Claudia Díaz

Orcid: 0000-0003-2336-7123

Affiliations:
  • Catholic University of Leuven, Belgium


According to our database1, Claudia Díaz authored at least 62 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Are continuous stop-and-go mixnets provably secure?
IACR Cryptol. ePrint Arch., 2023

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Torwards Trustworthy Machine Learning based systems: Evaluating breast cancer predictions interpretability using Human Centered Machine Learning and UX Techniques.
Proceedings of the HCI International 2023 Posters, 2023

Traffic Analysis by Adversaries with Partial Visibility.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
From "Onion Not Found" to Guard Discovery.
Proc. Priv. Enhancing Technol., 2022

Mixnet optimization methods.
Proc. Priv. Enhancing Technol., 2022

VerLoc: Verifiable Localization in Decentralized Systems.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Less is More: A privacy-respecting Android malware classifier using federated learning.
Proc. Priv. Enhancing Technol., 2021

MiXiM: Mixnet Design Decisions and Empirical Evaluation.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

2020
Encrypted DNS -> Privacy? A Traffic Analysis Perspective.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2018
Inventors' mobility in Mexico in the context of globalization.
Scientometrics, 2018

A Survey on Routing in Anonymous Communication Protocols.
ACM Comput. Surv., 2018

Inside Job: Applying Traffic Analysis to Measure Tor from Within.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Towards Inferring Communication Patterns in Online Social Networks.
ACM Trans. Internet Techn., 2017

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2017

Multiparty Routing: Secure Routing for Mixnets.
CoRR, 2017

How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2016

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance.
Proceedings of the Financial Cryptography and Data Security, 2016

Toward an Efficient Website Fingerprinting Defense.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
The leaking battery: A privacy analysis of the HTML5 Battery Status API.
IACR Cryptol. ePrint Arch., 2015

WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor.
CoRR, 2015

Towards Measuring Resilience in Anonymous Communication Networks.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Tor Experimentation Tools.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

2014
Optimizing the design parameters of threshold pool mixes for anonymity and delay.
Comput. Networks, 2014

Practical privacy-preserving location-sharing based services with aggregate statistics.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Censorship-resistant and privacy-preserving distributed web search.
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014

SUIT, an information system to improve formalities available to Colombian citizens.
Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, 2014

A Critical Evaluation of Website Fingerprinting Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
On the measurement of privacy as an attacker's estimation error.
Int. J. Inf. Sec., 2013

Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

FPDetective: dusting the web for fingerprinters.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
A Metric to Evaluate Interaction Obfuscation in Online Social Networks.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

OB-PWS: Obfuscation-Based Private Web Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
On the difficulty of achieving anonymity for Vehicle-2-X communication.
Comput. Networks, 2011

2010
Anonymous Communication.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Drac: An Architecture for Anonymous Low-Volume Communications.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

The Wisdom of Crowds: Attacks and Optimal Constructions.
Proceedings of the Computer Security, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

On the Impact of Social Network Profiling on Anonymity.
Proceedings of the Privacy Enhancing Technologies, 2008

A Framework for the Analysis of Mix-Based Steganographic File Systems.
Proceedings of the Computer Security, 2008

2007
Does additional information always reduce anonymity?
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Two-Sided Statistical Disclosure Attack.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Efficient Negative Databases from Cryptographic Hash Functions.
Proceedings of the Information Security, 10th International Conference, 2007

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Space-Efficient Private Search with Applications to Rateless Codes.
Proceedings of the Financial Cryptography and Data Security, 2007

Accountable Anonymous Communication.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Improving the Decoding Efficiency of Private Search.
IACR Cryptol. ePrint Arch., 2006

2005
Anonymity Metrics Revisited.
Proceedings of the Anonymous Communication and its Applications, 09.10. - 14.10.2005, 2005

2004
Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Taxonomy of Mixes and Dummy Traffic.
Proceedings of the Information Security Management, Education and Privacy, 2004

Comparison Between Two Practical Mix Designs.
Proceedings of the Computer Security, 2004

2003
Revocable anonymous access to the Internet?
Internet Res., 2003

APES - Anonymity and Privacy in Electronic Services.
Datenschutz und Datensicherheit, 2003

Generalising Mixes.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Towards Measuring Anonymity.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002


  Loading...