Jordi Castellà-Roca
Jordi Castellà-Roca
Verified email at urv.cat
Title
Cited by
Cited by
Year
Secure remote electronic voting system and cryptographic protocols and computer programs employed
AR Jorba, JC Roca
US Patent 7,260,552, 2007
1752007
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
1262009
On the security of noise addition for privacy in statistical databases
J Domingo-Ferrer, F Sebé, J Castella-Roca
International Workshop on Privacy in Statistical Databases, 149-161, 2004
962004
Using social networks to distort users' profiles generated by web search engines
A Viejo, J Castellā-Roca
Computer Networks 54 (9), 1343-1357, 2010
862010
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines
D Sánchez, J Castellà-Roca, A Viejo
Information Sciences 218, 17-30, 2013
742013
h (k)‐private information retrieval from privacy‐uncooperative queryable databases
J Domingo‐Ferrer, A Solanas, J Castellà‐Roca
Online Information Review, 2009
742009
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
712006
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
702012
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
492011
A survey of electronic ticketing applied to transport
M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ...
Computers & Security 31 (8), 925-939, 2012
472012
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
402013
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
International Workshop on Radio Frequency Identification: Security and …, 2011
382011
Preventing automatic user profiling in Web 2.0 applications
A Viejo, D Sánchez, J Castellà-Roca
Knowledge-Based Systems 36, 191-205, 2012
372012
Deploying bioinformatics workflows on clouds with galaxy and globus provision
B Liu, B Sotomayor, R Madduri, K Chard, I Foster
2012 SC Companion: High Performance Computing, Networking Storage and …, 2012
322012
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users
AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ...
The Computer Journal 56 (10), 1198-1215, 2013
252013
Semantic microaggregation for the anonymization of query logs
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
International Conference on Privacy in Statistical Databases, 127-137, 2010
252010
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability
A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ...
IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012
222012
Practical mental poker without a TTP based on homomorphic encryption
J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell
International Conference on Cryptology in India, 280-294, 2003
222003
Short-term linkable group signatures with categorized batch verification
L Malina, J Castella-Roca, A Vives-Guasch, J Hajny
International Symposium on Foundations and Practice of Security, 244-260, 2012
212012
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor
S Oviedo, J Quiroga, C Borras
Dyna 78 (170), 214-220, 2011
21*2011
The system can't perform the operation now. Try again later.
Articles 1–20