BibTeX records: Claudia Díaz

download as .bib file

@inproceedings{DBLP:conf/esorics/GuiratDEZ23,
  author       = {Iness Ben Guirat and
                  Claudia D{\'{\i}}az and
                  Karim Eldefrawy and
                  Hadas Zeilberger},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Traffic Analysis by Adversaries with Partial Visibility},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {338--358},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_17},
  doi          = {10.1007/978-3-031-51476-0\_17},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GuiratDEZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/UgaldeGMCCFIADF23,
  author       = {Jonathan Ugalde and
                  Eduardo Godoy and
                  Diego Mellado and
                  Eduardo Cavieres and
                  Bastian Carvajal and
                  Carlos Fern{\'{a}}ndez and
                  Pamela Illescas and
                  Rodrigo H. Avaria and
                  Claudia D{\'{\i}}az and
                  Rodrigo Ferreira and
                  Marvin Querales and
                  Scarlett Lever and
                  Julio Sotelo and
                  St{\'{e}}ren Chabert and
                  Rodrigo Salas},
  editor       = {Constantine Stephanidis and
                  Margherita Antona and
                  Stavroula Ntoa and
                  Gavriel Salvendy},
  title        = {Torwards Trustworthy Machine Learning based systems: Evaluating breast
                  cancer predictions interpretability using Human Centered Machine Learning
                  and {UX} Techniques},
  booktitle    = {{HCI} International 2023 Posters - 25th International Conference on
                  Human-Computer Interaction, {HCII} 2023, Copenhagen, Denmark, July
                  23-28, 2023, Proceedings, Part {V}},
  series       = {Communications in Computer and Information Science},
  volume       = {1836},
  pages        = {538--545},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-36004-6\_73},
  doi          = {10.1007/978-3-031-36004-6\_73},
  timestamp    = {Sun, 12 Nov 2023 02:12:38 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/UgaldeGMCCFIADF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SharmaGD23,
  author       = {Piyush Kumar Sharma and
                  Devashish Gosain and
                  Claudia D{\'{\i}}az},
  title        = {On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by
                  Cryptocurrencies},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/on-the-anonymity-of-peer-to-peer-network-anonymity-schemes-used-by-cryptocurrencies/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SharmaGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasDKZ23,
  author       = {Debajyoti Das and
                  Claudia D{\'{\i}}az and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {Are continuous stop-and-go mixnets provably secure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1311},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1311},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasDKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/OldenburgAD22,
  author       = {Lennart Oldenburg and
                  Gunes Acar and
                  Claudia D{\'{\i}}az},
  title        = {From "Onion Not Found" to Guard Discovery},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {522--543},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0026},
  doi          = {10.2478/POPETS-2022-0026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/OldenburgAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GuiratD22,
  author       = {Iness Ben Guirat and
                  Claudia D{\'{\i}}az},
  title        = {Mixnet optimization methods},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {456--477},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0081},
  doi          = {10.56553/POPETS-2022-0081},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GuiratD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KohlsD22,
  author       = {Katharina Kohls and
                  Claudia D{\'{\i}}az},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {VerLoc: Verifiable Localization in Decentralized Systems},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2637--2654},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/kohls},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KohlsD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11860,
  author       = {Piyush Kumar Sharma and
                  Devashish Gosain and
                  Claudia D{\'{\i}}az},
  title        = {On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by
                  Cryptocurrencies},
  journal      = {CoRR},
  volume       = {abs/2201.11860},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11860},
  eprinttype    = {arXiv},
  eprint       = {2201.11860},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11860.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GalvezMD21,
  author       = {Rafa G{\'{a}}lvez and
                  Veelasha Moonsamy and
                  Claudia D{\'{\i}}az},
  title        = {Less is More: {A} privacy-respecting Android malware classifier using
                  federated learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {96--116},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0062},
  doi          = {10.2478/POPETS-2021-0062},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/GalvezMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GuiratGD21,
  author       = {Iness Ben Guirat and
                  Devashish Gosain and
                  Claudia D{\'{\i}}az},
  title        = {MiXiM: Mixnet Design Decisions and Empirical Evaluation},
  booktitle    = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy
                  in the Electronic Society, Virtual Event, Korea, 15 November 2021},
  pages        = {33--37},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3463676.3485613},
  doi          = {10.1145/3463676.3485613},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GuiratGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2021-1,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8},
  doi          = {10.1007/978-3-662-64322-8},
  isbn         = {978-3-662-64321-1},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2021-2,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0},
  doi          = {10.1007/978-3-662-64331-0},
  isbn         = {978-3-662-64330-3},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-11928,
  author       = {Katharina Kohls and
                  Claudia D{\'{\i}}az},
