Jordi Castellà-Roca
Jordi Castellà-Roca
Verified email at
Cited by
Cited by
Secure remote electronic voting system and cryptographic protocols and computer programs employed
AR Jorba, JC Roca
US Patent 7,260,552, 2007
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
On the security of noise addition for privacy in statistical databases
J Domingo-Ferrer, F Sebé, J Castella-Roca
International Workshop on Privacy in Statistical Databases, 149-161, 2004
Using social networks to distort users' profiles generated by web search engines
A Viejo, J Castellā-Roca
Computer Networks 54 (9), 1343-1357, 2010
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines
D Sánchez, J Castellà-Roca, A Viejo
Information Sciences 218, 17-30, 2013
h (k)‐private information retrieval from privacy‐uncooperative queryable databases
J Domingo‐Ferrer, A Solanas, J Castellà‐Roca
Online Information Review, 2009
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
A survey of electronic ticketing applied to transport
M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ...
Computers & Security 31 (8), 925-939, 2012
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
International Workshop on Radio Frequency Identification: Security and …, 2011
Preventing automatic user profiling in Web 2.0 applications
A Viejo, D Sánchez, J Castellà-Roca
Knowledge-Based Systems 36, 191-205, 2012
Deploying bioinformatics workflows on clouds with galaxy and globus provision
B Liu, B Sotomayor, R Madduri, K Chard, I Foster
2012 SC Companion: High Performance Computing, Networking Storage and …, 2012
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users
AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ...
The Computer Journal 56 (10), 1198-1215, 2013
Semantic microaggregation for the anonymization of query logs
A Erola, J Castella-Roca, G Navarro-Arribas, V Torra
International Conference on Privacy in Statistical Databases, 127-137, 2010
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability
A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ...
IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012
Practical mental poker without a TTP based on homomorphic encryption
J Castella-Roca, J Domingo-Ferrer, A Riera, J Borrell
International Conference on Cryptology in India, 280-294, 2003
Short-term linkable group signatures with categorized batch verification
L Malina, J Castella-Roca, A Vives-Guasch, J Hajny
International Symposium on Foundations and Practice of Security, 244-260, 2012
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor
S Oviedo, J Quiroga, C Borras
Dyna 78 (170), 214-220, 2011
The system can't perform the operation now. Try again later.
Articles 1–20