Secure remote electronic voting system and cryptographic protocols and computer programs employed AR Jorba, JC Roca US Patent 7,260,552, 2007 | 187 | 2007 |
Preserving user’s privacy in web search engines J Castellà-Roca, A Viejo, J Herrera-Joancomartí Computer Communications 32 (13-14), 1541-1551, 2009 | 137 | 2009 |
On the security of noise addition for privacy in statistical databases J Domingo-Ferrer, F Sebé, J Castella-Roca Privacy in Statistical Databases: CASC Project Final Conference, PSD 2004 …, 2004 | 109 | 2004 |
h (k)‐private information retrieval from privacy‐uncooperative queryable databases J Domingo‐Ferrer, A Solanas, J Castellà‐Roca Online Information Review 33 (4), 720-744, 2009 | 91 | 2009 |
Using social networks to distort users' profiles generated by web search engines A Viejo, J Castellā-Roca Computer Networks 54 (9), 1343-1357, 2010 | 85 | 2010 |
User k-anonymity for privacy preserving data mining of query logs G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca Information Processing & Management 48 (3), 476-487, 2012 | 84 | 2012 |
A secure e-exam management system J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa First International Conference on Availability, Reliability and Security …, 2006 | 84 | 2006 |
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines D Sánchez, J Castellà-Roca, A Viejo Information Sciences 218, 17-30, 2013 | 79 | 2013 |
A survey of electronic ticketing applied to transport M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ... Computers & Security 31 (8), 925-939, 2012 | 57 | 2012 |
Exploiting social networks to provide privacy in personalized web search A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz Journal of Systems and Software 84 (10), 1734-1745, 2011 | 54 | 2011 |
Utility preserving query log anonymization via semantic microaggregation M Batet, A Erola, D Sánchez, J Castellà-Roca Information Sciences 242, 49-63, 2013 | 45 | 2013 |
Preventing automatic user profiling in Web 2.0 applications A Viejo, D Sánchez, J Castellà-Roca Knowledge-Based Systems 36, 191-205, 2012 | 40 | 2012 |
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 36 | 2012 |
Lightweight blockchain-based platform for gdpr-compliant personal data management C Daudén-Esmel, J Castellà-Roca, A Viejo, J Domingo-Ferrer 2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021 | 32 | 2021 |
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ... The Computer Journal 56 (10), 1198-1215, 2013 | 32 | 2013 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013 | 28 | 2013 |
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ... IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012 | 28 | 2012 |
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor S Oviedo, J Quiroga, C Borras Dyna 78 (170), 214-220, 2011 | 28* | 2011 |
Study on poll-site voting and verification systems R Jardí-Cedó, J Pujol-Ahulló, J Castella-Roca, A Viejo Computers & Security 31 (8), 989-1010, 2012 | 27 | 2012 |
Semantic microaggregation for the anonymization of query logs A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010 | 26 | 2010 |