  title        = {VerLoc: Verifiable Localization in Decentralized Systems},
  journal      = {CoRR},
  volume       = {abs/2105.11928},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.11928},
  eprinttype    = {arXiv},
  eprint       = {2105.11928},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-11928.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SibyJDVT20,
  author       = {Sandra Siby and
                  Marc Juarez and
                  Claudia D{\'{\i}}az and
                  Narseo Vallina{-}Rodriguez and
                  Carmela Troncoso},
  title        = {Encrypted {DNS} -{\textgreater} Privacy? {A} Traffic Analysis Perspective},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/encrypted-dns-privacy-a-traffic-analysis-perspective/},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SibyJDVT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08319,
  author       = {Rafa G{\'{a}}lvez and
                  Veelasha Moonsamy and
                  Claudia D{\'{\i}}az},
  title        = {Less is More: {A} privacy-respecting Android malware classifier using
                  Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2007.08319},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08319},
  eprinttype    = {arXiv},
  eprint       = {2007.08319},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08319.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09682,
  author       = {Sandra Siby and
                  Marc Juarez and
                  Claudia D{\'{\i}}az and
                  Narseo Vallina{-}Rodriguez and
                  Carmela Troncoso},
  title        = {Encrypted {DNS} -{\textgreater} Privacy? {A} Traffic Analysis Perspective},
  journal      = {CoRR},
  volume       = {abs/1906.09682},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09682},
  eprinttype    = {arXiv},
  eprint       = {1906.09682},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09682.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ShiraziSABD18,
  author       = {Fatemeh Shirazi and
                  Milivoj Simeonovski and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Claudia D{\'{\i}}az},
  title        = {A Survey on Routing in Anonymous Communication Protocols},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {3},
  pages        = {51:1--51:39},
  year         = {2018},
  url          = {https://doi.org/10.1145/3182658},
  doi          = {10.1145/3182658},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/ShiraziSABD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scientometrics/AboitesD18,
  author       = {Jaime Aboites and
                  Claudia D{\'{\i}}az},
  title        = {Inventors' mobility in Mexico in the context of globalization},
  journal      = {Scientometrics},
  volume       = {115},
  number       = {3},
  pages        = {1443--1461},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11192-018-2645-6},
  doi          = {10.1007/S11192-018-2645-6},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scientometrics/AboitesD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JansenJGED18,
  author       = {Rob Jansen and
                  Marc Juarez and
                  Rafa G{\'{a}}lvez and
                  Tariq Elahi and
                  Claudia D{\'{\i}}az},
  title        = {Inside Job: Applying Traffic Analysis to Measure Tor from Within},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_10-2\_Jansen\_paper.pdf},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JansenJGED18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0001},
  doi          = {10.1515/POPETS-2017-0001},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17a,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0012},
  doi          = {10.1515/POPETS-2017-0012},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17b,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0024},
  doi          = {10.1515/POPETS-2017-0024},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazGM17c,
  author       = {Claudia D{\'{\i}}az and
                  Rachel Greenstadt and
                  Damon McCoy},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {1--4},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0036},
  doi          = {10.1515/POPETS-2017-0036},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazGM17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/BalsaPD17,
  author       = {Ero Balsa and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Claudia D{\'{\i}}az},
  title        = {Towards Inferring Communication Patterns in Online Social Networks},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {17},
  number       = {3},
  pages        = {32:1--32:21},
  year         = {2017},
  url          = {https://doi.org/10.1145/3093897},
  doi          = {10.1145/3093897},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/BalsaPD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OverdorfJAGD17,
  author       = {Rebekah Overdorf and
                  Marc Ju{\'{a}}rez and
                  Gunes Acar and
                  Rachel Greenstadt and
                  Claudia D{\'{\i}}az},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {How Unique is Your .onion?: An Analysis of the Fingerprintability
                  of Tor Onion Services},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2021--2036},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134005},
  doi          = {10.1145/3133956.3134005},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/OverdorfJAGD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03387,
  author       = {Fatemeh Shirazi and
                  Elena Andreeva and
                  Markulf Kohlweiss and
                  Claudia D{\'{\i}}az},
  title        = {Multiparty Routing: Secure Routing for Mixnets},
  journal      = {CoRR},
  volume       = {abs/1708.03387},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.03387},
  eprinttype    = {arXiv},
  eprint       = {1708.03387},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-03387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08475,
  author       = {Rebekah Overdorf and
                  Marc Ju{\'{a}}rez and
                  Gunes Acar and
                  Rachel Greenstadt and
                  Claudia D{\'{\i}}az},
  title        = {How Unique is Your .onion? An Analysis of the Fingerprintability of
                  Tor Onion Services},
  journal      = {CoRR},
  volume       = {abs/1708.08475},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08475},
  eprinttype    = {arXiv},
  eprint       = {1708.08475},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16,
