Follow
IMDEA Software Institute
Title
Cited by
Cited by
Year
Protecting location privacy: optimal strategy against localization attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5062012
Engineering privacy by design
S Gürses, C Troncoso, C Diaz
Computers, Privacy & Data Protection 14 (3), 25, 2011
4062011
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
2132007
Unraveling an old cloak: k-anonymity for location privacy
R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
1862010
{PrETP}:{Privacy-Preserving} Electronic Toll Pricing
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
19th USENIX Security Symposium (USENIX Security 10), 2010
1842010
{PrETP}:{Privacy-Preserving} Electronic Toll Pricing
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
19th USENIX Security Symposium (USENIX Security 10), 2010
1822010
{PIR-Tor}: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
20th USENIX security symposium (USENIX security 11), 2011
1462011
OB-PWS: Obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
1212012
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
932014
Two-sided statistical disclosure attack
G Danezis, C Diaz, C Troncoso
Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa …, 2007
902007
: An Architecture for Anonymous Low-Volume Communications
G Danezis, C Diaz, C Troncoso, B Laurie
International Symposium on Privacy Enhancing Technologies Symposium, 202-219, 2010
892010
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
872008
On the impact of social network profiling on anonymity
C Diaz, C Troncoso, A Serjantov
International Symposium on Privacy Enhancing Technologies Symposium, 44-62, 2008
752008
Engineering privacy by design reloaded
S Gürses, C Troncoso, C Diaz
Amsterdam Privacy Conference 21, 2015
722015
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society …, 2008
682008
Vida: How to use bayesian inference to de-anonymize persistent communications
G Danezis, C Troncoso
International Symposium on Privacy Enhancing Technologies Symposium, 56-72, 2009
632009
The bayesian traffic analysis of mix networks
C Troncoso, G Danezis
Proceedings of the 16th ACM conference on Computer and communications …, 2009
592009
Impact of network topology on anonymity and overhead in low-latency anonymity networks
C Diaz, SJ Murdoch, C Troncoso
International Symposium on Privacy Enhancing Technologies Symposium, 184-201, 2010
512010
Does additional information always reduce anonymity?
C Diaz, C Troncoso, G Danezis
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 72-75, 2007
502007
Do dummies pay off? limits of dummy traffic protection in anonymous communications
S Oya, C Troncoso, F Pérez-González
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
412014
The system can't perform the operation now. Try again later.
Articles 1–20