Publications

BOOK CHAPTERS

      1. Álvarez, A.; Trapero, R.; Guilhot, D.; Marin, E.; Masip, X.; Forné, J. (2019), book chapter "CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework." in "Challenges in cybersecurity and privacy: the European research landscape". Gistrup: River Publishers, 2019, p. 129-148.

      2. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2015), book chapter “Privacy-Enhancing Technologies and Metrics in Personalized Information Systems” in “Advanced Research in Data Privacy”, (Springer) Studies in Computational Intelligence, vol. 567, 2015, pp. 423-442. ISBN 978-3-319-09884-5. DOI: 10.1007/978-3-319-09885-2_23.

      3. J. M. Serna-Olvera, R. A. Morales Pacheco, J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2015), book chapter “Privacy in Vehicular Ad-Hoc Networks,” in "Privacy in a Digital, Networked World", edited by S. Zeadally and B. Mohamad, Springer, Aug. 2015, ISBN: 978-3-319-08469-5.

      4. L. Zarza, J. Forné, J. Pegueroles, M. Soriano (2010). book chapter "Genetic algorithms for designing network security protocols", in "Advances in artificial intelligence for privacy protection and security". World Scientific 2010, ISBN 978-981-279-032-3 : 325-358.

JOURNAL ARTICLES

      1. Estrada, J.; Parra-Arnau , J.; Rodríguez-Hoyos, A.; Forné, J.; Pallares, E. A (2021), "Measurement Study of Online Tracking and Advertising in Ibero-America". IEEE access. 2021. <https://doi.org/10.1109/ACCESS.2021.3085024> (JCR Index: 3.745 [SCI, 2019], posición 35/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q1)

      2. Marta Expósito-Ventura, José A. Ruipérez Valiente, Javier Parra-Arnau, Jordi Forné (2021), "A Survey of the Role of Viewability Within the Online Advertising Ecosystem" . IEEE Access 9: 134593-134610 (JCR Index: 3.745 [SCI, 2019], posición 35/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q1)

      3. C. Satizabal, R. Páez, J. Forné (2022), "SECURE INTERNET VOTING PROTOCOL (SIVP): A SECURE OPTION FOR ELECTORAL PROCESSES". Journal of King Saud University - Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2020.12.016

      4. A. Rodríguez-Hoyos, J. Estrada-Jiménez, D. Rebollo-Monedero, J. Forné, L. Urquiza-Aguiar (2020), "Preserving Empirical Data Utility in k-Anonymous Microaggregation via Linear Discriminant Analysis". Engineering Applications of Artificial Intelligence. Volume 94, September 2020, 103787. (JCR Index: 4.201 [SCI, 2019], posición 13/91 en “ENGINEERING, MULTIDISCIPLINARY”, Q1)

      5. M. Expósito-Ventura, J. A. Ruipérez-Valiente, J. Forné (2020), “Analyzing and Testing Viewability Methods in an Advertising Network". IEEE Access, vol. 8, pp. 118751-118761. DOI 10.1109/ACCESS.2020.3005478. (JCR Index: 3.745 [SCI, 2019], posición 35/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q1)

      6. M. Aguilar et al. (2020), "INRISCO: INcident monitoRing In Smart COmmunities". IEEE Access. Vol. 8, pp. 72435 – 72460. DOI 10.1109/ACCESS.2020.2987483. (JCR Index: 3.745 [SCI, 2019], posición 35/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q1)

      7. A. Robles-González, J. Parra-Arnau, J. Forné (2020), "A LINDDUN-Based Framework for Privacy Threat Analysis on Identification and Authentication Processes". Computers & Security. Volume 94, July 2020. DOI 10.1016/j.cose.2020.101755. (JCR Index: 3.579 [SCI, 2019], posición 42/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q2)

      8. A. Rodríguez-Hoyos, J. Estrada-Jiménez, D. Rebollo-Monedero, A. Mezher, J. Parra-Arnau, J. Forné (2020), "The Fast Maximum Distance to Average Vector (F-MDAV): An Algorithm for k-Anonymous Microaggregation in Big Data", Engineering Applications of Artificial Intelligence. Volume 90, April 2020. DOI 10.1016/j.engappai.2020.103531. (JCR Index: 4.201 [SCI, 2019], posición 13/91 en “ENGINEERING, MULTIDISCIPLINARY”, Q1)

      9. E. Pallarès, D. Rebollo-Monedero, A. Rodríguez-Hoyos, J. Estrada-Jiménez, A. Mezher, J. Forné (2020), "Mathematically Optimized, Recursive Prepartitioning Strategies for k-Anonymous Microaggregation of Large-Scale Datasets", Expert Systems with Applications. Volume 144, 15 April 2020. DOI 10.1016/j.eswa.2019.113086. (JCR Index: 5.452 [SCI, 2019], posición 32/266 en “ENGINEERING, ELECTRICAL & ELECTRONIC”, Q1)

      10. D. Rebollo-Monedero, A. Mohamad Mezher, X. Casanova Colomé, J. Forné, M. Soriano (2019), “Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis”, Information Sciences, vol. 503, pp. 417-443. Nov. 2019. DOI 10.1016/j.ins.2019.07.042 (JCR Index: 5.91 [SCI, 2019], posición 9/156 en “COMPUTER SCIENCE, INFORMATION SYSTEMS”, Q1)

      11. J. Estrada-Jiménez, J. Parra-Arnau, A. Rodríguez-Hoyos, J. Forné (2019), "On the regulation of personal data distribution in online advertising platforms", Engineering Applications of Artificial Intelligence. Volume 82, June 2019, Pages 13-29. DOI 10.1016/j.engappai.2019.03.013. (JCR Index: 4.201 [SCI, 2019], posición 13/91 en “ENGINEERING, MULTIDISCIPLINARY”, Q1)

