default search action
Carmela Troncoso
- > Home > Persons > Carmela Troncoso
Publications
- 2018
- [c42]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. EuroS&P 2018: 137-152 - [c40]Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso:
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging. WPES@CCS 2018: 86-103 - [i14]Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer. CoRR abs/1802.08415 (2018) - 2017
- [j7]Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments. Proc. Priv. Enhancing Technol. 2017(4): 404-426 (2017) - [i7]Carmela Troncoso, George Danezis, Marios Isaakidis, Harry Halpin:
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments. CoRR abs/1704.08065 (2017) - [i5]Bogdan Kulynych, Marios Isaakidis, Carmela Troncoso, George Danezis:
ClaimChain: Decentralized Public Key Infrastructure. CoRR abs/1707.06279 (2017) - 2016
- [c34]Jamie Hayes, Carmela Troncoso, George Danezis:
TASP: Towards Anonymity Sets that Persist. WPES@CCS 2016: 177-180 - 2013
- [c26]George Danezis, Carmela Troncoso:
You cannot hide for long: de-anonymization of real-world dynamic behaviour. WPES 2013: 49-60 - 2011
- [j1]Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Secur. Comput. 8(5): 742-755 (2011) - 2010
- [c17]George Danezis, Claudia Díaz, Carmela Troncoso, Ben Laurie:
Drac: An Architecture for Anonymous Low-Volume Communications. Privacy Enhancing Technologies 2010: 202-219 - 2009
- [c13]Carmela Troncoso, George Danezis:
The bayesian traffic analysis of mix networks. CCS 2009: 369-379 - [c12]George Danezis, Claudia Díaz, Emilia Käsper, Carmela Troncoso:
The Wisdom of Crowds: Attacks and Optimal Constructions. ESORICS 2009: 406-423 - [c11]George Danezis, Carmela Troncoso:
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. Privacy Enhancing Technologies 2009: 56-72 - 2007
- [c4]George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel:
Efficient Negative Databases from Cryptographic Hash Functions. ISC 2007: 423-436 - [c3]George Danezis, Claudia Díaz, Carmela Troncoso:
Two-Sided Statistical Disclosure Attack. Privacy Enhancing Technologies 2007: 30-44 - [c2]Claudia Díaz, Carmela Troncoso, George Danezis:
Does additional information always reduce anonymity? WPES 2007: 72-75 - [c1]Carmela Troncoso, George Danezis, Eleni Kosta, Bart Preneel:
Pripayd: privacy friendly pay-as-you-drive insurance. WPES 2007: 99-107
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint