Protecting location privacy: Optimal strategy against localization attacks R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 514 | 2012 |
Engineering privacy by design S Gürses, C Troncoso, C Diaz Computers, Privacy & Data Protection, 2011 | 412 | 2011 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 331 | 2020 |
Knock Knock, Who's There? Membership Inference on Aggregate Location Data A Pyrgelis, C Troncoso, E De Cristofaro arXiv preprint arXiv:1708.06145, 2017 | 279 | 2017 |
Pripayd: privacy friendly pay-as-you-drive insurance C Troncoso, G Danezis, E Kosta, B Preneel Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007 | 214 | 2007 |
Unraveling an old cloak: k-anonymity for location privacy R Shokri, C Troncoso, C Diaz, J Freudiger, JP Hubaux Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 188 | 2010 |
PrETP: Privacy-Preserving Electronic Toll Pricing. J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens USENIX Security Symposium 10, 63-78, 2010 | 182 | 2010 |
Synthetic Data–Anonymisation Groundhog Day T Stadler, B Oprisanu, C Troncoso arXiv preprint arXiv:2011.07018, 2020 | 166 | 2020 |
Encrypted DNS--> Privacy? A Traffic Analysis Perspective S Siby, M Juarez, C Diaz, N Vallina-Rodriguez, C Troncoso arXiv preprint arXiv:1906.09682, 2019 | 151 | 2019 |
PIR-Tor: Scalable anonymous communication using private information retrieval P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg Proceedings of the 20th USENIX conference on Security, 31-31, 2011 | 145 | 2011 |
OB-PWS: obfuscation-based private web search E Balsa, C Troncoso, C Diaz 2012 IEEE Symposium on Security and Privacy, 491-505, 2012 | 119 | 2012 |
Privacy games along location traces: A game-theoretic framework for optimizing location privacy R Shokri, G Theodorakopoulos, C Troncoso ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016 | 114 | 2016 |
Early evidence of effectiveness of digital contact tracing for SARS-CoV-2 in Switzerland M Salathé, CL Althaus, N Anderegg, D Antonioli, T Ballouz, E Bugnion, ... medRxiv, 2020 | 110 | 2020 |
POTs: protective optimization technologies B Kulynych, R Overdorf, C Troncoso, S Gürses Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020 | 100* | 2020 |
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms S Oya, C Troncoso, F Pérez-González Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 97 | 2017 |
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014 | 95 | 2014 |
Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments C Troncoso, M Isaakidis, G Danezis, H Halpin Proceedings on Privacy Enhancing Technologies 2017 (4), 404-426, 2017 | 94 | 2017 |
Two-sided statistical disclosure attack G Danezis, C Diaz, C Troncoso Privacy Enhancing Technologies, 30-44, 2007 | 89 | 2007 |
Drac: An Architecture for Anonymous Low-Volume Communications G Danezis, C Diaz, C Troncoso, B Laurie Privacy Enhancing Technologies, 202-219, 2010 | 88* | 2010 |
Perfect matching disclosure attacks C Troncoso, B Gierlichs, B Preneel, I Verbauwhede Privacy Enhancing Technologies Symposium 5134, 2-23, 2008 | 88 | 2008 |