Claudia Díaz

According to our database1, Claudia Díaz authored at least 56 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Inventors' mobility in Mexico in the context of globalization.
Scientometrics, 2018

A Survey on Routing in Anonymous Communication Protocols.
ACM Comput. Surv., 2018

Inside Job: Applying Traffic Analysis to Measure Tor from Within.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Towards Inferring Communication Patterns in Online Social Networks.
ACM Trans. Internet Techn., 2017

Editors' Introduction.
PoPETs, 2017

Editors' Introduction.
PoPETs, 2017

Editors' Introduction.
PoPETs, 2017

Editors' Introduction.
PoPETs, 2017

How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Editors' Introduction.
PoPETs, 2016

Editors' Introduction.
PoPETs, 2016

Editors' Introduction.
PoPETs, 2016

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance.
Proceedings of the Financial Cryptography and Data Security, 2016

Toward an Efficient Website Fingerprinting Defense.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
The leaking battery: A privacy analysis of the HTML5 Battery Status API.
IACR Cryptology ePrint Archive, 2015

Towards Measuring Resilience in Anonymous Communication Networks.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Tor Experimentation Tools.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
Optimizing the design parameters of threshold pool mixes for anonymity and delay.
Computer Networks, 2014

Practical privacy-preserving location-sharing based services with aggregate statistics.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Censorship-resistant and privacy-preserving distributed web search.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

SUIT, an information system to improve formalities available to Colombian citizens.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

A Critical Evaluation of Website Fingerprinting Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
On the measurement of privacy as an attacker's estimation error.
Int. J. Inf. Sec., 2013

Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

FPDetective: dusting the web for fingerprinters.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Metric to Evaluate Interaction Obfuscation in Online Social Networks.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

OB-PWS: Obfuscation-Based Private Web Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
On the difficulty of achieving anonymity for Vehicle-2-X communication.
Computer Networks, 2011

2010
Anonymous Communication.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Drac: An Architecture for Anonymous Low-Volume Communications.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

The Wisdom of Crowds: Attacks and Optimal Constructions.
Proceedings of the Computer Security, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

On the Impact of Social Network Profiling on Anonymity.
Proceedings of the Privacy Enhancing Technologies, 2008

A Framework for the Analysis of Mix-Based Steganographic File Systems.
Proceedings of the Computer Security, 2008

2007
Does additional information always reduce anonymity?
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Two-Sided Statistical Disclosure Attack.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Space-Efficient Private Search with Applications to Rateless Codes.
Proceedings of the Financial Cryptography and Data Security, 2007

Accountable Anonymous Communication.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2005
Anonymity Metrics Revisited.
Proceedings of the Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005

Improving the Decoding Efficiency of Private Search.
Proceedings of the Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005

2004
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Taxonomy of Mixes and Dummy Traffic.
Proceedings of the Information Security Management, Education and Privacy, 2004

Comparison Between Two Practical Mix Designs.
Proceedings of the Computer Security, 2004

2003
Revocable anonymous access to the Internet?
Internet Research, 2003

APES - Anonymity and Privacy in Electronic Services.
Datenschutz und Datensicherheit, 2003

Generalising Mixes.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Towards Measuring Anonymity.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002


  Loading...