Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Claudia Díaz
@inproceedings{DBLP:conf/esorics/GuiratDEZ23, author = {Iness Ben Guirat and Claudia D{\'{\i}}az and Karim Eldefrawy and Hadas Zeilberger}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Traffic Analysis by Adversaries with Partial Visibility}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {338--358}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_17}, doi = {10.1007/978-3-031-51476-0\_17}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GuiratDEZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/UgaldeGMCCFIADF23, author = {Jonathan Ugalde and Eduardo Godoy and Diego Mellado and Eduardo Cavieres and Bastian Carvajal and Carlos Fern{\'{a}}ndez and Pamela Illescas and Rodrigo H. Avaria and Claudia D{\'{\i}}az and Rodrigo Ferreira and Marvin Querales and Scarlett Lever and Julio Sotelo and St{\'{e}}ren Chabert and Rodrigo Salas}, editor = {Constantine Stephanidis and Margherita Antona and Stavroula Ntoa and Gavriel Salvendy}, title = {Torwards Trustworthy Machine Learning based systems: Evaluating breast cancer predictions interpretability using Human Centered Machine Learning and {UX} Techniques}, booktitle = {{HCI} International 2023 Posters - 25th International Conference on Human-Computer Interaction, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {V}}, series = {Communications in Computer and Information Science}, volume = {1836}, pages = {538--545}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-36004-6\_73}, doi = {10.1007/978-3-031-36004-6\_73}, timestamp = {Sun, 12 Nov 2023 02:12:38 +0100}, biburl = {https://dblp.org/rec/conf/hci/UgaldeGMCCFIADF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SharmaGD23, author = {Piyush Kumar Sharma and Devashish Gosain and Claudia D{\'{\i}}az}, title = {On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/on-the-anonymity-of-peer-to-peer-network-anonymity-schemes-used-by-cryptocurrencies/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SharmaGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasDKZ23, author = {Debajyoti Das and Claudia D{\'{\i}}az and Aggelos Kiayias and Thomas Zacharias}, title = {Are continuous stop-and-go mixnets provably secure?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1311}, year = {2023}, url = {https://eprint.iacr.org/2023/1311}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasDKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/OldenburgAD22, author = {Lennart Oldenburg and Gunes Acar and Claudia D{\'{\i}}az}, title = {From "Onion Not Found" to Guard Discovery}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {522--543}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0026}, doi = {10.2478/POPETS-2022-0026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/OldenburgAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GuiratD22, author = {Iness Ben Guirat and Claudia D{\'{\i}}az}, title = {Mixnet optimization methods}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {456--477}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0081}, doi = {10.56553/POPETS-2022-0081}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GuiratD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KohlsD22, author = {Katharina Kohls and Claudia D{\'{\i}}az}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {VerLoc: Verifiable Localization in Decentralized Systems}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2637--2654}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/kohls}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/KohlsD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11860, author = {Piyush Kumar Sharma and Devashish Gosain and Claudia D{\'{\i}}az}, title = {On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies}, journal = {CoRR}, volume = {abs/2201.11860}, year = {2022}, url = {https://arxiv.org/abs/2201.11860}, eprinttype = {arXiv}, eprint = {2201.11860}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11860.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GalvezMD21, author = {Rafa G{\'{a}}lvez and Veelasha Moonsamy and Claudia D{\'{\i}}az}, title = {Less is More: {A} privacy-respecting Android malware classifier using federated learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {96--116}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0062}, doi = {10.2478/POPETS-2021-0062}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GalvezMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GuiratGD21, author = {Iness Ben Guirat and Devashish Gosain and Claudia D{\'{\i}}az}, title = {MiXiM: Mixnet Design Decisions and Empirical Evaluation}, booktitle = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021}, pages = {33--37}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3463676.3485613}, doi = {10.1145/3463676.3485613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GuiratGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-1, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8}, doi = {10.1007/978-3-662-64322-8}, isbn = {978-3-662-64321-1}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-2, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0}, doi = {10.1007/978-3-662-64331-0}, isbn = {978-3-662-64330-3}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-11928, author = {Katharina Kohls and Claudia D{\'{\i}}az}, title = {VerLoc: Verifiable Localization in Decentralized Systems}, journal = {CoRR}, volume = {abs/2105.11928}, year = {2021}, url = {https://arxiv.org/abs/2105.11928}, eprinttype = {arXiv}, eprint = {2105.11928}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-11928.