Follow
IMDEA Software Institute
Title
Cited by
Cited by
Year
Protecting location privacy: optimal strategy against localization attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
4702012
Engineering privacy by design
S Gürses, C Troncoso, C Diaz
Computers, Privacy & Data Protection 14 (3), 25, 2011
3742011
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
2042007
Unraveling an old cloak: k-anonymity for location privacy
R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
1862010
PrETP: privacy-preserving electronic toll pricing.
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
USENIX security symposium 10, 63-78, 2010
1792010
PrETP: privacy-preserving electronic toll pricing.
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
USENIX security symposium 10, 63-78, 2010
1772010
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
P Mittal, FG Olumofin, C Troncoso, N Borisov, I Goldberg
USENIX Security Symposium 31, 2011
1332011
OB-PWS: Obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
1182012
: An Architecture for Anonymous Low-Volume Communications
G Danezis, C Diaz, C Troncoso, B Laurie
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
862010
Two-sided statistical disclosure attack
G Danezis, C Diaz, C Troncoso
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
842007
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
832014
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
822008
On the impact of social network profiling on anonymity
C Diaz, C Troncoso, A Serjantov
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
702008
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society …, 2008
672008
Vida: How to use bayesian inference to de-anonymize persistent communications
G Danezis, C Troncoso
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
592009
The bayesian traffic analysis of mix networks
C Troncoso, G Danezis
Proceedings of the 16th ACM conference on Computer and communications …, 2009
582009
Engineering privacy by design reloaded
S Gürses, C Troncoso, C Diaz
Amsterdam Privacy Conference 21, 2015
552015
Impact of network topology on anonymity and overhead in low-latency anonymity networks
C Diaz, SJ Murdoch, C Troncoso
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
492010
Does additional information always reduce anonymity?
C Diaz, C Troncoso, G Danezis
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 72-75, 2007
442007
Do dummies pay off? limits of dummy traffic protection in anonymous communications
S Oya, C Troncoso, F Pérez-González
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
392014
The system can't perform the operation now. Try again later.
Articles 1–20