You are here

Bibliography

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Author is Carmela Troncoso  [Clear All Filters]
2011
Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In: Proceedings of the 20th USENIX Security Symposium. Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA; 2011.
2009
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Danezis G, Diaz C, Käsper E, Troncoso C. The Wisdom of Crowds: Attacks and Optimal Constructions. In: Backes M, Ning P Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Vol. 5789. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Springer; 2009. pp. 406–423. Available from: http://www.springerlink.com/content/t6q86u137t4762k8/
2008
Diaz C, Troncoso C, Serjantov A. On the Impact of Social Network Profiling on Anonymity. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 44–62. Available from: http://portal.acm.org/citation.cfm?id=1428263
Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect Matching Statistical Disclosure Attacks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 2–23. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
2007
Diaz C, Troncoso C, Danezis G. Does additional information always reduce anonymity?. In: Yu T Proceedings of the Workshop on Privacy in the Electronic Society 2007. Proceedings of the Workshop on Privacy in the Electronic Society 2007. Alexandria,VA,USA: ACM New York, NY, USA; 2007. pp. 72–75. Available from: http://portal.acm.org/citation.cfm?id=1314333.1314347
Troncoso C, Diaz C, Dunkelman O, Preneel B. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. In: Proceedings of Information Hiding Workshop (IH 2007). Vol. 4567. Proceedings of Information Hiding Workshop (IH 2007). Saint-Malo,FR: Springer-Verlag; 2007. pp. 220–236. Available from: http://www.springerlink.com/content/h5r4j539833k1k78/
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347