) (1)
- Generalization-based privacy preservation and discrimination prevention in data publishing and mining (2014) (1)
- Self-enforcing Collaborative Anonymization via Co-utility (2018) (1)
- Detecting Bad Answers in Survey Data Through Unsupervised Machine Learning (2020) (1)
- Pros and Cons of New Information Technologies for Statistical Data Protection (1998) (1)
- Knowledge Discovery from Data (2009) (1)
- A Smart Card-Based Mental Poker System (2006) (1)
- Document Identifier (2020) (1)
- Weighted network decapitation: the economics of iterated attack and defense (2009) (1)
- Group Discounts Compatible with Buyer Privacy (2014) (1)
- Selecting potentially relevant records using re-identification methods (2004) (1)
- Anti-discrimination and privacy protection in released datasets (2011) (1)
- Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006Rome, Italy, December 13-15, 2006Proceedings (Lecture Notes in Computer Science) (2007) (1)
- A co-utility approach to the mesh economy: the crowd-based business model (2016) (1)
- Secure large-scale bingo (2004) (1)
- Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications (2008) (1)
- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments (2004) (1)
- Privacy-Preserving and Co-utile Distributed Social Credit (2017) (1)
- Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks (2007) (1)
- Marginality: a numerical mapping for enhanced treatment of nominal and hierarchical attributes (2012) (1)
- Empirical Comparison of Anonymization Methods Regarding Their Risk-Utility Trade-Off (2017) (1)
- Dynamic group size accreditation and group discounts preserving anonymity (2018) (1)
- A Cryptographic Mechanism for Non-Iterative Algorithm Enforcing (1991) (1)
- Temporal Association Mining (2009) (1)
- Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence (2005) (1)
- Tumor Entity Recognition and Coding for Spanish Electronic Health Records (2020) (1)
- Distributed User Identification by Zero-Knowledge Access Rights Proving (1991) (1)
- microdata Connecting privacy models : synergies between k-anonymity , t-closeness and differential privacy (2013) (1)
- Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing (2021) (1)
- Co-utile P2P anonymous keyword search (2018) (1)
- kNN Query (2009) (1)
- Approximating fuzzy measures by hierarchically decomposable ones (2002) (1)
- Proceedings of the 2010 international conference on Privacy in statistical databases (2010) (1)
- Two-Sorted First-Order Logic (2009) (1)
- Near-Duplicate Video Retrieval (2009) (1)
- Dikē: A Prototype for Secure Delegation of Statistical Data (2004) (1)
- Fingerprinting schemes for multicast delivery (2003) (1)
- Inverted Indexes (2009) (1)
- 2013 Eleventh annual conference on privacy, security and trust (2013) (1)
- Re-Identification and Synthetic Data Generators : A Case Study ∗ † (2006) (1)
- Raster Data Management (2009) (1)
- Reverse Nearest Neighbor Search (2009) (1)
- Data privacy: state of the art (2023) (0)
- Simultaneous authentication and secrecy in identity-based data upload to cloud (2013) (0)
- Erratum to: Smart Card Research and Advanced Applications (2017) (0)
- Dirichlet Tessellation (2009) (0)
- Pixel Classification (2009) (0)
- Data Errors (2022) (0)
- Tug-of-War Sketch (2009) (0)
- Data Rank/Swapping (2009) (0)
- Temporal Domain (2009) (0)
- Chapter 13 Direct and Indirect Discrimination Prevention Methods (2013) (0)
- Peer Data Management (2009) (0)
- Microaggregation-Based Numerical Hybrid Data (2009) (0)
- Flexible attribute-based encryption applicable to secure e-healthcare records (2015) (0)
- Co-citations and Relevance of Authors and Author Groups (2011) (0)
- Co-utility (2016) (0)
- Multi-application smart cards and processing * (2003) (0)
- Multi-dimensional Mapping (2009) (0)
- Positive Infinity (2020) (0)
- Digital Surface Model (2009) (0)
- Temporal Type (2009) (0)
- Microdata Masking Techniques (2011) (0)
- Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints (2013) (0)
- Generating Deep Learning Model-Specific Explanations at the End User's Side (2022) (0)
- The European Approach to Artificial Intelligence Across Geo-Political Models of Digital Governance (0)
- Chapter 2 Database Privacy (2019) (0)
- Preface to the fourth IEEE workshop on privacy aspects of data mining (2013) (0)
- Bistochastic privacy (2022) (0)
- Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds (2019) (0)
- C R ] 6 M ar 2 01 8 Connecting Randomized Response , Post-Randomization , Differential Privacy and t-Closeness via Deniability and Permutation Josep (2018) (0)
- Differentially private publication of database streams via hybrid video coding (2022) (0)
- New Directions in Anonymization: Permutation Paradigm, Verifiability and Transparency (2015) (0)
- To be or not to be (anonymous) (2015) (0)
- Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23–25, 2020, Proceedings (2020) (0)
- SECOND INTERNATIONAL WORKSHOP ON AGENTS AND CYBERSECURITY ACySE2015 (2015) (0)
- Using machine learning to assist output checking (2021) (0)
- Towards Machine Learning-Assisted Output Checking for Statistical Disclosure Control (2021) (0)
- Privacy in statistical databases : CASC Project Final Conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedigs (2004) (0)
- Record Linkage (2018) (0)
- Workpackage 3 - Task 5 (WP3.T5) Practical anonymous fingerprinting schemes Deliverable Report (2012) (0)
- Instant (2021) (0)
- Service Choreography (2009) (0)
- Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph (2019) (0)
- Discussions (2011) (0)
- Distance-Preserving Mapping (2009) (0)
- Ethics by Design in Decentralized Computing (2022) (0)
- Achieving rights untransferability with client-independent servers (1996) (0)
- Object Positioning Based on Partial Preferences (2004) (0)
- Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds (2019) (0)
- Decentralized Data Integration System (2009) (0)
- On multicast fingerprinting and collusion security (2005) (0)
- Facility Location and Social Choice via Microaggregation (2013) (0)
- Term Processing (2009) (0)
- Service Item (2020) (0)
- Data Types for Moving Objects (2009) (0)
- Record Matching (2009) (0)
- Co-utile Privacy-Aware P2P Content Distribution (2018) (0)
- Run-Time Protection : A Cryptographic (2001) (0)
- Differential Privacy Trough Knowledge Refinement (2012) (0)
- Noise Addition (2009) (0)
- Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications (2004) (0)
- Degrees of Consistency (2009) (0)
- Data Perturbation (2009) (0)
- Co-utility: Designing Self-enforcing and Mutually Beneficial Protocols (2018) (0)
- Intelligent Storage (2009) (0)
- Decentralized <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e343" altimg="si7.svg"><mml:mi>k</mml:mi></mml:math>-anonymization of trajectories via privacy-preserving tit-for-tat (2022) (0)
- Magnitude Tabular Data (2012) (0)
- Spatio-Temporal Graphs (2009) (0)
- Digital Identity and Privacy in some New-Generation Information and Communication Technologies (2010) (0)
- The Third International Workshop on Human Mobility Computing (HuMoComP 2015) (2015) (0)
- Confidence-ranked reconstruction of census records from aggregate statistics fails to capture privacy risks and reidentifiability (2023) (0)
- PASSAT 2009 Organizing and Program Committee (2009) (0)
- Tit-for-Tat Disclosure of a Binding Sequence of User Analyses in Safe Data Access Centers (2022) (0)
- Record Linkage (2009) (0)
- On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures) (2015) (0)
- Ethics, Principles, Guidelines and Regulations–A General Background (2012) (0)
- Privacy in spatio-temporal databases : a survey of methods based on k-anonymity and microaggregation (2015) (0)
- Co-utile Enforcement of Digital Oblivion (2018) (0)
- User Privacy in Web Search (2010) (0)