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SibyJDVT20, author = {Sandra Siby and Marc Juarez and Claudia D{\'{\i}}az and Narseo Vallina{-}Rodriguez and Carmela Troncoso}, title = {Encrypted {DNS} -{\textgreater} Privacy? {A} Traffic Analysis Perspective}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/encrypted-dns-privacy-a-traffic-analysis-perspective/}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SibyJDVT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08319, author = {Rafa G{\'{a}}lvez and Veelasha Moonsamy and Claudia D{\'{\i}}az}, title = {Less is More: {A} privacy-respecting Android malware classifier using Federated Learning}, journal = {CoRR}, volume = {abs/2007.08319}, year = {2020}, url = {https://arxiv.org/abs/2007.08319}, eprinttype = {arXiv}, eprint = {2007.08319}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08319.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09682, author = {Sandra Siby and Marc Juarez and Claudia D{\'{\i}}az and Narseo Vallina{-}Rodriguez and Carmela Troncoso}, title = {Encrypted {DNS} -{\textgreater} Privacy? {A} Traffic Analysis Perspective}, journal = {CoRR}, volume = {abs/1906.09682}, year = {2019}, url = {http://arxiv.org/abs/1906.09682}, eprinttype = {arXiv}, eprint = {1906.09682}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ShiraziSABD18, author = {Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia D{\'{\i}}az}, title = {A Survey on Routing in Anonymous Communication Protocols}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {3}, pages = {51:1--51:39}, year = {2018}, url = {https://doi.org/10.1145/3182658}, doi = {10.1145/3182658}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/ShiraziSABD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scientometrics/AboitesD18, author = {Jaime Aboites and Claudia D{\'{\i}}az}, title = {Inventors' mobility in Mexico in the context of globalization}, journal = {Scientometrics}, volume = {115}, number = {3}, pages = {1443--1461}, year = {2018}, url = {https://doi.org/10.1007/s11192-018-2645-6}, doi = {10.1007/S11192-018-2645-6}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scientometrics/AboitesD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JansenJGED18, author = {Rob Jansen and Marc Juarez and Rafa G{\'{a}}lvez and Tariq Elahi and Claudia D{\'{\i}}az}, title = {Inside Job: Applying Traffic Analysis to Measure Tor from Within}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_10-2\_Jansen\_paper.pdf}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JansenJGED18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0001}, doi = {10.1515/POPETS-2017-0001}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17a, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0012}, doi = {10.1515/POPETS-2017-0012}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17b, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {1}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0024}, doi = {10.1515/POPETS-2017-0024}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazGM17c, author = {Claudia D{\'{\i}}az and Rachel Greenstadt and Damon McCoy}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {1--4}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0036}, doi = {10.1515/POPETS-2017-0036}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazGM17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BalsaPD17, author = {Ero Balsa and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Claudia D{\'{\i}}az}, title = {Towards Inferring Communication Patterns in Online Social Networks}, journal = {{ACM} Trans. Internet Techn.}, volume = {17}, number = {3}, pages = {32:1--32:21}, year = {2017}, url = {https://doi.org/10.1145/3093897}, doi = {10.1145/3093897}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/BalsaPD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OverdorfJAGD17, author = {Rebekah Overdorf and Marc Ju{\'{a}}rez and Gunes Acar and Rachel Greenstadt and Claudia D{\'{\i}}az}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2021--2036}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134005}, doi = {10.1145/3133956.3134005}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OverdorfJAGD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-03387, author = {Fatemeh Shirazi and Elena Andreeva and Markulf Kohlweiss and Claudia D{\'{\i}}az}, title = {Multiparty Routing: Secure Routing for Mixnets}, journal = {CoRR}, volume = {abs/1708.03387}, year = {2017}, url = {http://arxiv.org/abs/1708.03387}, eprinttype = {arXiv}, eprint = {1708.03387}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-03387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-08475, author = {Rebekah Overdorf and Marc Ju{\'{a}}rez and Gunes Acar and Rachel Greenstadt and Claudia D{\'{\i}}az}, title = {How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services}, journal = {CoRR}, volume = {abs/1708.08475}, year = {2017}, url = {http://arxiv.org/abs/1708.08475}, eprinttype = {arXiv}, eprint = {1708.08475}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-08475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazK16, author = {Claudia D{\'{\i}}az and Apu Kapadia}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {2}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0001}, doi = {10.1515/POPETS-2016-0001}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazK16a, author = {Claudia D{\'{\i}}az and Apu Kapadia}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {3}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0012}, doi = {10.1515/POPETS-2016-0012}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DiazK16b, author = {Claudia D{\'{\i}}az and Apu Kapadia}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0025}, doi = {10.1515/POPETS-2016-0025}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DiazK16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JuarezIPDW16, author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia D{\'{\i}}az and Matthew Wright}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Toward an Efficient Website Fingerprinting Defense}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {27--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_2}, doi = {10.1007/978-3-319-45744-4\_2}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JuarezIPDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VanrykelAHD16, author = {Eline Vanrykel and Gunes Acar and Michael Herrmann and Claudia D{\'{\i}}az}, editor = {Jens Grossklags and Bart Preneel}, title = {Leaky Birds: Exploiting Mobile Application Traffic for Surveillance}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {367--384}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_22}, doi = {10.1007/978-3-662-54970-4\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/VanrykelAHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShiraziSA0D16, author = {Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia D{\'{\i}}az}, title = {A Survey on Routing in Anonymous Communication Protocols}, journal = {CoRR}, volume = {abs/1608.05538}, year = {2016}, url = {http://arxiv.org/abs/1608.05538}, eprinttype = {arXiv}, eprint = {1608.05538}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShiraziSA0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OlejnikACD15, author = {Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia D{\'{\i}}az}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {The Leaking Battery - {A} Privacy Analysis of the {HTML5} Battery Status {API}}, booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9481}, pages = {254--263}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29883-2\_18}, doi = {10.1007/978-3-319-29883-2\_18}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/OlejnikACD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShiraziGD15, author = {Fatemeh Shirazi and Matthias Goehring and Claudia D{\'{\i}}az}, title = {Tor Experimentation Tools}, booktitle = {2015 {IEEE} Symposium on Security and Privacy Workshops, {SPW} 2015, San Jose, CA, USA, May 21-22, 2015}, pages = {206--213}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPW.2015.20}, doi = {10.1109/SPW.2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShiraziGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ShiraziDW15, author = {Fatemeh Shirazi and Claudia D{\'{\i}}az and Joss Wright}, editor = {Indrajit Ray and Nicholas Hopper and Rob Jansen}, title = {Towards Measuring Resilience in Anonymous Communication Networks}, booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {95--99}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808138.2808152}, doi = {10.1145/2808138.2808152}, timestamp = {Tue, 06 Nov 2018 16:59:07 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ShiraziDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JuarezIPDW15, author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia D{\'{\i}}az and Matthew Wright}, title = {{WTF-PAD:} Toward an Efficient Website Fingerprinting Defense for Tor}, journal = {CoRR}, volume = {abs/1512.00524}, year = {2015}, url = {http://arxiv.org/abs/1512.00524}, eprinttype = {arXiv}, eprint = {1512.00524}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JuarezIPDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OlejnikACD15, author = {Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia D{\'{\i}}az}, title = {The leaking battery: {A} privacy analysis of the {HTML5} Battery Status {API}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2015}, url = {http://eprint.iacr.org/2015/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OlejnikACD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Rebollo-MonederoPFD14, author = {David Rebollo{-}Monedero and Javier Parra{-}Arnau and Jordi Forn{\'{e}} and Claudia D{\'{\i}}az}, title = {Optimizing the design parameters of threshold pool mixes for anonymity and delay}, journal = {Comput. Networks}, volume = {67}, pages = {180--200}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.04.007}, doi = {10.1016/J.COMNET.2014.04.007}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Rebollo-MonederoPFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuarezAADG14, author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia D{\'{\i}}az and Rachel Greenstadt}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Critical Evaluation of Website Fingerprinting Attacks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {263--274}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660368}, doi = {10.1145/2660267.2660368}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JuarezAADG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcarEEJND14, author = {Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and Arvind Narayanan and Claudia D{\'{\i}}az}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {The Web Never Forgets: Persistent Tracking Mechanisms in the Wild}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {674--689}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660347}, doi = {10.1145/2660267.2660347}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarEEJND14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icegov/DiazDRGCD14, author = {Claudia D{\'{\i}}az and Victoria D{\'{\i}}az and