Carmela Troncoso
Carmela Troncoso
Verified email at epfl.ch - Homepage
Title
Cited by
Cited by
Year
Protecting location privacy: Optimal strategy against localization attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3442012
Engineering privacy by design
S Gürses, C Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
2652011
Pripayd: Privacy-friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, J Balasch, B Preneel
IEEE Transactions on Dependable and Secure Computing 8 (5), 742-755, 2011
1682011
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
1682007
Unraveling an old cloak: k-anonymity for location privacy
R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
1492010
PrETP: Privacy-Preserving Electronic Toll Pricing.
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
USENIX Security Symposium 10, 63-78, 2010
1492010
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
A Pyrgelis, C Troncoso, E De Cristofaro
arXiv preprint arXiv:1708.06145, 2017
882017
PIR-Tor: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
Proceedings of the 20th USENIX conference on Security, 31-31, 2011
782011
OB-PWS: obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
772012
Drac: An Architecture for Anonymous Low-Volume Communications
G Danezis, C Diaz, C Troncoso, B Laurie
Privacy Enhancing Technologies, 202-219, 2010
75*2010
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies Symposium 5134, 2-23, 2008
752008
Two-sided statistical disclosure attack
G Danezis, C Diaz, C Troncoso
Privacy Enhancing Technologies, 30-44, 2007
722007
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
682014
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM workshop on Privacy in the electronic society …, 2008
612008
On the impact of social network profiling on anonymity
C Diaz, C Troncoso, A Serjantov
Privacy Enhancing Technologies, 44-62, 2008
592008
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
582016
The bayesian traffic analysis of mix networks
C Troncoso, G Danezis
Proceedings of the 16th ACM conference on Computer and communications …, 2009
502009
Vida: How to use bayesian inference to de-anonymize persistent communications
G Danezis, C Troncoso
Privacy Enhancing Technologies, 56-72, 2009
492009
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
432017
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
422020
The system can't perform the operation now. Try again later.
Articles 1–20