      12. L. Guaya-Delgado, E. Pallarès-Segarra, A.M. Mezher, J. Forné (2019), "A novel dynamic reputation-based source routing protocol for mobile ad hoc networks", EURASIP Journal on Wireless Communications and Networking, 2019:77, DOI 0.1186/s13638-019-1375-7. (JCR Index: 1.408 [SCI, 2019], posición 190/266 en “ENGINEERING, ELECTRICAL & ELECTRONIC”, Q3)

      13. D. Rebollo-Monedero, C. Hernández-Baigorri, J. Forné, M. Soriano (2018), "Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys with Optimized Scheduling", IEEE Access. [Online]. Available: http://doi.org/10.1109/ACCESS.2018.2875949

      14. A. Rodríguez-Hoyos, J. Estrada-Jiménez, D. Rebollo-Monedero, J. Parra-Arnau, J. Forné (2018), "Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?", IEEE Access 6: 28258-28277. Available: http://dx.doi.org/10.1109/ACCESS.2018.2834858

      15. C. Iza Paredes, A.M. Mezher, M. Aguilar-Igartua, J. Forné (2018), "Game-Theoretical Design of an Adaptive Distributed Dissemination Protocol for VANETs". MDPI Sensors 18(1). http://www.mdpi.com/1424-8220/18/1/294. doi:10.3390/s18010294

      16. S. Puglisi, D. Rebollo-Monedero, J. Forné (2017), “On the anonymity risk of time-varying user profiles,” MDPI Entropy, vol. 19, no. 5, 2017. [Online]. Available: http://www.mdpi.com/1099-4300/19/5/190. DOI: 10.3390/e19050190.

      17. J. Parra-Arnau, F. Gómez Mármol, D. Rebollo-Monedero, J. Forné (2017). “Shall I post this now? Optimized, delay-based privacy protection in social networks", Springer Knowledge and Information Systems (KAIS), Volume 52, Issue 1, pp 113–145. http://dx.doi.org/10.1007/s10115-016-1010-4

      18. S. Puglisi, D. Rebollo-Monedero, J. Forne (2017), "On web user tracking of browsing patterns for personalised advertising", International Journal of Parallel, Emergent and Distributed Systems, 32:5, 502-521, http://dx.doi.org/10.1080/17445760.2017.1282480 (Free eprint: http://www.tandfonline.com/eprint/M5yIyQ4pXIpcsXIfKtfi/full )

      19. L. Urquiza-Aguiar, C. Tripp-Barba, D. Rebollo-Monedero, A. Mezher, M. Aguilar, J. Forné (2017)."Coherent and Automatic Address Resolution for Vehicular Ad Hoc Networks". International Journal of Ad Hoc and Ubiquitous Computing, 25 (3): 163-179. 10.1504/IJAHUC.2017.10001935

      20. D. Rebollo-Monedero, J. Forné, M. Soriano, J. Puiggalí Allepuz (2017), "p-Probabilistic k-Anonymous Microaggregation for the Anonymization of Surveys with Uncertain Participation", Elsevier Information Sciences, 382–383: 388–414, http://dx.doi.org/10.1016/j.ins.2016.12.002

      21. J. Estrada-Jiménez, J. Parra-Arnau, A. Rodríguez, J. Forné (2017), "Online Advertising: Analysis of Privacy Threats and Protection Approaches", Elsevier Computer Communications, 100 : 32–51, 10.1016/j.comcom.2016.12.016

      22. D. Rebollo-Monedero, J. Forné, M. Soriano, J. Puiggalí (2016), "k-Anonymous microaggregation with preservation of statistical dependence", Elsevier Information Sciences, 342: 1-23, http://dx.doi.org/10.1016/j.ins.2016.01.012

      23. Rodriguez-Carrion, A.; Rebollo-Monedero, D.; Forné, J.; Campo, C.; Garcia-Rubio, C.; Parra-Arnau, J.; Das, S.K (2015). "Entropy-Based Privacy against Profiling of User Mobility", MDPI Entropy, 17: 3913-3946. http://dx.doi.org/10.3390/e17063913

      24. Mezher AM, Igartua MA, de la Cruz Llopis LJ, Segarra EP, Tripp-Barba C, Urquiza-Aguiar L, Forné J, Sanvicente-Gargallo ES. (2015). "A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks". MDPI Sensors, 15(4):9039-9077.http://dx.doi.org/10.3390/s150409039

      25. S. Puglisi, J. Parra, J. Forné, D. Rebollo-Monedero (2015). "On Content-Based Recommendation and User Privacy in Social-Tagging Systems". Elsevier Computer Standards & Interfaces, 41:17–27. http://dx.doi.org/10.1016/j.csi.2015.01.004

      26. J. A. Estrada-Jiménez, A. F. Rodríguez, J. Parra, J. Forné (2014)."Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles". Macrothink Network Protocols and Algorithms, 6(2): 55-92. http://dx.doi.org/10.5296/npa.v6i2.5395

      27. D. Rebollo-Monedero, J. Parra-Arnau, J. Forné, C. Diaz (2014). "Optimizing the Design Parameters of Threshold Pool Mixes". Elsevier Computer Networks, 67: 180-200. http://dx.doi.org/10.1016/j.comnet.2014.04.007

      28. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2014). “Measuring the Privacy of User Profiles in Personalized Information Systems,” Elsevier Future Gen. Comput. Sys. (FGCS), 33: 53-63. http://dx.doi.org/10.1016/j.future.2013.01.001

      29. J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné, D. Rebollo-Monedero (2014). “Privacy-Preserving Enhanced Collaborative Tagging”, IEEE Trans. Knowl. Data Eng., 26(1): 180-193. http://dx.doi.org/10.1109/TKDE.2012.248

      30. D. Rebollo-Monedero, A. Bartoli, J. Hernández-Serrano, J. Forné, M. Soriano (2014), “Reconciling Privacy and Efficient Utility Management in Smart Cities”, (Wiley) Trans. Emerging Telecommun. Tech., Special Issue Smart Cities, 25:94–108. http://onlinelibrary.wiley.com/doi/10.1002/ett.2708/abstract

      31. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2014). “Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems”. MDPI Entropy, 16(3): 1586-1631; doi:10.3390/e16031586.

      32. D. Rebollo-Monedero, J. Forné, E. Pallarès, J. Parra-Arnau, C. Tripp, L. Urquiza, M. Aguilar (2014). “On Collaborative Anonymous Communications in Lossy Networks,” Secur., Commun. Netw., Special Issue Secur. Completely Interconn. World, accepted. http://onlinelibrary.wiley.com/doi/10.1002/sec.793/abstract

      33. C. Tripp Barba, L. Urquiza Aguiar, M. Aguilar Igartua, J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, E. Pallarès (2013). "A Collaborative Protocol for Anonymous Reporting in Vehicular Ad Hoc Networks", Elsevier Computer Standards & Interfaces, ISSN: 0920-5489, 36:188-197. http://dx.doi.org/10.1016/j.csi.2013.06.001

      34. D. Rebollo-Monedero, J. Parra-Arnau, C. Diaz, J. Forné (2013). "On the Measurement of Privacy as an Attacker's Estimation Error." Springer Int. J. Inform. Secur., 12(2): 129-149. URL: http://link.springer.com/article/10.1007/s10207-012-0182-5

      35. D. Rebollo-Monedero, J. Parra-Arnau, J. Forné (2013). "A Criterion for the Measurement of the Privacy of User Profiles." INFORMATION, 16(12A): 8285-8290.

      36. R. Martínez-Peláez, F. Rico-Novella, J. Forné, P. Verlarde-Alvarado (2013). "Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh". Journal of Applied Research and Technology, 11: 755-763.

      37. D. Rebollo-Monedero, J. Forné, E. Pallarès, J. Parra-Arnau (2013). “A Modification of the Lloyd Algorithm for k-Anonymous Quantization”. Elsevier Information Sciences, Volume 222, Pages 185–202 DOI: 10.1016/j.ins.2012.08.022.

      38. D. Rebollo-Monedero, M. Solé, J. Nin, J. Forné (2013). "A Modification of the k-Means Method for Quasi-Unsupervised Learning,". Elsevier KNOWLEDGE-BASED SYSTEMS, 37 : 176–185. DOI: 10.1016/j.knosys.2012.07.02

      39. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, J. L. Muñoz, O. Esparza (2012). "Optimal Tag Suppression for Privacy Protection in the Semantic Web", Elsevier Data & Knowl. Eng., 81: 46-66. DOI: 10.1016/j.datak.2012.07.004

      40. D. Rebollo-Monedero, J. Forné, J. Domingo-Ferrer (2012). "Query Profile Obfuscation by Means of Optimal Query Exchange between Users," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 641-654, Sept.-Oct. 2012, doi:10.1109/TDSC.2012.16

      41. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2012). "A Privacy-Protecting Architecture for Recommendation Systems via the Suppression of Ratings", International Journal of Security and Its Applications, 6 (2) : 61-80. [PDF]

      42. D. Rebollo-Monedero, J. Forné, M. Soriano (2011). "An Algorithm for k-Anonymous Microaggregation and Clustering Inspired by the Design of Distortion-Optimized Quantizers", Elsevier Data & Knowl. Eng., 70 (10) : 892-921.

      43. D. Rebollo-Monedero, J. Forné, J. Domingo-Ferrer (2010). "From t-Closeness-Like Privacy to Postrandomization via Information Theory". IEEE Transactions on Knowledge and Data Engineering, 22 (11): 1623-1636. [PDF].

      44. D. Rebollo-Monedero, J. Forné (2010). "Optimized Query Forgery for Private Information Retrieval". IEEE Transactions on Information Theory, 56 (9): 4631-4642.

      45. M. F. Hinarejos, J. L. Muñoz, J. Forné, O. Esparza (2010). "PREON: An Efficient Cascade Revocation Mechanism for Delegation Paths". Elsevier Computers & Security, 29 (6) : 697-711.

      46. D. Rebollo-Monedero, J. Forné, A. Solanas, A. Martinez-Ballesté (2010). "Private Location-Based Information Retrieval through User Collaboration". Elsevier Computer Communications, 33 (6) : 762-774.

      47. J. Forné, F. Hinarejos, A. Marín, F. Almenárez, J. Lopez, J.A. Montenegro, M. Lacoste, D.Díaz (2010). "Pervasive Authentication and Authorization Infrastructures for Mobile Users". Elsevier Computers & Security, 29 (4) : 501-514. [ PDF].

      48. J. L. Muñoz, O. Esparza, M. Aguilar, V. Carrascal, J. Forné (2010). "RDSR-V. Reliable Dynamic Source Routing for Video-Streaming over Mobile Ad Hoc Networks". Elsevier Computer Networks, 54 (1) : 79-96. [ PDF].

      49. D. Rebollo-Monedero, J. Forné (2010). "How Do we Measure Privacy?". Upgrade, 11 (1) : 53-58.

      50. J.L. Muñoz, O. Esparza, J. Forné, E. Pallares (2009). "Design and Implementation of a Lightweight Online Certificate Validation Service". Springer Telecommunication Systems, 41(3) : 229-241. ISSN: 1018-4864

      51. J. Forné, J. L. Muñoz, X. Hinarejos, O. Esparza. (2009). "Certificate Status Validation in Mobile Ad-Hoc Networks". IEEE Wireless Communications, 16 (1) : 55-62. ISSN: 1536-1284. [ PDF].

      52. J.L. Muñoz, O. Esparza, J. Forné, E. Pallares. (2008). "H-OCSP: A protocol to reduce the processing burden in online certificate status validation". Springer Electronic Commerce Research, 8 (4) : 255-273. ISSN: 1389-5753

      53. C. Satizabal, J. Hernandez-Serrano, J. Forné, J. Pegueroles. (2007). "Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks". Elsevier Computer Communications, 30 (7) : 1498-1512. ISSN: 0140-3664

      54. C. Satizábal, R. Páez, J. Forné. (2007). "WAP PKI and Certification Path Validation". International Journal of Internet Protocol Technology , 2 (2) : 88-95. ISSN: 1743-8209

      55. C. Satizábal, R. Páez, J. Forné. (2006). "Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture". Journal of Computers, 1 (7) : 60-68. ISSN: 1796-203X

      56. O. Esparza; J.L. Muñoz; M. Soriano; J. Forné. (2006). "Secure Brokerage Mechanisms for Mobile Electronic Commerce". Elsevier Computer Communications, 29 (12) : 2308-2321. ISSN: 0140-3664

      57. O. Esparza; M. Soriano; J. L. Muñoz; J. Forné. (2006). "Punishing Malicious Hosts with the Cryptographic Traces Approach". Springer New Generation Computing, 24 (4) : 351-376. ISSN: 0288-3635

      58. J. L. Muñoz, J. Forné, O. Esparza, M. Soriano. (2004). "Certificate Revocation System Implementation Based on the Merkle Hash Tree". Springer International Journal of Information Security, 2 (2) : 110-124. ISSN: 1615-5262.

      59. J. L. Muñoz, J. Forné. (2002). "CPC-OCSP: An Adaptation of OCSP for m-Commerce". UPGRADE, 3 (6) : 22-26. ISSN: 1684-5285.

      60. F. Recacha, J.L. Melus, X. Simon, M. Soriano, J. Forne. (1993). "Secure data transmission in extended Ethernet environments". IEEE Journal on Selected Areas in Communications, 11 (5) : 794-803. ISSN: 0733-8716

CONFERENCE PAPERS

      1. M. Expósito-Ventura, J. A. Ruipérez Valiente, J. Forné: (2020), "Measuring Online Advertising Viewability and Analyzing its Variability Across Different Dimensions." WIMS 2020: 117-122.

      2. Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, Rodrigo Diaz Rodriguez (2019), "Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach". ISCRAM 2019

      3. A. Rodríguez-Hoyos, J. Estrada-Jiménez, L. Urquiza-Aguiar, J. Parra-Arnau, J. Forné (2018), "Digital Hyper-Transparency: Leading e-Government Against Privacy," In 5th International Conference on E-Business and E-Government (ICEDEG 2018), pp. 263-268. Ambato, Ecuador, April 2018. IEEE. ISBN: 978-1-5386-2521-7. DOI: 10.1109/ICEDEG.2018.8372369.

      4. A.M. Mezher, A. Garcia Alvarez, David Rebollo-Monedero, J. Forné (2017). "Computational Improvements in Parallelized K-Anonymous Microaggregation of Large Databases". 37th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2017, 258-264. Atlanta, GA, USA, June 5-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3292-5

      5. S. Puglisi, D. Rebollo-Monedero, J. Forne, (2016), "On Web User Tracking: How Third-Party Http Requests Track Users' Browsing Patterns for Personalised Advertising", The 15th IFIP Annual Mediterranean Ad Hoc Networking Workshop (MEDHOCNET 2016), Vilanova i la Geltrú, Spain, June 2016.

      6. S. Puglisi, G. Marrugat, A. Torres, M. Aguilar Igartua, J. Forné, (2015). “MobilitApp: Analysing mobility data of citizens in the metropolitan area of Barcelona ”, In Proceedings of the EAI International Conference on Smart Objects and Technologies for Social Good (GoodTechs 2015), Rome, Italy, October 26th 2015.

      7. S. Puglisi, D. Rebollo-Monedero, J. Forné, (2015). "Potential mass surveillance and privacy violations in proximity-based social applications". The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015). Helsinki, Finland.

      8. S. Puglisi, D. Rebollo-Monedero, J. Forné, (2015). "You never surf alone. Ubiquitous tracking of users' browsing habits", 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria.

      9. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2011), "An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval".FGIT-SecTech 2011: 146-154. Jeju Island, Korea, Dec. 2011.

      10. J. Parra-Arnau, D. Rebollo-Monedero, J. Forné (2011), "A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings," in Proc. 6th International Workshop on Data Privacy Management (DPM 2011). Lecture Notes in Computer Science , 7122 : 42-57. Leuven, Belgium, Sep. 2011.

      11. J.Parra-Arnau, D. Rebollo-Monedero, J. Forné (2010): A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression. TrustBus 2010, Lecture Notes in Computer Science , 5141 : 58-68. Bilbao, Spain. 2010.

      12. D. Rebollo-Monedero, J. Forné, M. Soriano (2009), "Private Location-Based Information Retrieval via k-Anonymous Clustering," in Proc. CNIT Tyrrhenian International Workshop on Digital Communications, Pula, Sardinia, Italy, Sept. 2-4, 2009 [PDF].

      13. D. Rebollo-Monedero, J. Forné, L. Subirats, A. Solanas, A. Martínez-Ballasté (2009). A Collaborative Protocol for Private Retrieval of Location-Based Information. Proceedings of the IADIS International Conference e-Society 2009. IADIS Press, 2009, p. 19-26. [PDF].

      14. M. Gheorghita; A. Solanas; J. Forne (2008). Location Privacy in Chain-Based protocols for Location-Based services. Proceedings of the Third International Conference on Digital Telecommunications. IEEE Computer Society, 2008, p. 64-69.

      15. C. Satizábal; J. Forné; R. Martínez-Peláez; F. J. Rico-Novella (2008). Hierarchical Trust Architecture in a Mobile Ad-Hoc Network Using Ant Algorithms. Proceedings of the Third International Conference on Availability, Security and Reliability (ARES'08). IEEE Computer Society, 2008, p. 1000-1007.

      16. R. Martínez-Peláez; C. Satizábal; F. Rico-Novella; J. Forné (2008). Efficiente Certificate Path Validation and Its Application in Mobile Payment Protocols. Proceedings of the Third International Conference on Availability, Security and Reliability (ARES'08). IEEE Computer Society, 2008, p. 701-708.

      17. R. Paez, J. Tomas-Buliart, J. Forne, M. Soriano (2008). Securing Agents against Malicious Host in an Intrusion Detection System . Lecture Notes in Computer Science , 5141 ( ) : 94-105. ISSN: 0302-9743

      18. D. Rebollo-Monedero, J. Forné, J. Domingo-Ferrer (2008). From t -Closeness to PRAM and Noise Addition Via Information Theory . Lecture Notes in Computer Science , 5262 ( ) : 100-112. ISSN: 0302-9743 [PDF].

      19. C. Satizabal, R. Martinez-Pelaez, J. Forné, F. Rico Novella. (2007). Reducing the Computational Cost of Certification Path Validation in Mobile Payment. Lecture Notes in Computer Science , 4582 ( ) : 280-296. ISSN: 0302-9743

      20. R. Páez, J. Tomàs, J. Forné, M. Soriano (2007). MAIS: Mobile Agent Integrity System. A Security system to IDS based on Autonomous agents. Proceedings International Conference on Security and Cryptography (SECRYPT 2007). INSTICC, 2007, p. 41-47.

      21. R. Páez, C. Satizábal, J. Forné (2007). A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. Second International Conference on Availability, Reliability and Security. IEEE Computer Society, 2007, p. 791-798.

      22. R. Páez, C. Satizábal, J. Forné (2007). Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems. International Conference on Internet Surveillance and Protection . IEEE Computer Society Press, 2006, p. 39-45.

      23. C. Satizábal, J. Hernandez-Serrano, J (2006). Forné, J. Pegueroles. (2006). Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. Lecture Notes in Computer Science , 4325 ( ) : 485-496. ISSN: 0302-9743

      24. C. Satizábal, R. Páez, J. Forné. (2006). PROSEARCH: A Protocol to Simplify Path Discovery in Critical Scenarios. Lecture Notes in Computer Science , 4347 ( ) : 151-165. ISSN: 0302-9743

      25. M. Hinarejos; J. Forné. (2006). Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. Lecture Notes in Computer Science , 3983 ( ) : 1098-1106. ISSN: 0302-9743

      26. C. Satizabal, R. Páez, J. Forné (2006). PKI Trust Relationships: from a Hybrid Architecture to a Hierarchical Model. Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice. IEEE Computer Society, 2006, p. 563-570.

      27. F. Almenárez, M. Carbonell, J. Forné, F. Hinarejos, M.Lacoste, A. Marín, J. A. Montenegro (2005). Desing of a Enhanced PKI for Ubiquitous Networks. 16th International Workshop on Database and Expert Systems Applications (DEXA 2005). IEEE Computer Society , 2005, p. 262-266.

      28. M. F. Hinarejos, J. Forné. (2005). A Lightweight Delegated Privileges Revocation Based on Coding. International Workshop on Applied PKI, 207-221.

      29. C. Satizábal, R. Páez, J. Forné (2005). WAP PKI and Certification Path Validation. EUNICE 2005. Universidad Carlos III, 2005, p. 185-190.

      30. J. Muñoz, J. Forné, O. Esparza, M. Rey (2005). Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT). Lecture Notes in Computer Science, 3592 : 119-127. ISSN: 0302-9743

      31. C. Satizábal, R. Páez, J. Forné (2005). PKI Trust Relationship Using Hash Chains WAP PKI and Certification Path Validation. International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research. IPSI Belgrade, 2005.

      32. R. Páez, C. Satizábal, J. Forné (2005). Analysis of Intrusion Detection Systems Based on Autonomous Agents and their Security. International Conference on Advances in the Internet, Processing, Systems and Interdisciplinary Research. IPSI Belgrade, 2005.

      33. R. Páez, C. Satizábal, J. Forné (2005). Cooperative Agents and Software Fingerprinting for Security in Intrusion Detection Systems Based on Autonomous Agents. IASTED International Conference on Databases and Applications DBA 2005. IASTED/ACTA Press , 2005, p. 105-110.

      34. O. Esparza, M. Soriano, J. L. Muñoz, J. Forné (2004). Punishing manipulation attacks in mobile agent systems. Proceedings of IEEE Globecom'04. IEEE, 2004, p. 2235 -2239.

      35. J. Muñoz, J. Forné, O. Esparza, J. Pegueroles, E. Pallares (2004). Reducing the Communication Overhead of an Offline Revocation Dictionary. Proceedings of the 1st International Conference on Trust and Privacy in Digital Business, TrustBus 2004. Springer-Verlag, 2004, p. 269-278.