Elizabeth Rodr{\'{\i}}guez and Mar{\'{\i}}a del Pilar Garc{\'{\i}}a and Yovanna Cadavid and Miriam D{\'{\i}}az}, editor = {Elsa Estevez and Marijn Janssen and Lu{\'{\i}}s Soares Barbosa}, title = {SUIT, an information system to improve formalities available to Colombian citizens}, booktitle = {Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, {ICEGOV} 2014, Guimaraes, Portugal, October 27-30, 2014}, pages = {476--477}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2691195.2691235}, doi = {10.1145/2691195.2691235}, timestamp = {Fri, 08 Sep 2023 14:38:40 +0200}, biburl = {https://dblp.org/rec/conf/icegov/DiazDRGCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/HerrmannZNDP14, author = {Michael Herrmann and Ren Zhang and Kai{-}Chun Ning and Claudia D{\'{\i}}az and Bart Preneel}, title = {Censorship-resistant and privacy-preserving distributed web search}, booktitle = {14th {IEEE} International Conference on Peer-to-Peer Computing, {P2P} 2014, London, United Kingdom, September 9-11, 2014, Proceedings}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/P2P.2014.6934312}, doi = {10.1109/P2P.2014.6934312}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/HerrmannZNDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HerrmannRDP14, author = {Michael Herrmann and Alfredo Rial and Claudia D{\'{\i}}az and Bart Preneel}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Practical privacy-preserving location-sharing based services with aggregate statistics}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {87--98}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627414}, doi = {10.1145/2627393.2627414}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Rebollo-MonederoPDF13, author = {David Rebollo{-}Monedero and Javier Parra{-}Arnau and Claudia D{\'{\i}}az and Jordi Forn{\'{e}}}, title = {On the measurement of privacy as an attacker's estimation error}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {129--149}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0182-5}, doi = {10.1007/S10207-012-0182-5}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Rebollo-MonederoPDF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13, author = {Gunes Acar and Marc Juarez and Nick Nikiforakis and Claudia D{\'{\i}}az and Seda F. G{\"{u}}rses and Frank Piessens and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {FPDetective: dusting the web for fingerprinters}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1129--1140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516674}, doi = {10.1145/2508859.2516674}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HerrmannTDP13, author = {Michael Herrmann and Carmela Troncoso and Claudia D{\'{\i}}az and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Optimal sporadic location privacy preserving systems in presence of bandwidth constraints}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {167--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517853}, doi = {10.1145/2517840.2517853}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/HerrmannTDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijufks/BalsaTD12, author = {Ero Balsa and Carmela Troncoso and Claudia D{\'{\i}}az}, title = {A Metric to Evaluate Interaction Obfuscation in Online Social Networks}, journal = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.}, volume = {20}, number = {6}, pages = {877--892}, year = {2012}, url = {https://doi.org/10.1142/S0218488512400284}, doi = {10.1142/S0218488512400284}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijufks/BalsaTD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BalsaTD12, author = {Ero Balsa and Carmela Troncoso and Claudia D{\'{\i}}az}, title = {{OB-PWS:} Obfuscation-Based Private Web Search}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {491--505}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.36}, doi = {10.1109/SP.2012.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BalsaTD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TroncosoCDS11, author = {Carmela Troncoso and Enrique Costa{-}Montenegro and Claudia D{\'{\i}}az and Stefan Schiffner}, title = {On the difficulty of achieving anonymity for Vehicle-2-X communication}, journal = {Comput. Networks}, volume = {55}, number = {14}, pages = {3199--3210}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.05.004}, doi = {10.1016/J.COMNET.2011.05.004}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/TroncosoCDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2011, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2}, doi = {10.1007/978-3-642-23822-2}, isbn = {978-3-642-23821-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3567, author = {David Rebollo{-}Monedero and Javier Parra{-}Arnau and Claudia D{\'{\i}}az and Jordi Forn{\'{e}}}, title = {On the Measurement of Privacy as an Attacker's Estimation Error}, journal = {CoRR}, volume = {abs/1111.3567}, year = {2011}, url = {http://arxiv.org/abs/1111.3567}, eprinttype = {arXiv}, eprint = {1111.3567}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3567.