Carmela Troncoso
Carmela Troncoso
Verified email at - Homepage
Cited by
Cited by
Protecting location privacy: Optimal strategy against localization attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Engineering privacy by design
S Gürses, C Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
A Pyrgelis, C Troncoso, E De Cristofaro
arXiv preprint arXiv:1708.06145, 2017
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
Unraveling an old cloak: k-anonymity for location privacy
R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
PrETP: Privacy-Preserving Electronic Toll Pricing.
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens
USENIX Security Symposium 10, 63-78, 2010
Synthetic Data–Anonymisation Groundhog Day
T Stadler, B Oprisanu, C Troncoso
arXiv preprint arXiv:2011.07018, 2020
Encrypted DNS--> Privacy? A Traffic Analysis Perspective
S Siby, M Juarez, C Diaz, N Vallina-Rodriguez, C Troncoso
arXiv preprint arXiv:1906.09682, 2019
PIR-Tor: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
Proceedings of the 20th USENIX conference on Security, 31-31, 2011
OB-PWS: obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland
M Salathé, CL Althaus, N Anderegg, D Antonioli, T Ballouz, E Bugnion, ...
medRxiv, 2020
POTs: protective optimization technologies
B Kulynych, R Overdorf, C Troncoso, S Gürses
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms
S Oya, C Troncoso, F Pérez-González
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments
C Troncoso, M Isaakidis, G Danezis, H Halpin
Proceedings on Privacy Enhancing Technologies 2017 (4), 404-426, 2017
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
Two-sided statistical disclosure attack
G Danezis, C Diaz, C Troncoso
Privacy Enhancing Technologies, 30-44, 2007
Drac: An Architecture for Anonymous Low-Volume Communications
G Danezis, C Diaz, C Troncoso, B Laurie
Privacy Enhancing Technologies, 202-219, 2010
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies Symposium 5134, 2-23, 2008
The system can't perform the operation now. Try again later.
Articles 1–20