  author       = {Claudia D{\'{\i}}az and
                  Apu Kapadia},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {2},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0001},
  doi          = {10.1515/POPETS-2016-0001},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16a,
  author       = {Claudia D{\'{\i}}az and
                  Apu Kapadia},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {3},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0012},
  doi          = {10.1515/POPETS-2016-0012},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DiazK16b,
  author       = {Claudia D{\'{\i}}az and
                  Apu Kapadia},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {4},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0025},
  doi          = {10.1515/POPETS-2016-0025},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DiazK16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JuarezIPDW16,
  author       = {Marc Juarez and
                  Mohsen Imani and
                  Mike Perry and
                  Claudia D{\'{\i}}az and
                  Matthew Wright},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Toward an Efficient Website Fingerprinting Defense},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {27--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_2},
  doi          = {10.1007/978-3-319-45744-4\_2},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JuarezIPDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/VanrykelAHD16,
  author       = {Eline Vanrykel and
                  Gunes Acar and
                  Michael Herrmann and
                  Claudia D{\'{\i}}az},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Leaky Birds: Exploiting Mobile Application Traffic for Surveillance},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {367--384},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_22},
  doi          = {10.1007/978-3-662-54970-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/VanrykelAHD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShiraziSA0D16,
  author       = {Fatemeh Shirazi and
                  Milivoj Simeonovski and
                  Muhammad Rizwan Asghar and
                  Michael Backes and
                  Claudia D{\'{\i}}az},
  title        = {A Survey on Routing in Anonymous Communication Protocols},
  journal      = {CoRR},
  volume       = {abs/1608.05538},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.05538},
  eprinttype    = {arXiv},
  eprint       = {1608.05538},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShiraziSA0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OlejnikACD15,
  author       = {Lukasz Olejnik and
                  Gunes Acar and
                  Claude Castelluccia and
                  Claudia D{\'{\i}}az},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {The Leaking Battery - {A} Privacy Analysis of the {HTML5} Battery
                  Status {API}},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  pages        = {254--263},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_18},
  doi          = {10.1007/978-3-319-29883-2\_18},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/OlejnikACD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShiraziGD15,
  author       = {Fatemeh Shirazi and
                  Matthias Goehring and
                  Claudia D{\'{\i}}az},
  title        = {Tor Experimentation Tools},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015,
                  San Jose, CA, USA, May 21-22, 2015},
  pages        = {206--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPW.2015.20},
  doi          = {10.1109/SPW.2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShiraziGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ShiraziDW15,
  author       = {Fatemeh Shirazi and
                  Claudia D{\'{\i}}az and
                  Joss Wright},
  editor       = {Indrajit Ray and
                  Nicholas Hopper and
                  Rob Jansen},
  title        = {Towards Measuring Resilience in Anonymous Communication Networks},
  booktitle    = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages        = {95--99},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808138.2808152},
  doi          = {10.1145/2808138.2808152},
  timestamp    = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ShiraziDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JuarezIPDW15,
  author       = {Marc Juarez and
                  Mohsen Imani and
                  Mike Perry and
                  Claudia D{\'{\i}}az and
                  Matthew Wright},
  title        = {{WTF-PAD:} Toward an Efficient Website Fingerprinting Defense for
                  Tor},
  journal      = {CoRR},
  volume       = {abs/1512.00524},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.00524},
  eprinttype    = {arXiv},
  eprint       = {1512.00524},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JuarezIPDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OlejnikACD15,
  author       = {Lukasz Olejnik and
                  Gunes Acar and
                  Claude Castelluccia and
                  Claudia D{\'{\i}}az},
  title        = {The leaking battery: {A} privacy analysis of the {HTML5} Battery Status
                  {API}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OlejnikACD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Rebollo-MonederoPFD14,
  author       = {David Rebollo{-}Monedero and
                  Javier Parra{-}Arnau and
                  Jordi Forn{\'{e}} and
                  Claudia D{\'{\i}}az},
  title        = {Optimizing the design parameters of threshold pool mixes for anonymity
                  and delay},
  journal      = {Comput. Networks},
  volume       = {67},
  pages        = {180--200},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.04.007},
  doi          = {10.1016/J.COMNET.2014.04.007},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Rebollo-MonederoPFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuarezAADG14,
  author       = {Marc Juarez and
                  Sadia Afroz and
                  Gunes Acar and
                  Claudia D{\'{\i}}az and
                  Rachel Greenstadt},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {A Critical Evaluation of Website Fingerprinting Attacks},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {263--274},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660368},
  doi          = {10.1145/2660267.2660368},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JuarezAADG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AcarEEJND14,