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazMT10, author = {Claudia D{\'{\i}}az and Steven J. Murdoch and Carmela Troncoso}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {184--201}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_11}, doi = {10.1007/978-3-642-14527-8\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisDTL10, author = {George Danezis and Claudia D{\'{\i}}az and Carmela Troncoso and Ben Laurie}, editor = {Mikhail J. Atallah and Nicholas J. Hopper}, title = {Drac: An Architecture for Anonymous Low-Volume Communications}, booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS} 2010, Berlin, Germany, July 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6205}, pages = {202--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14527-8\_12}, doi = {10.1007/978-3-642-14527-8\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisDTL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ShokriTDFH10, author = {Reza Shokri and Carmela Troncoso and Claudia D{\'{\i}}az and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Unraveling an old cloak: k-anonymity for location privacy}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {115--118}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866936}, doi = {10.1145/1866919.1866936}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ShokriTDFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, editor = {Burton Rosenberg}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c13}, doi = {10.1201/9781420059823-C13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DanezisDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DanezisDKT09, author = {George Danezis and Claudia D{\'{\i}}az and Emilia K{\"{a}}sper and Carmela Troncoso}, editor = {Michael Backes and Peng Ning}, title = {The Wisdom of Crowds: Attacks and Optimal Constructions}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {406--423}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_25}, doi = {10.1007/978-3-642-04444-1\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DanezisDKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/AndersonDBS09, author = {Jonathan Anderson and Claudia D{\'{\i}}az and Joseph Bonneau and Frank Stajano}, editor = {Jon Crowcroft and Balachander Krishnamurthy}, title = {Privacy-enabling social networking over untrusted networks}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Online Social Networks, {WOSN} 2009, Barcelona, Spain, August 17, 2009}, pages = {1--6}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1592665.1592667}, doi = {10.1145/1592665.1592667}, timestamp = {Thu, 03 Feb 2022 15:30:49 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/AndersonDBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiazTP08, author = {Claudia D{\'{\i}}az and Carmela Troncoso and Bart Preneel}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {428--445}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_28}, doi = {10.1007/978-3-540-88313-5\_28}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DiazTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazTS08, author = {Claudia D{\'{\i}}az and Carmela Troncoso and Andrei Serjantov}, editor = {Nikita Borisov and Ian Goldberg}, title = {On the Impact of Social Network Profiling on Anonymity}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {44--62}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_4}, doi = {10.1007/978-3-540-70630-4\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08, author = {Benedikt Gierlichs and Carmela Troncoso and Claudia D{\'{\i}}az and Bart Preneel and Ingrid Verbauwhede}, editor = {Vijay Atluri and Marianne Winslett}, title = {Revisiting a combinatorial approach toward measuring anonymity}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {111--116}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456422}, doi = {10.1145/1456403.1456422}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DanezisD07, author = {George Danezis and Claudia D{\'{\i}}az}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Space-Efficient Private Search with Applications to Rateless Codes}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {148--162}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_15}, doi = {10.1007/978-3-540-77366-5\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DanezisD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TroncosoDDP07, author = {Carmela Troncoso and Claudia D{\'{\i}}az and Orr Dunkelman and Bart Preneel}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {220--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_15}, doi = {10.1007/978-3-540-77370-2\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DanezisDFKTP07, author = {George Danezis and Claudia D{\'{\i}}az and Sebastian Faust and Emilia K{\"{a}}sper and Carmela Troncoso and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Efficient Negative Databases from Cryptographic Hash Functions}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {423--436}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_28}, doi = {10.1007/978-3-540-75496-1\_28}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DanezisDT07, author = {George Danezis and Claudia D{\'{\i}}az and Carmela Troncoso}, editor = {Nikita Borisov and Philippe Golle}, title = {Two-Sided Statistical Disclosure Attack}, booktitle = {Privacy Enhancing Technologies, 7th International Symposium, {PET} 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4776}, pages = {30--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75551-7\_3}, doi = {10.1007/978-3-540-75551-7\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DanezisDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DiazTD07, author = {Claudia D{\'{\i}}az and Carmela Troncoso and George Danezis}, editor = {Peng Ning and Ting Yu}, title = {Does additional information always reduce anonymity?}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {72--75}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314347}, doi = {10.1145/1314333.1314347}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/DiazTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/DiazP07, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Milan Petkovic and Willem Jonker}, title = {Accountable Anonymous Communication}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {239--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_16}, doi = {10.1007/978-3-540-69861-6\_16}, timestamp = {Tue, 16 May 2017 14:01:42 +0200}, biburl = {https://dblp.org/rec/books/sp/07/DiazP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisD06, author = {George Danezis and Claudia D{\'{\i}}az}, title = {Improving the Decoding Efficiency of Private Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2006}, url = {http://eprint.iacr.org/2006/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DanezisD05, author = {George Danezis and Claudia D{\'{\i}}az}, editor = {Shlomi Dolev and Rafail Ostrovsky and Andreas Pfitzmann}, title = {Improving the Decoding Efficiency of Private Search}, booktitle = {Anonymous Communication and its Applications, 09.10. - 14.10.2005}, series = {Dagstuhl Seminar Proceedings}, volume = {05411}, publisher = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2005}, url = {http://drops.dagstuhl.de/opus/volltexte/2006/482}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DanezisD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Diaz05, author = {Claudia D{\'{\i}}az}, editor = {Shlomi Dolev and Rafail Ostrovsky and Andreas Pfitzmann}, title = {Anonymity Metrics Revisited}, booktitle = {Anonymous Communication and its Applications, 09.10. - 14.10.2005}, series = {Dagstuhl Seminar Proceedings}, volume = {05411}, publisher = {Internationales Begegnungs- und Forschungszentrum f{\"{u}}r Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2005}, url = {http://drops.dagstuhl.de/opus/volltexte/2006/483}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Diaz05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiazSD04, author = {Claudia D{\'{\i}}az and Len Sassaman and Evelyne Dewitte}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Comparison Between Two Practical Mix Designs}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {141--159}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_9}, doi = {10.1007/978-3-540-30108-0\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DiazSD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/DiazP04, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Taxonomy of Mixes and Dummy Traffic}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {215--230}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_18}, doi = {10.1007/1-4020-8145-6\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/DiazP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DiazP04, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Jessica J. Fridrich}, title = {Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {309--325}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_22}, doi = {10.1007/978-3-540-30114-1\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DiazP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazDGPS04, author = {Claudia D{\'{\i}}az and George Danezis and Christian Grothoff and Andreas Pfitzmann and Paul F. Syverson}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {242--242}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_15}, doi = {10.1007/11423409\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazDGPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BohmeDDKP04, author = {Rainer B{\"{o}}hme and George Danezis and Claudia D{\'{\i}}az and Stefan K{\"{o}}psell and Andreas Pfitzmann}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {On the {PET} Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?"}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {243--255}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_16}, doi = {10.1007/11423409\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/BohmeDDKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DiazCP03, author = {Claudia D{\'{\i}}az and Joris Claessens and Bart Preneel}, title = {{APES} - Anonymity and Privacy in Electronic Services}, journal = {Datenschutz und Datensicherheit}, volume = {27}, number = {3}, year = {2003}, timestamp = {Fri, 17 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DiazCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/ClaessensDGDPV03, author = {Joris Claessens and Claudia D{\'{\i}}az and Caroline Goemans and Jos Dumortier and Bart Preneel and Joos Vandewalle}, title = {Revocable anonymous access to the Internet?}, journal = {Internet Res.}, volume = {13}, number = {4}, pages = {242--258}, year = {2003}, url = {https://doi.org/10.1108/10662240310488933}, doi = {10.1108/10662240310488933}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/ClaessensDGDPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazS03, author = {Claudia D{\'{\i}}az and Andrei Serjantov}, editor = {Roger Dingledine}, title = {Generalising Mixes}, booktitle = {Privacy Enhancing Technologies, Third International Workshop, {PET} 2003, Dresden, Germany, March 26-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2760}, pages = {18--31}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40956-4\_2}, doi = {10.1007/978-3-540-40956-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazSCP02, author = {Claudia D{\'{\i}}az and Stefaan Seys and Joris Claessens and Bart Preneel}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Towards Measuring Anonymity}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {54--68}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_5}, doi = {10.1007/3-540-36467-6\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazSCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.