What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carmela Troncoso
Google Scholar
ORCID:
0000-0002-2374-2248
55
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
On the Conflict Between Robustness and Learning in Collaborative Machine Learning.
Mathilde Raynal
Carmela Troncoso
2025
conf/sp
A Low-Cost Privacy-Preserving Digital Wallet for Humanitarian Aid Distribution.
Eva Luvison
Sylvain Chatel
Justinas Sukaitis
Vincent Graf Narbel
Carmela Troncoso
Wouter Lueks
2025
conf/uss
Characterizing and Detecting Propaganda-Spreading Accounts on Telegram.
Klim Kireev
Yevhen Mykhno
Carmela Troncoso
Rebekah Overdorf
2025
conf/uss
Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers.
Saiid El Hajj Chehade
Ben Stock
Carmela Troncoso
2024
conf/ccs
Helium: Scalable MPC among Lightweight Participants and under Churn.
Christian Mouchet
Sylvain Chatel
Apostolos Pyrgelis
Carmela Troncoso
2024
conf/ccs
VERITAS: Plaintext Encoders for Practical Verifiable Homomorphic Encryption.
Sylvain Chatel
Christian Knabenhans
Apostolos Pyrgelis
Carmela Troncoso
Jean-Pierre Hubaux
2024
conf/sp
Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution.
Kasra Edalatnejad
Wouter Lueks
Justinas Sukaitis
Vincent Graf Narbel
Massimo Marelli
Carmela Troncoso
2024
conf/sp
SINBAD: Saliency-informed detection of breakage caused by ad blocking.
Saiid El Hajj Chehade
Sandra Siby
Carmela Troncoso
2024
conf/sp
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data.
Dario Pasquini
Giuseppe Ateniese
Carmela Troncoso
2023
journals/popets
Evaluating practical QUIC website fingerprinting defenses for the masses.
Sandra Siby
Ludovic Barman
Christopher A. Wood
Marwan Fayed
Nick Sullivan
Carmela Troncoso
2023
journals/popets
Private Collection Matching Protocols.
Kasra Edalatnejad
Mathilde Raynal
Wouter Lueks
Carmela Troncoso
2023
conf/ccs
CookieGraph: Understanding and Detecting First-Party Tracking Cookies.
Shaoor Munir
Sandra Siby
Umar Iqbal
Steven Englehardt
Zubair Shafiq
Carmela Troncoso
2023
conf/ccs
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
Sylvain Chatel
Christian Knabenhans
Apostolos Pyrgelis
Carmela Troncoso
Jean-Pierre Hubaux
2023
conf/ccs
PELTA - Shielding Multiparty-FHE against Malicious Adversaries.
Sylvain Chatel
Christian Mouchet
Ali Utkan Sahin
Apostolos Pyrgelis
Carmela Troncoso
Jean-Pierre Hubaux
2023
conf/sp
Not Yet Another Digital ID: Privacy-Preserving Humanitarian Aid Distribution.
Boya Wang
Wouter Lueks
Justinas Sukaitis
Vincent Graf Narbel
Carmela Troncoso
2023
conf/sp
On the (In)security of Peer-to-Peer Decentralized Machine Learning.
Dario Pasquini
Mathilde Raynal
Carmela Troncoso
2023
conf/ndss
Adversarial Robustness for Tabular Data through Cost and Utility Awareness.
Klim Kireev
Bogdan Kulynych
Carmela Troncoso
2022
journals/popets
Disparate Vulnerability to Membership Inference Attacks.
Bogdan Kulynych
Mohammad Yaghini
Giovanni Cherubin
Michael Veale
Carmela Troncoso
2022
conf/uss
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
Giovanni Cherubin
Rob Jansen
Carmela Troncoso
2022
conf/uss
Synthetic Data - Anonymisation Groundhog Day.
Theresa Stadler
Bristena Oprisanu
Carmela Troncoso
2022
conf/uss
WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking.
Sandra Siby
Umar Iqbal
Steven Englehardt
Zubair Shafiq
Carmela Troncoso
2021
journals/popets
CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing.
Wouter Lueks
Seda F. Gürses
Michael Veale
Edouard Bugnion
Marcel Salathé
Kenneth G. