{\rtf1\ansi\deff0\deftab360
{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}
{\colortbl;
\red0\green0\blue0;
}
{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}
\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms?, in ACM Conference on Computer and Communications Security (CCS), 2017.\par \par S. Oya, P\'e9rez-Gonz\'e1lez, F., and Troncoso, C., ?Filter design for delay-based anonymous communications?, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.\par \par S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Is Geo-Indistinguishability what you are looking for??, in Workshop on Privacy in the Electronic Society (WPES), 2017.\par \par S. Oya, P\'e9rez-Gonz\'e1lez, F., and Troncoso, C., ?Design of pool mixes against profiling attacks in real conditions?, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016.\par \par S. Oya, P\'e9rez-Gonz\'e1lez, F., and Troncoso, C., ?Technical Report for ID TNET-2015-00294 ?Optimal delay characteristic when the number of users is comparable to the number of rounds"?, 2016.\par \par S. Oya, P\'e9rez-Gonz\'e1lez, F., and Troncoso, C., ?Technical Report TSC/SO/24082016: Filter design for delay-based anonymous communications?, 2016.\par \par S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Do dummies pay off? Limits of dummy traffic protection in anonymous communications?, in Privacy Enhancing Technologies Symposium, 2014.\par \par F. P\'e9rez-Gonz\'e1lez, Troncoso, C., and Oya, S., ?A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems?, IEEE Transactions on Information Forensics and Security, 2014.\par \par F. P\'e9rez-Gonz\'e1lez, Troncoso, C., and Oya, S., ?Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior?, 2014.\par \par S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic?, 2014.\par \par S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks?, in IEEE Workshop on Information Forensics and Security, 2014.\par \par F. P\'e9rez-Gonz\'e1lez and Troncoso, C., ?Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems?, University of Vigo, Vigo, 2013.\par \par S. Oya, Troncoso, C., and P\'e9rez-Gonz\'e1lez, F., ?Meet the Family of Statistical Disclosure Attacks?, in GlobalSIP, 2013.\par \par F. P\'e9rez-Gonz\'e1lez and Troncoso, C., ?A Least Squares approach to user profiling in pool mix-based anonymous communication systems.?, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115?120.\par \par F. P\'e9rez-Gonz\'e1lez and Troncoso, C., ?Understanding statistical disclosure: A least squares approach?, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38?57.\par \par }