  author       = {Gunes Acar and
                  Christian Eubank and
                  Steven Englehardt and
                  Marc Juarez and
                  Arvind Narayanan and
                  Claudia D{\'{\i}}az},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {The Web Never Forgets: Persistent Tracking Mechanisms in the Wild},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {674--689},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660347},
  doi          = {10.1145/2660267.2660347},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AcarEEJND14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icegov/DiazDRGCD14,
  author       = {Claudia D{\'{\i}}az and
                  Victoria D{\'{\i}}az and
                  Elizabeth Rodr{\'{\i}}guez and
                  Mar{\'{\i}}a del Pilar Garc{\'{\i}}a and
                  Yovanna Cadavid and
                  Miriam D{\'{\i}}az},
  editor       = {Elsa Estevez and
                  Marijn Janssen and
                  Lu{\'{\i}}s Soares Barbosa},
  title        = {SUIT, an information system to improve formalities available to Colombian
                  citizens},
  booktitle    = {Proceedings of the 8th International Conference on Theory and Practice
                  of Electronic Governance, {ICEGOV} 2014, Guimaraes, Portugal, October
                  27-30, 2014},
  pages        = {476--477},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2691195.2691235},
  doi          = {10.1145/2691195.2691235},
  timestamp    = {Fri, 08 Sep 2023 14:38:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icegov/DiazDRGCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/HerrmannZNDP14,
  author       = {Michael Herrmann and
                  Ren Zhang and
                  Kai{-}Chun Ning and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  title        = {Censorship-resistant and privacy-preserving distributed web search},
  booktitle    = {14th {IEEE} International Conference on Peer-to-Peer Computing, {P2P}
                  2014, London, United Kingdom, September 9-11, 2014, Proceedings},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/P2P.2014.6934312},
  doi          = {10.1109/P2P.2014.6934312},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/HerrmannZNDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HerrmannRDP14,
  author       = {Michael Herrmann and
                  Alfredo Rial and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Practical privacy-preserving location-sharing based services with
                  aggregate statistics},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627414},
  doi          = {10.1145/2627393.2627414},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Rebollo-MonederoPDF13,
  author       = {David Rebollo{-}Monedero and
                  Javier Parra{-}Arnau and
                  Claudia D{\'{\i}}az and
                  Jordi Forn{\'{e}}},
  title        = {On the measurement of privacy as an attacker's estimation error},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {129--149},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0182-5},
  doi          = {10.1007/S10207-012-0182-5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Rebollo-MonederoPDF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13,
  author       = {Gunes Acar and
                  Marc Juarez and
                  Nick Nikiforakis and
                  Claudia D{\'{\i}}az and
                  Seda F. G{\"{u}}rses and
                  Frank Piessens and
                  Bart Preneel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {FPDetective: dusting the web for fingerprinters},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1129--1140},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516674},
  doi          = {10.1145/2508859.2516674},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HerrmannTDP13,
  author       = {Michael Herrmann and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Optimal sporadic location privacy preserving systems in presence of
                  bandwidth constraints},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517853},
  doi          = {10.1145/2517840.2517853},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/HerrmannTDP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijufks/BalsaTD12,
  author       = {Ero Balsa and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az},
  title        = {A Metric to Evaluate Interaction Obfuscation in Online Social Networks},
  journal      = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.},
  volume       = {20},
  number       = {6},
  pages        = {877--892},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218488512400284},
  doi          = {10.1142/S0218488512400284},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijufks/BalsaTD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BalsaTD12,
  author       = {Ero Balsa and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az},
  title        = {{OB-PWS:} Obfuscation-Based Private Web Search},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {491--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.36},
  doi          = {10.1109/SP.2012.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BalsaTD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TroncosoCDS11,
  author       = {Carmela Troncoso and
                  Enrique Costa{-}Montenegro and
                  Claudia D{\'{\i}}az and
                  Stefan Schiffner},
  title        = {On the difficulty of achieving anonymity for Vehicle-2-X communication},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {14},
  pages        = {3199--3210},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.05.004},
  doi          = {10.1016/J.COMNET.2011.05.004},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/TroncosoCDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011,
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2},
  doi          = {10.1007/978-3-642-23822-2},
  isbn         = {978-3-642-23821-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3567,
  author       = {David Rebollo{-}Monedero and
                  Javier Parra{-}Arnau and
                  Claudia D{\'{\i}}az and
                  Jordi Forn{\'{e}}},
  title        = {On the Measurement of Privacy as an Attacker's Estimation Error},
  journal      = {CoRR},
  volume       = {abs/1111.3567},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3567},
  eprinttype    = {arXiv},
  eprint       = {1111.3567},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3567.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazMT10,