      36. O. Esparza; M. Soriano; J.L. Muñoz; J. Forné. (2004). Detecting and Proving Manipulation Attacks in Mobile Agent Systems. Lecture Notes in Computer Science , 3284 ( ) : 224-233. ISSN: 0302-9743

      37. J. L. Muñoz, J. Forné, O. Esparza, J. Pegueroles, E. Pallarés. (2004). Reducig the communication overhead of an offline revocaton dictionary. Lecture Notes in Computer Science, 3184 ( ) : 269-278. ISSN: 0302-9743

      38. J.L. Muñoz; J. Pegueroles; J. Forné; O. Esparza; M. Soriano. (2004). Security Issues in Virtual Grid Environments. Lecture Notes in Computer Science , 3038 ( ) : 174-178. ISSN: 0302-9743

      39. J.L. Muñoz, J. Forné, O. Esparza, M. Soriano. (2004). CERVANTES. A Certificate Validation Test-bed. Lecture Notes in Computer Science , 3093 (-) : 28-42. ISSN: 0302-9743

      40. J.L. Muñoz, J. Forné, D. Jodra, O. Esparza, M. Soriano (2003). Evaluation of Revocation Systems with a JAVA Test-bed. 14th International Workshop on Database and Expert Systems Applications. Workshop on Trust and Privacy in Digital Business.Trustbus 03. IEEE, 2003, p. 450-454.

      41. J.L. Muñoz, J. Forne, O. Esparza, M. Soriano (2003). A test-bed for certificate revocation policies. Proceedings IEEE Pacific Rim Conference on Communications, Computers and Signal Processing PACRIM '03. IEEE, 2003, p. 561-564.

      42. J. L. Muñoz, J. Forné (2003). Design of a Certificate Revocation Platform. IEEE International Conference on Information Technology: Research and Education. IEEE, 2003, p. 254-258.

      43. J. Forné, M. F. Hinarejos (2003). Web-based Authorization based on the X.509 Privilege Management Infrastructure. Proceedings IEEE Pacific Rim Conference on Communications, Computers and Signal Processing PACRIM '03. IEEE, 2003, p. 565-568.

      44. J.L. Muñoz, J. Forné, O. Esparza, M. Soriano (2003). Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. Proceedings of the Eight IEEE International Symposium on Computers and Communications. IEEE, 2003, p. 238-243.

      45. O. Esparza, M. Soriano, J. L. Muñoz, J. Forné (2003). A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. Proceedings of the Eight IEEE International Symposium on Computers and Communications. IEEE, 2003, p. 251-256.

      46. O. Esparza, M. Soriano, J. L. Muñoz, J. Forné (2003). Limiting the execution time in a host: a way of protecting mobile agents. IEEE Sarnoff Symposium 2003. Advances in Wired and Wireless Communications. IEEE, 2003, p. 157-160.

      47. J.L. Muñoz; J. Forné; O. Esparza; M. Soriano. (2003). Efficient Offline Certificate Revocation. Lecture Notes in Computer Science, 2899 ( ) : 319-330. ISSN: 0302-9743.

      48. O. Esparza, M. Soriano, J.L. Muñoz, J. Forné. (2003). Protocols for Malicious Host Revocation. Lecture Notes in Computer Science, 2836 ( ) : 191-201. ISSN: 0302-9743.

      49. J. L. Muñoz; J. Forné; O. Esparza; I. Bernabé; M. Soriano. (2003). Using OCSP to Secure Certificate-Using Transactions in m-commerce. Lecture Notes in Computer Science , 2846 ( ) : 280-292. ISSN: 0302-9743.

      50. O. Esparza, M. Soriano, J.L. Muñoz, J. Forné. (2003). Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. Lecture Notes in Computer Science , 2881 (1) : 286-295. ISSN: 0302-9743.

      51. O. Esparza, M. Fernández, M. Soriano, J.L. Muñoz, J. Forné. (2003). Mobile agent watermarking and fingerprinting: tracing malicious hosts. Lecture Notes in Computer Science , 2736 (1) : 927-936. ISSN: 0302-9743.

      52. J.L. Muñoz, J. Forné, O. Esparza, M. Soriano. (2003). A Certificate Status Checking Protocol for the Authenticated Dictionary. Lecture Notes in Computer Science , 2776 (1) : 255-266. ISSN: 0302-9743.

      53. J. L. Muñoz, J. Forné, O. Esparza, M. Soriano. (2003). E-MHT. An Efficient Protocol for Certificate Status Checking. Lecture Notes in Computer Science , 2908 ( ) : 410-424. ISSN: 0302-9743.

      54. O. Esparza, M. Soriano, J. L. Muñoz, J. Forne. (2003). Host Revocation Authority: a Way of Protecting Mobile Agents from Malicious Hosts. Lecture Notes in Computer Science , 2722 ( ) : 289-292. ISSN: 0302-9743.

      55. J.L. Muñoz, J. Forné (2002). Evaluation of certificate revocation policies:OCSP vs Overissued CRL. Proceedings of the 13th International Proceedings Workshop on Database and Expert Systems Applications. IEEE Computer Society, 2002, p. 511-515.

      56. J.L. Muñoz, J. Forné (2002). Certificate Revocation Policies for Wireless Communications. Proceedings of the IASTED International Conference on Communication Systems and Networks. ACTA Press, 2002, p. 427-432.

      57. J. Forné, J. L. Muñoz, J. C. Castro (2001). Certificate Revocation for e-business, e-commerce and m-commerce. SSGRR 2001 Proceedings. Scuola Superiore G. Reiss Romoli, 2001.

