Exportar 16 resultados:
Autor Título [ Tipo(Asc)] Año
Filtros: Autor es Carmela Troncoso  [Elimina todos los filtros]
Conference Paper
S. Oya, Troncoso, C., y Pérez-González, F., «Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks», in IEEE Workshop on Information Forensics and Security, 2014.Icono PDF wifs14.pdf (347.72 KB)
F. Pérez-González y Troncoso, C., «Understanding statistical disclosure: A least squares approach», in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57.Icono PDF pets2012_fpg.pdf (450.58 KB)
S. Oya, Troncoso, C., y Pérez-González, F., «Rethinking Location Privacy for Unknown Mobility Behaviors», in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.Icono PDF ms.pdf (634.43 KB)
S. Oya, Troncoso, C., y Pérez-González, F., «Meet the Family of Statistical Disclosure Attacks», in GlobalSIP, 2013.Icono PDF main-globalsip.pdf (115.96 KB)
F. Pérez-González y Troncoso, C., «A Least Squares approach to user profiling in pool mix-based anonymous communication systems.», in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120.Icono PDF wifs2012_pg.pdf (321.08 KB)
S. Oya, Troncoso, C., y Pérez-González, F., «Is Geo-Indistinguishability what you are looking for?», in Workshop on Privacy in the Electronic Society (WPES), 2017.Icono PDF 1709.06318.pdf (822.66 KB)
S. Oya, Pérez-González, F., y Troncoso, C., «Filter design for delay-based anonymous communications», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.Icono PDF ICASSPmain.pdf (382.42 KB)
S. Oya, Troncoso, C., y Pérez-González, F., «Do dummies pay off? Limits of dummy traffic protection in anonymous communications», in Privacy Enhancing Technologies Symposium, 2014.Icono PDF pets14.pdf (421.61 KB)Archivo Matlab files used to perform the experiments in the paper. (5.55 KB)
S. Oya, Troncoso, C., y Pérez-González, F., «Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms», in ACM Conference on Computer and Communications Security (CCS), 2017.Icono PDF CCSmain.pdf (1.82 MB)