- Smart Card Research and Advanced Applications, Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000, September 20-22, 2000, Bristol, UK (2000) (0)
- Editorial (2009) (0)
- SDC Score (2009) (0)
- Protecting Consumer Privacy in Smart Metering by Randomized Response (2019) (0)
- Information Loss Measures (2009) (0)
- An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks (2007) (0)
- Generation of Synthetic Trajectory Microdata from Language Models (2022) (0)
- Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges (2018) (0)
- Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications (2001) (0)
- Smart card research and advanced applications : IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, September 20-22, 2000, Bristol, United Kingdom (2000) (0)
- Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications (2006) (0)
- Discrimination- and privacy-aware patterns (2014) (0)
- Microdata Rounding (2009) (0)
- Modeling Decisions for Artificial Intelligence, Third International Conference, MDAI 2006, Tarragona, Spain, April 3-5, 2006, Proceedings (2006) (0)
- Storage Array (2009) (0)
- Spatial Analysis (2018) (0)
- A cryptographic tool for programs protection (1990) (0)
- Data Cache (2009) (0)
- Composition of the Graduation Committee (2007) (0)
- A PERFORMANCE COMPARISON OF JAVACARDS FORMICROPAYMENT (2000) (0)
- ' s report Title : De-identifying a Public Use Microdata File from the Canadian National Discharge (0)
- Factor Analysis for Anonymization (2017) (0)
- Multi-Dimensional Randomized Response (2022) (0)
- Nonperturbative Masking Methods (2018) (0)
- Set of Security parameters for Cloud Computing Storage System (2015) (0)
- Discussion on New Data Release Techniques (2003) (0)
- Enhancing data utility in differential privacy via microaggregation-based k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{docume (2014) (0)
- Pattern Based Clustering (2009) (0)
- Bucketization based Flow Classification Algorithm for Data Stream Privacy Mining (2019) (0)
- Database Reconstruction Is Not So Easy and Is Different from Reidentification (2023) (0)
- Time Sequence (2009) (0)
- Incentive-Based Co-utility: Co-utile Reputation Management (2018) (0)
- A Scenario Analysis of Privacy Attacks either on or using Genomic Data. (2014) (0)
- The UNESCO Chair in Data Privacy Research in Vehicular Networks (2009) (0)
- Recovery Manager (2009) (0)
- 00 45 4 v 1 [ cs . C R ] 2 M ar 2 01 5 Flexible and Robust Privacy-Preserving Implicit Authentication (2018) (0)
- Time-Based Access Control (2009) (0)
- Big Data Privacy: Challenges to Privacy Principles and Models (2015) (0)
- Translation Lookaside Buffer (TLB) (2009) (0)
- 18th Workshop on Privacy in the Electronic Society (WPES 2019) (2019) (0)
- Dynamic group size accreditation and group discounts preserving anonymity (2017) (0)
- Mitigating the Curse of Dimensionality in Data Anonymization (2019) (0)
- Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5) (2018) (0)
- A Survey on Direct and Indirect Discrimination Prevention in Data Mining (2020) (0)
- Secure Many-toOne Communications in Wireless Sensor Networks (2009) (0)
- Topic II : Impact of new technological developments in software , communications and computing on SDC IMPACT OF NEW TECHNOLOGICAL DEVELOPMENTS IN SOFTWARE , COMMUNICATIONS AND COMPUTING ON SDC : List of key issues for discussion (2001) (0)
- Spending programs : a tool for exiblemi ropayments ? (1999) (0)
- Data Tracking (2009) (0)
- Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases (2008) (0)
- ESSNET-SDC Deliverable Blocking Methods for Microdata Protection (2008) (0)
- Networking in the new ICT curricula (2003) (0)
- Statistical Disclosure Control (SDC) (2009) (0)
- Defending Against Backdoor Attacks by Layer-wise Feature Analysis (2023) (0)
This paper list is powered by the following services:
Other Resources About Josep Domingo Ferrer
What Schools Are Affiliated With Josep Domingo Ferrer?
Josep Domingo Ferrer is affiliated with the following schools: