Jordi Castellà-Roca
Jordi Castellà-Roca
Verified email at
Cited by
Cited by
Secure remote electronic voting system and cryptographic protocols and computer programs employed
AR Jorba, JC Roca
US Patent 7,260,552, 2007
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
On the security of noise addition for privacy in statistical databases
J Domingo-Ferrer, F Sebé, J Castella-Roca
Privacy in Statistical Databases: CASC Project Final Conference, PSD 2004 …, 2004
h (k)‐private information retrieval from privacy‐uncooperative queryable databases
J Domingo‐Ferrer, A Solanas, J Castellà‐Roca
Online Information Review 33 (4), 720-744, 2009
Using social networks to distort users' profiles generated by web search engines
A Viejo, J Castellā-Roca
Computer Networks 54 (9), 1343-1357, 2010
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines
D Sánchez, J Castellà-Roca, A Viejo
Information Sciences 218, 17-30, 2013
A survey of electronic ticketing applied to transport
M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ...
Computers & Security 31 (8), 925-939, 2012
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
Preventing automatic user profiling in Web 2.0 applications
A Viejo, D Sánchez, J Castellà-Roca
Knowledge-Based Systems 36, 191-205, 2012
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users
AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ...
The Computer Journal 56 (10), 1198-1215, 2013
Lightweight blockchain-based platform for gdpr-compliant personal data management
C Daudén-Esmel, J Castellà-Roca, A Viejo, J Domingo-Ferrer
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor
S Oviedo, J Quiroga, C Borras
Dyna 78 (170), 214-220, 2011
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability
A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ...
IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012
Short-term linkable group signatures with categorized batch verification
L Malina, J Castella-Roca, A Vives-Guasch, J Hajny
Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013
Study on poll-site voting and verification systems
R Jardí-Cedó, J Pujol-Ahulló, J Castella-Roca, A Viejo
Computers & Security 31 (8), 989-1010, 2012
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20