Follow
Jordi Castellà-Roca
Jordi Castellà-Roca
Verified email at urv.cat
Title
Cited by
Cited by
Year
Secure remote electronic voting system and cryptographic protocols and computer programs employed
AR Jorba, JC Roca
US Patent 7,260,552, 2007
1882007
Preserving user’s privacy in web search engines
J Castellà-Roca, A Viejo, J Herrera-Joancomartí
Computer Communications 32 (13-14), 1541-1551, 2009
1372009
On the security of noise addition for privacy in statistical databases
J Domingo-Ferrer, F Sebé, J Castella-Roca
Privacy in Statistical Databases: CASC Project Final Conference, PSD 2004 …, 2004
1092004
h (k)‐private information retrieval from privacy‐uncooperative queryable databases
J Domingo‐Ferrer, A Solanas, J Castellà‐Roca
Online Information Review 33 (4), 720-744, 2009
912009
Using social networks to distort users' profiles generated by web search engines
A Viejo, J Castellā-Roca
Computer Networks 54 (9), 1343-1357, 2010
852010
User k-anonymity for privacy preserving data mining of query logs
G Navarro-Arribas, V Torra, A Erola, J Castellà-Roca
Information Processing & Management 48 (3), 476-487, 2012
842012
A secure e-exam management system
J Castella-Roca, J Herrera-Joancomarti, A Dorca-Josa
First International Conference on Availability, Reliability and Security …, 2006
842006
Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines
D Sánchez, J Castellà-Roca, A Viejo
Information Sciences 218, 17-30, 2013
802013
A survey of electronic ticketing applied to transport
M Mut-Puigserver, MM Payeras-Capellà, JL Ferrer-Gomila, ...
Computers & Security 31 (8), 925-939, 2012
572012
Exploiting social networks to provide privacy in personalized web search
A Erola, J Castellà-Roca, A Viejo, JM Mateo-Sanz
Journal of Systems and Software 84 (10), 1734-1745, 2011
542011
Utility preserving query log anonymization via semantic microaggregation
M Batet, A Erola, D Sánchez, J Castellà-Roca
Information Sciences 242, 49-63, 2013
452013
Preventing automatic user profiling in Web 2.0 applications
A Viejo, D Sánchez, J Castellà-Roca
Knowledge-Based Systems 36, 191-205, 2012
402012
A scalable RFID authentication protocol supporting ownership transfer and controlled delegation
A Fernandez-Mir, R Trujillo-Rasua, J Castella-Roca, J Domingo-Ferrer
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
362012
Lightweight blockchain-based platform for gdpr-compliant personal data management
C Daudén-Esmel, J Castellà-Roca, A Viejo, J Domingo-Ferrer
2021 IEEE 5th International Conference on Cryptography, Security and Privacy …, 2021
322021
A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users
AP Isern-Deyà, A Vives-Guasch, M Mut-Puigserver, M Payeras-Capellà, ...
The Computer Journal 56 (10), 1198-1215, 2013
322013
Short-term linkable group signatures with categorized batch verification
L Malina, J Castella-Roca, A Vives-Guasch, J Hajny
Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013
282013
A secure e-ticketing scheme for mobile devices with near field communication (NFC) that includes exculpability and reusability
A Vives-Guasch, MM Payeras-Capellà, M Mut-Puigserver, ...
IEICE TRANSACTIONS on Information and Systems 95 (1), 78-93, 2012
282012
Motor current signature analysis and negative sequence current based stator winding short fault detection in an induction motor
S Oviedo, J Quiroga, C Borras
Dyna 78 (170), 214-220, 2011
28*2011
Study on poll-site voting and verification systems
R Jardí-Cedó, J Pujol-Ahulló, J Castella-Roca, A Viejo
Computers & Security 31 (8), 989-1010, 2012
272012
Semantic microaggregation for the anonymization of query logs
A Erola, J Castellà-Roca, G Navarro-Arribas, V Torra
Privacy in Statistical Databases: UNESCO Chair in Data Privacy …, 2010
262010
The system can't perform the operation now. Try again later.
Articles 1–20