Publicacións nas que colabora con Carmela González Troncoso (13)

2019

  1. Rethinking location privacy for unknown mobility behaviors

    Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019

2017

  1. Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms

    Proceedings of the ACM Conference on Computer and Communications Security

  2. Filter design for delay-based anonymous communications

    ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

  3. Is geo-indistinguishability what you are looking for?

    WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017

2016

  1. Design of Pool Mixes Against Profiling Attacks in Real Conditions

    IEEE/ACM Transactions on Networking, Vol. 24, Núm. 6, pp. 3662-3675

2014

  1. A least squares approach to the static traffic analysis of high-latency anonymous communication systems

    IEEE Transactions on Information Forensics and Security, Vol. 9, Núm. 9, pp. 1341-1355

  2. Do dummies pay off? Limits of dummy traffic protection in anonymous communications

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2013

  1. Meet the family of statistical disclosure attacks

    2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings

2012

  1. A least squares approach to user profiling in pool mix-based anonymous communication systems

    WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security

  2. Understanding statistical disclosure: A least squares approach

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

2011

  1. Competividade da investigación en Galicia

    Grial: revista galega de cultura, Núm. 190, pp. 48-53

  2. Fingerprinting Tor's hidden service log files using a timing channel

    2011 IEEE International Workshop on Information Forensics and Security, WIFS 2011

  3. On the difficulty of achieving anonymity for Vehicle-2-X communication

    Computer Networks, Vol. 55, Núm. 14, pp. 3199-3210