• David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, and Jordi Soria-Comas. Utility-Preserving Differentially Private Data Releases Via Individual Ranking Microaggregation. Information Fusion vol 30, pp. 1-14. Jan 2016. [ Online: arXiv | DOI ]

  • David Sánchez and Montserrat Batet. C-sanitized: A privacy model for document redaction and sanitization. Journal of the Association for Information Science and Technology. Volume 67, Issue 1, pages 148–163, January 2016. [Online: arXiv | DOI]

  • Josep Domingo-Ferrer, David Sanchez and Jordi Soria-Comas,"Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections". Morgan & Claypool. ISBN 978-1-62705-843-8 [Online link]

  • James Alderman, Christian Janson, Keith Martin and Sarah Renwick, "Extended Functionality in Verifiable Searchable Encryption", Proc. of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Vol. 9540 Springer, 2016. p. 187-205 (Lecture Notes in Computer Science - LNCS; vol. 9540). [Online ePrint | DOI]

  • Mercedes Rodriguez-Garcia, Montserrat Batet and David Sánchez. "Semantic Noise: Privacy-protection of Nominal Microdata through Uncorrelated Noise Addition". 27th International Conference on Tools with Artificial Intelligence - ICTAI 2015, Vietri Sul Mare, Italy, November 2015 [ Online PDF ]

  • Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache and Yunya Zhou. Flexible attribute-based encryption applicable to secure e-healthcare records. International Journal of Information Security. Vol. 14, no. 6, pp. 499-511, Oct 2015, ISSN: 1615-5262. Springer Berlin Heidelberg. [ Online: arXiv | DOI ]

  • Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez and Sergio Martínez, t-Closeness through microaggregation: strict privacy with enhanced utility preservation. IEEE Transactions on Knowledge and Data Engineering, Vol. 27, no. 11, pp. 3098-3110, Oct 2015, ISSN: 1041-4347. [ Online: arXiv | DOI ]

  • Josep Domingo-Ferrer, Sara Ricci and Jordi Soria-Comas. "Disclosure risk assessment via record linkage by a maximum-knowledge attacker". 13th Annual International Conference on Privacy, Security and Trust-PST 2015, Izmir, Turkey, September 2015 [Online PDF]

  • Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer and Hai Jin. Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Transactions on Information Forensics and Security, Vol. 10, no. 9, pp. 1993-2006, Sep 2015, ISSN: 1556-6013. [ Online: arXiv | DOI ]

  • Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, and Refik Molva. “Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases.” 1st IEEE International workshop on Security and Privacy in the Cloud (SPC 2015), Florence, Italy. 30 September 2015. [ Online DOI ]