  author       = {Claudia D{\'{\i}}az and
                  Steven J. Murdoch and
                  Carmela Troncoso},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Impact of Network Topology on Anonymity and Overhead in Low-Latency
                  Anonymity Networks},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {184--201},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_11},
  doi          = {10.1007/978-3-642-14527-8\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisDTL10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  Ben Laurie},
  editor       = {Mikhail J. Atallah and
                  Nicholas J. Hopper},
  title        = {Drac: An Architecture for Anonymous Low-Volume Communications},
  booktitle    = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
                  2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6205},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14527-8\_12},
  doi          = {10.1007/978-3-642-14527-8\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisDTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ShokriTDFH10,
  author       = {Reza Shokri and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Julien Freudiger and
                  Jean{-}Pierre Hubaux},
  editor       = {Ehab Al{-}Shaer and
                  Keith B. Frikken},
  title        = {Unraveling an old cloak: k-anonymity for location privacy},
  booktitle    = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages        = {115--118},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866919.1866936},
  doi          = {10.1145/1866919.1866936},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ShokriTDFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DanezisDS10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Paul F. Syverson},
  editor       = {Burton Rosenberg},
  title        = {Anonymous Communication},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {341--389},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c13},
  doi          = {10.1201/9781420059823-C13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DanezisDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DanezisDKT09,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {The Wisdom of Crowds: Attacks and Optimal Constructions},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {406--423},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_25},
  doi          = {10.1007/978-3-642-04444-1\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/AndersonDBS09,
  author       = {Jonathan Anderson and
                  Claudia D{\'{\i}}az and
                  Joseph Bonneau and
                  Frank Stajano},
  editor       = {Jon Crowcroft and
                  Balachander Krishnamurthy},
  title        = {Privacy-enabling social networking over untrusted networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Online Social Networks, {WOSN}
                  2009, Barcelona, Spain, August 17, 2009},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592665.1592667},
  doi          = {10.1145/1592665.1592667},
  timestamp    = {Thu, 03 Feb 2022 15:30:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/AndersonDBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiazTP08,
  author       = {Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A Framework for the Analysis of Mix-Based Steganographic File Systems},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {428--445},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_28},
  doi          = {10.1007/978-3-540-88313-5\_28},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DiazTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazTS08,
  author       = {Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  Andrei Serjantov},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {On the Impact of Social Network Profiling on Anonymity},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {44--62},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_4},
  doi          = {10.1007/978-3-540-70630-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08,
  author       = {Benedikt Gierlichs and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Revisiting a combinatorial approach toward measuring anonymity},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456422},
  doi          = {10.1145/1456403.1456422},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DanezisD07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Space-Efficient Private Search with Applications to Rateless Codes},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_15},
  doi          = {10.1007/978-3-540-77366-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DanezisD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TroncosoDDP07,
  author       = {Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Orr Dunkelman and
                  Bart Preneel},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Traffic Analysis Attacks on a Continuously-Observable Steganographic
                  File System},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_15},
  doi          = {10.1007/978-3-540-77370-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DanezisDFKTP07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Efficient Negative Databases from Cryptographic Hash Functions},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {423--436},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_28},
  doi          = {10.1007/978-3-540-75496-1\_28},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DanezisDT07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Carmela Troncoso},
  editor       = {Nikita Borisov and
                  Philippe Golle},
  title        = {Two-Sided Statistical Disclosure Attack},
  booktitle    = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
                  2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4776},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75551-7\_3},
  doi          = {10.1007/978-3-540-75551-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DanezisDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/DiazTD07,
  author       = {Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  George Danezis},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Does additional information always reduce anonymity?},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {72--75},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314347},
  doi          = {10.1145/1314333.1314347},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/DiazTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/DiazP07,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Milan Petkovic and
