Export 16 results:
Author [ Title] Type Year Filters: Author is Carmela Troncoso [Clear All Filters]
“Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Understanding statistical disclosure: A least squares approach”, in Privacy Enhancing Technologies Symposium (PETS), Vigo, Spain, 2012, pp. 38–57. pets2012_fpg.pdf (450.58 KB)
, “Technical Report TSC/SO/24082016: Filter design for delay-based anonymous communications”, 2016. techrepICASSP2017.pdf (145.46 KB)
, “Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014. trpets14.pdf (205.16 KB)
, , , “Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019. ms.pdf (634.43 KB)
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
, “Least Squares Disclosure Attacks: User Profiling for Mix-based Anonymous Communication Systems”, University of Vigo, Vigo, 2013. lssda-main-tifs.pdf (516.78 KB)
, “A Least Squares approach to user profiling in pool mix-based anonymous communication systems.”, in IEEE International Workshop on Information Forensics and Security (WIFS), Tenerife, Spain, 2012, pp. 115–120. wifs2012_pg.pdf (321.08 KB)
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
,