Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the regulation of personal data distribution in online advertising platforms., , , and . Eng. Appl. Artif. Intell., (2019)On Content-Based Recommendation and User Privacy in Social-Tagging Systems., , , and . CoRR, (2016)Securing Agents against Malicious Host in an Intrusion Detection System., , , and . CRITIS, volume 5141 of Lecture Notes in Computer Science, page 94-105. Springer, (2007)Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets., , , , , and . Expert Syst. Appl., (2020)m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data Publishing., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Optimized query forgery for private information retrieval., and . IEEE Trans. Inf. Theory, 56 (9): 4631-4642 (2010)Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling., , , and . IEEE Access, (2018)Punishing Malicious Hosts with the Cryptographic Traces Approach., , , and . New Gener. Comput., 24 (4): 351-376 (2006)Secure brokerage mechanisms for mobile electronic commerce., , , and . Comput. Commun., 29 (12): 2308-2321 (2006)Seguridad en redes de banda ancha: contribución al diseño evaluación de un sistema de seguridad para la RDSI-BA.. Polytechnic University of Catalonia, Spain, (1997)