      58. G. Beneitez, J. Forné (2000). Electronic Payments over SSL. PROCEEDINGS OF SCI 2000. IIIS, 2000, p. 537-542.

      59. J. Forné, J. C. Castro (2000). A Model to Evaluate Certificate Revocation. PROCEEDINGS OF SCI 2000. IIIS, 2000, p. 516-520.

      60. J. Forne, J.C. Castro (2000). Mobile Internet Secure Access. TELEC'2000 International Conference. Universidad de Alcalá. Servicio de Publicaciones, 2000.

      61. J. Forné, J. L. Melús (1996), An Integrated Solution for Secure Communications over B-ISDN. Communications and Multimedia Security II. CHAPMAN-HALL, 1996, p. 96-107.

      62. J. Forné, J. L. Melús, D. Rebollo (1996). Securing multimedia applications over B-ISDN. Protocols for Multimedia Systems, 1996, p. 135-148.

      63. M. Soriano, J. Forné, J. L. Melús (1996). Linear Complexity Stability in Stream Ciphering for High Speed Networks. 4th. Internacional Conference on Telecommunication Systems. p. 371-379.

      64. J. Forne, F. Recacha, M. Soriano, J. L. Melus (1995). The CRIPTO project architecture: a spanish experience in broadband networks security. ICC'95 IEEE International Conference on Communications. p. 1551-1556.

      65. D. Cruselles, M. Soriano, J. Forne, J.L. Melus (1995). Secure communications in broadband networks. 3rd. Internacional Conference on Telecommunication Systems. p. 114-122.

      66. M. Soriano, J. Forné, F. Recacha, J.L. Melús (1993). A Particular Solution to Provide Secure Communications in an Ethernet Environment. 1st ACM Conference on Computer and Communications Security. p 17-25.

      67. J. Forné, M. Soriano, J.L. Melús, F. Recacha (1993). Hardware Implementation of a Secure Bridge in Ethernet Environment. GLOBECOM'93. IEEE Global Telecommunications Conference. p. 177-181.

      68. M. Soriano, J. Forné, F. Recacha., J.L. Melús (1993). Implementation of a Security System in a Local Area Network Environment. LCN'93. IEEE 18th Annual Conference on Local Computer Networks. p. 230-237.

IN SPANISH

      1. L. Guaya, E. Pallarès, J. Forné (2015), "REMODE: Un algoritmo para el cálculo de la reputación de nodos y caminos en redes ad hoc cooperativas". XIi Jornadas de Ingeniería Telemática (JITEL 2015), Palma de Mallorca, Oct. 2015.

      2. Estrada, J; Rodríguez, A.; Parra, J.; Forné, J; Rebollo-Monedero, D. (2013). "Medición de la Privacidad de Perfiles de Usuario mediante un add-on de Navegador". XI Jornadas de Ingeniería Telemática (JITEL 2013), Granada, 28-30 de Octubre de 2013. p. 93-100.

      3. A. P. Isern-Deyà, M. F. Hinarejos, J. L. Ferrer-Gomila, M. Payeras-Capellà, Carlos Gañán, J. L. Muñoz, J. Forné, O. Esparza (2012). "Un Esquema de Pago Seguro mediante Multicupones para Escenarios Multi-Comerciante, "in Proc. XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI), Donostia-San Sebastián, Spain, Sept. 2012.

      4. D. Rebollo-Monedero, J. Parra-Arnau, J. Forné (2010). , "Un Criterio de Privacidad Basado en Teoría de la Información para la Generación de Consultas Falsas," in Proc. XI Reunión Española sobre Criptología y Seguridad de la Información (RECSI), Tarragona, Spain, Sept. 2010, pp. 129-134 [PDF].

      5. D. Rebollo-Monedero, J. Forné (2009). ¿Cómo medir la privacidad?. Novática, nº 222 : 28-32.

      6. C. Satizábal, R. Páez, J. Forné. (2005). Privilege Delegation: Path Validation vs. Certificate Revocation. Revista Colombiana de Tecnologias de Avanzada , 1 (5) : 8-14. ISSN: 1692-7257 [PDF]

      7. M. Soriano, M. Aguilar, O. Esparza, M. Fernández, J. Forné, J. Hernández-Serrano, Isabel Martín, J. L. Muñoz, Esteve Pallarès, J. Pegueroles, M. Postigo (2005). Distribución de Información Segura con Qos en Entornos Telemáticos. Libro de ponencias de las V JORNADAS DE INGENIERÍA TELEMÁTICA, 2005, p. 749-752.

      8. F. Hinarejos, J. Forné. L-DPR (2005). : un esquema ligero de revocación de privilegios delegados. Libro de ponencias de las V JORNADAS DE INGENIERÍA TELEMÁTICA, p. 367-374.

      9. C. Satizabal, R. Paez, J. Forné. (2005). Construyendo caminos de certificación mediante cadenas de hash. V Jornadas de Ingeniería Telemática. Libro de ponencias de las V JORNADAS DE INGENIERÍA TELEMÁTICA, p. 343-350.

      10. J. Forné, J.L. Muñoz, M. Rey, O. Esparza (2005). . Efficient certificate revocation system implementation: Huffman Merkle hash tree (HuffMHT). Libro de ponencias de las V JORNADAS DE INGENIERÍA TELEMÁTICA, p. 203-208.

      11. F. Hinarejos, J. Forné, F. Almenárez, A. Marín, M. Carbonell, J. A. Montenegro (2005). . Hacia una PKI mejorada para Comercio Electrónico Móvil. III Simposio Español de Comercio Electrónico . Universitat de les Illes Balears, 2005, p. 67-81.

      12. C. Satizábal, R. Páez, J. Forné (2005). Delegación de Privilegios: Validación de Caminos vs. Revocación de Certificados. IV Congreso Internacional de Electrónica y Tecnologías de Avanzada. Universida de Pamplona, 2005.

