Exportar 17 resultados:
Autor [ Título
Filtros: First Letter Of Last Name es O [Elimina todos los filtros]
«Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks», in IEEE Workshop on Information Forensics and Security, 2014.
wifs14.pdf (347.72 KB)
, 
«Technical Report TSC/SO/24082016: Filter design for delay-based anonymous communications», 2016.
techrepICASSP2017.pdf (145.46 KB)
, 
«Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic», 2014.
trpets14.pdf (205.16 KB)
, , , 
,
«Rethinking Location Privacy for Unknown Mobility Behaviors», in IEEE European Symposium on Security and Privacy (EuroS&P), 2019.
ms.pdf (634.43 KB)
, 
«Performance of the Multibeam Satellite Return Link with Correlated Rain Attenuation», IEEE Transactions on Wireless Communications, pp. 1-1, 2014.
multibeam_channel_rain_attenuation_arnau_christopoulos_et_al.pdf (4.89 MB)
, 
«MMSE Performance Analysis of Generalized Multibeam Satellite Channels», Communications Letters, IEEE, pp. 1-4, 2013.
1211.5903v1.pdf (192.05 KB)
, 
«Meet the Family of Statistical Disclosure Attacks», in GlobalSIP, 2013.
main-globalsip.pdf (115.96 KB)
, 
«A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems», IEEE Transactions on Information Forensics and Security, 2014.
lsdaTIFS14.pdf (1.64 MB)
, 
«Is Geo-Indistinguishability what you are looking for?», in Workshop on Privacy in the Electronic Society (WPES), 2017.
1709.06318.pdf (822.66 KB)
, 
«Filter design for delay-based anonymous communications», in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
«Do dummies pay off? Limits of dummy traffic protection in anonymous communications», in Privacy Enhancing Technologies Symposium, 2014.
pets14.pdf (421.61 KB)
Matlab files used to perform the experiments in the paper. (5.55 KB)
, 

«Design of pool mixes against profiling attacks in real conditions», IEEE/ACM Transactions on Networking, vol. 24, n.º 6, pp. 3662-3675, 2016.
TNET2547391_author_version.pdf (1.96 MB)
, 
«A comparison of system architectures for intelligent document understanding», Signal Processing: Image Communication, vol. 9, pp. 1-19, 1996.
, «Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms», in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 