Carmela Troncoso
Carmela Troncoso
Dirección de correo verificada de epfl.ch - Página principal
TítuloCitado porAño
Protecting location privacy: Optimal strategy against localization attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3142012
Engineering privacy by design
S Gürses, C Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
2392011
Pripayd: Privacy-friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, J Balasch, B Preneel
IEEE Transactions on Dependable and Secure Computing 8 (5), 742-755, 2011
1632011
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
1632007
PrETP: Privacy-Preserving Electronic Toll Pricing.
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
USENIX Security Symposium 10, 63-78, 2010
1442010
Unraveling an old cloak: k-anonymity for location privacy
R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
1372010
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies Symposium 5134, 2-23, 2008
712008
Drac: An Architecture for Anonymous Low-Volume Communications
G Danezis, C Diaz, C Troncoso, B Laurie
Privacy Enhancing Technologies, 202-219, 2010
70*2010
OB-PWS: obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
692012
Two-sided statistical disclosure attack
G Danezis, C Diaz, C Troncoso
Privacy Enhancing Technologies, 30-44, 2007
682007
PIR-Tor: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
Proceedings of the 20th USENIX conference on Security, 31-31, 2011
662011
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
622014
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM workshop on Privacy in the electronic society …, 2008
612008
On the impact of social network profiling on anonymity
C Diaz, C Troncoso, A Serjantov
Privacy Enhancing Technologies, 44-62, 2008
562008
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
A Pyrgelis, C Troncoso, E De Cristofaro
arXiv preprint arXiv:1708.06145, 2017
542017
The bayesian traffic analysis of mix networks
C Troncoso, G Danezis
Proceedings of the 16th ACM conference on Computer and communications …, 2009
472009
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 11, 2017
452017
Vida: How to use bayesian inference to de-anonymize persistent communications
G Danezis, C Troncoso
Privacy Enhancing Technologies, 56-72, 2009
452009
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
S Oya, C Troncoso, F Pérez-González
362017
Impact of network topology on anonymity and overhead in low-latency anonymity networks
C Diaz, S Murdoch, C Troncoso
Privacy Enhancing Technologies, 184-201, 2010
282010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20