Carmela Troncoso

According to our database1, Carmela Troncoso authored at least 72 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Editors' Introduction.
PoPETs, 2019

Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series.
CoRR, 2019

Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy.
CoRR, 2019

2018
Editors' Introduction.
PoPETs, 2018

Editors' Introduction.
PoPETs, 2018

Editors' Introduction.
PoPETs, 2018

Editors' Introduction.
PoPETs, 2018

Questioning the assumptions behind fairness solutions.
CoRR, 2018

Evading classifiers in discrete domains with provable optimality guarantees.
CoRR, 2018

A Tabula Rasa Approach to Sporadic Location Privacy.
CoRR, 2018

Tandem: Securing Keys by Using a Central Server While Preserving Privacy.
CoRR, 2018

Under the Underground: Predicting Private Interactions in Underground Forums.
CoRR, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer.
CoRR, 2018

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
PoPETs, 2017

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
PoPETs, 2017

Feature importance scores and lossless feature pruning using Banzhaf power indices.
CoRR, 2017

Is Geo-Indistinguishability What You Are Looking for?
CoRR, 2017

Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
CoRR, 2017

Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments.
CoRR, 2017

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
CoRR, 2017

On the the design of optimal location privacy-preserving mechanisms.
CoRR, 2017

ClaimChain: Decentralized Public Key Infrastructure.
CoRR, 2017

Is Geo-Indistinguishability What You Are Looking for?
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Small Data.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Filter design for delay-based anonymous communications.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Design of Pool Mixes Against Profiling Attacks in Real Conditions.
IEEE/ACM Trans. Netw., 2016

TASP: Towards Anonymity Sets that Persist.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

2014
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
IEEE Trans. Information Forensics and Security, 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
CoRR, 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Understanding the effects of real-world behavior in statistical disclosure attacks.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

PRIPARE: A New Vision on Engineering Privacy and Security by Design.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

2013
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

You cannot hide for long: de-anonymization of real-world dynamic behaviour.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

The watchful forensic analyst: Multi-clue information fusion with background knowledge.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Bayesian inference to evaluate information leakage in complex scenarios.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Meet the family of statistical disclosure attacks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
A Metric to Evaluate Interaction Obfuscation in Online Social Networks.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

A Least Squares approach to user profiling in pool mix-based anonymous communication systems.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

OB-PWS: Obfuscation-Based Private Web Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Understanding Statistical Disclosure: A Least Squares Approach.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Protecting location privacy: optimal strategy against localization attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Design and Analysis Methods for Privacy Technologies (Ontwerp- en analysemethodes van privacytechnologieën).
PhD thesis, 2011

PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance.
IEEE Trans. Dependable Sec. Comput., 2011

On the difficulty of achieving anonymity for Vehicle-2-X communication.
Computer Networks, 2011

Fingerprinting Tor's hidden service log files using a timing channel.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Scalable Anonymous Communication with Provable Security.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

PrETP: Privacy-Preserving Electronic Toll Pricing.
Proceedings of the 19th USENIX Security Symposium, 2010

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Drac: An Architecture for Anonymous Low-Volume Communications.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

The Wisdom of Crowds: Attacks and Optimal Constructions.
Proceedings of the Computer Security, 2009

The bayesian traffic analysis of mix networks.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Improving secure long-term archival of digitally signed documents.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Perfect Matching Disclosure Attacks.
Proceedings of the Privacy Enhancing Technologies, 2008

On the Impact of Social Network Profiling on Anonymity.
Proceedings of the Privacy Enhancing Technologies, 2008

A Framework for the Analysis of Mix-Based Steganographic File Systems.
Proceedings of the Computer Security, 2008

2007
Pripayd: privacy friendly pay-as-you-drive insurance.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Does additional information always reduce anonymity?
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Two-Sided Statistical Disclosure Attack.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Proceedings of the Information Hiding, 9th International Workshop, 2007


  Loading...