Export 83 results:
Author [ Title
Filters: First Letter Of Last Name is T [Clear All Filters]
“Are you threatening me? Towards smart detectors in watermarking”, in Media Watermarking, Security, and Forensics, San Francisco, CA, USA, 2014.
spie14_2.0.pdf (430.73 KB)
, 
“Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017.
CCSmain.pdf (1.82 MB)
, 
“Bootstrap-based Proxy Reencryption for Private Multi-user Computing”, in IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, 2014.
TroncosoCaputo-BootstrappingMultiKey.pdf (795.89 KB)
, 
“Camera Attribution Forensic Analyzer in the Encrypted Domain”, in IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, 2018.
PMTP18_WIFS18.pdf (655.48 KB)
, 
“Channel dependent Mutual Information in Index Modulations”, in ICCASP, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2018.
ICASSP-CTTC-Pol-vf.pdf (99.09 KB)
, 
“Co-creating Security-and-Privacy-by-Design Systems”, in International Conference on Availability, Reliability and Security (ARES), Salzburg, Germany, 2016, pp. 768-775.
, “Compressive Covariance Sensing: Structure-Based Compressive Sensing Beyond Sparsity”, IEEE Signal Processing Magazine, vol. 33, no. 1, p. 78--93, 2016.
romero_SPM.pdf (408.02 KB)
, 
“CryptoDSPs for Cloud Privacy”, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, “Deep Learning Assisted Rate Adaptation in Spatial Modulation Links”, in 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu (Finland), 2019.
ISWCS_2019_UVigo_August_31_cr.pdf (375.26 KB)
, 
“Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016.
TNET2547391_author_version.pdf (1.96 MB)
, 
“Design of projection matrices for PRNU compression”, in 2017 IEEE Workshop on Information Forensics and Security (WIFS), 2017, pp. 1-6.
2017_prnu_projection.pdf (689.14 KB)
, 
“DNN Watermarking: Four Challenges and a Funeral”, in 2021 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC'21, Virtual Event Belgium, 2021, pp. 189-196.
ihmm13-barniA.pdf (515.94 KB)
, 
“Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014.
pets14.pdf (421.61 KB)
Matlab files used to perform the experiments in the paper. (5.55 KB)
, 

“Dynamic Privacy-Preserving Genomic Susceptibility Testing”, in ACM Workshop on Information Hiding and Multimedia Security, 2016, pp. 45-50.
IHMMSec2016-GenomicPrivSusceptibility.pdf (359.18 KB)
, 
“Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks”, in Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California, USA, 2007.
, “Efficient PRNU Matching in the Encrypted Domain”, in XoveTIC, A Coruña, Spain, 2019.
PMTP19_XoveTIC19.pdf (517.32 KB)
, 
“Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE”, in International Conference on Security and Cryptography for Networks (SCN), 2020.
BEPST20-SCN20.pdf (457.81 KB)
, 
“Efficient protocols for oblivious linear function evaluation from ring-LWE”, Journal of Computer Security, vol. 30, no. 1, p. 40, 2022.
, “Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863.
secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, 
“Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks”, EURASIP Journal on Information Security, 2007.
, “Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience”, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, “Encrypted Domain Processing for Signal Processing Applications”, University of Vigo, Vigo, 2012.
jr_troncoso_thesis.pdf (4.44 MB)
, 
“Exponential asymptotic stability of time-varying inverse prediction error filters”, IEEE Transactions on Signal Processing, vol. 48, pp. 1928–1936, 2000.
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
ICASSPmain.pdf (382.42 KB)
, 
“Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012.
cryptofaces.pdf (213.56 KB)
, 