      13. J. Muñoz, J. Forné. Reducción del overhead de comunicación de un diccionario de revocación offline . Avances en Criptología y Seguridad de la Información. Diaz de Santos, 2004, p. 595-603.

      14. C. Satizabal, J. Forné (2004). Revocación de certificados en la validación de caminos de certificación . Avances en Criptología y Seguridad de la Información. Diaz de Santos, p. 605-614.

      15. M. F. Hinarejos, J. Forné (2004). Seguimientos de cadenas de certificación para un sistema de revocación . Avances en Criptología y Seguridad de la Información. Diaz de Santos, 2004, p. 615-624. Hinarejos, M. F.; Forné, J. Actualización de la Información de Revocación de Privilegios mediante el Seguimiento de Cadenas de Certificados. Libro de actas de las XIV Jornadas Telecom I+D. Varis, p. 1-1.

      16. E. Pallarès, J. Forné; J. L. Muñoz (2003). Estudio estadístico de sistemas de revocación de certificados mediante árboles de Merkle 2-3. Libro de Actas de las IV Jornadas de Ingeniería Telemática. - Servicio de Publicaciones de la Universidad de Las Palmas de Gran Canaria, p. 413-420.

      17. M. F. Hinarejos, J. Forné. Autorización en web basada en Infraestructuras de Gestión de Privilegios X.509. II Simposio Español de Comercio Electrónico. Fundación DINTEL, 2003, p. 49-60.

      18. J. Forné, J. L. Muñoz. (2002). Evaluación y dimensionamiento de sistemas de revocación de certificados. Boletín de Red Iris , (62-63) : 20-23. ISSN: 1139-207X

      19. J. Muñoz, J. Forné, J. Castro(2002). Principios de diseño de un sistema de revocación de certificados digitales. Actas de la VII Reunión Española sobre Criptología y Seguridad de la Información – Vol. II. S. González y C. Martínez - Servicio de Publicaciones de la Universidad de Oviedo, p. 643-656.

      20. J. C. Castro, J. Forné, J. Muñoz (2002). Evaluación del coste computacional de políticas de revocación de certificados. Actas de la VII Reunión Española sobre Criptología y Seguridad de la Información – Vol. II. S. González y C. Martínez - Servicio de Publicaciones de la Universidad de Oviedo, p. 165-178.

      21. J. C. Castro, J. Forné, J. L. Muñoz Tapia (2001). Políticas de revocación de certificados para m-commerce. XI Jornadas de Telecom I+D 2001. Perspectivas Tecnológicas. Telecom I+D.

      22. J. L. Muñoz, J. C. Castro, J. Forné (2001). Estudio comparativo de políticas de revocación de certificados: OCSP vs Overissued CRL. Proceedings JITEL 2001, p. 413-420.

      23. J. C. Castro, J. Forné, J. L. Muñoz (2001). Revocación de Certificados en Aplicaciones de Negocio Electrónico. I Simposio Español de Negocio Electrónico SNE'01, p. 123-134.

      24. J. C. Castro, J. Forné, J. L. Muñoz (2001). Evaluación de políticas de revocación de certificados. Congreso Iberoamericano de Telemática. Universidad del Cauca.

      25. J. Jarne, J. Forné (2000). APSS: Aplicación proveedora de servicios de Seguridad en Internet. Actas de la VI Reunión Española sobre Criptología y Seguridad de la Información. VI RECSI. RA-MA, p. 352-357.

      26. J. C. Castro, J. Forné (2000). Acceso Seguro a Internet Móvil. Actas de la VI Reunión Española sobre Criptología y Seguridad de la Información. VI RECSI. RA-MA, p. 359-366.

      27. C. Bayés, J. Forné (2000). Modelo de Comercio Electrónico basado en código firmado. Actas del Simposio Español de Informatica Distribuida. Oficode S.L., Ourense.

      28. D. Cos, J. Forné (1998). Modelo de Dimensionado de Centros de Certificación con Listas de Revocación. Actas de la V Reunión Española de Criptología y Seguridad de la Información. IMAGRAF, p. 417-428.

      29. D. Rebollo, J. Forné, J. Jarne (1997). Plataforma de Negociación de Servicios de Seguridad en Internet. JORNADAS DE INGENIERIA TELEMATICA. JITEL'97. COMUNICACIONES. IBERDROLA INSTITUTO TECNOLÓGICO, p. 267-272.

      30. J. Forne, J. L. Melus, D. Rebollo (1996). Gestión eficiente de claves en grandes redes. IV Reunión Española sobre Criptología, UNIVERSIDAD DE VALLADOLID, p. 135-142.

      31. J. Forne, M. Soriano, F. Recacha, J.L. Melus (1995). Seguridad en redes de banda ancha. Mundo electrónico. Edición internacional , 1 (260) : 64-70. ISSN: 0300-3787

      32. J. Forne, J. L. Melus, M. Soriano (1995). Criptografia y seguridad en comunicaciones. Novática , 1 (116) : 20-24. ISSN: 0211-2124

      33. J. Forne, F. Recacha (1994). Gestion de claves en un terminal multimedia para rdsi-ba. III Reunión Española Sobre Criptología . UPC., 1994, p. 8-13.

      34. L. de la Cruz, L. Cedó, J. Forné (1993). Implementación de un sistema de seguridad en una red local Ethernet. URSI’93. p. 33-37.

      35. J. Forné, F. Recacha, X. Simón, M. Soriano (1991). Desarrollo de un Sistema de Seguridad para la Red UPCNet basado en Bridges Cifradores. I Reunión Española Sobre Criptología. P. 37-41.