                  Willem Jonker},
  title        = {Accountable Anonymous Communication},
  booktitle    = {Security, Privacy, and Trust in Modern Data Management},
  series       = {Data-Centric Systems and Applications},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69861-6\_16},
  doi          = {10.1007/978-3-540-69861-6\_16},
  timestamp    = {Tue, 16 May 2017 14:01:42 +0200},
  biburl       = {https://dblp.org/rec/books/sp/07/DiazP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisD06,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  title        = {Improving the Decoding Efficiency of Private Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DanezisD05,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  editor       = {Shlomi Dolev and
                  Rafail Ostrovsky and
                  Andreas Pfitzmann},
  title        = {Improving the Decoding Efficiency of Private Search},
  booktitle    = {Anonymous Communication and its Applications, 09.10. - 14.10.2005},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {05411},
  publisher    = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2005},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/482},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DanezisD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Diaz05,
  author       = {Claudia D{\'{\i}}az},
  editor       = {Shlomi Dolev and
                  Rafail Ostrovsky and
                  Andreas Pfitzmann},
  title        = {Anonymity Metrics Revisited},
  booktitle    = {Anonymous Communication and its Applications, 09.10. - 14.10.2005},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {05411},
  publisher    = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2005},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/483},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Diaz05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiazSD04,
  author       = {Claudia D{\'{\i}}az and
                  Len Sassaman and
                  Evelyne Dewitte},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Comparison Between Two Practical Mix Designs},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_9},
  doi          = {10.1007/978-3-540-30108-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DiazSD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/DiazP04,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Taxonomy of Mixes and Dummy Traffic},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {215--230},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_18},
  doi          = {10.1007/1-4020-8145-6\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/DiazP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DiazP04,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Jessica J. Fridrich},
  title        = {Reasoning About the Anonymity Provided by Pool Mixes That Generate
                  Dummy Traffic},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {309--325},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_22},
  doi          = {10.1007/978-3-540-30114-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DiazP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazDGPS04,
  author       = {Claudia D{\'{\i}}az and
                  George Danezis and
                  Christian Grothoff and
                  Andreas Pfitzmann and
                  Paul F. Syverson},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept
                  Superior?},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {242--242},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_15},
  doi          = {10.1007/11423409\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazDGPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BohmeDDKP04,
  author       = {Rainer B{\"{o}}hme and
                  George Danezis and
                  Claudia D{\'{\i}}az and
                  Stefan K{\"{o}}psell and
                  Andreas Pfitzmann},
  editor       = {David M. Martin Jr. and
                  Andrei Serjantov},
  title        = {On the {PET} Workshop Panel "Mix Cascades Versus Peer-to-Peer:
                  Is One Concept Superior?"},
  booktitle    = {Privacy Enhancing Technologies, 4th International Workshop, {PET}
                  2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3424},
  pages        = {243--255},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423409\_16},
  doi          = {10.1007/11423409\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/BohmeDDKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DiazCP03,
  author       = {Claudia D{\'{\i}}az and
                  Joris Claessens and
                  Bart Preneel},
  title        = {{APES} - Anonymity and Privacy in Electronic Services},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {27},
  number       = {3},
  year         = {2003},
  timestamp    = {Fri, 17 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DiazCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/ClaessensDGDPV03,
  author       = {Joris Claessens and
                  Claudia D{\'{\i}}az and
                  Caroline Goemans and
                  Jos Dumortier and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Revocable anonymous access to the Internet?},
  journal      = {Internet Res.},
  volume       = {13},
  number       = {4},
  pages        = {242--258},
  year         = {2003},
  url          = {https://doi.org/10.1108/10662240310488933},
  doi          = {10.1108/10662240310488933},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/ClaessensDGDPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazS03,
  author       = {Claudia D{\'{\i}}az and
                  Andrei Serjantov},
  editor       = {Roger Dingledine},
  title        = {Generalising Mixes},
  booktitle    = {Privacy Enhancing Technologies, Third International Workshop, {PET}
                  2003, Dresden, Germany, March 26-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2760},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40956-4\_2},
  doi          = {10.1007/978-3-540-40956-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazSCP02,
  author       = {Claudia D{\'{\i}}az and
                  Stefaan Seys and
                  Joris Claessens and
                  Bart Preneel},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Towards Measuring Anonymity},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_5},
  doi          = {10.1007/3-540-36467-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazSCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics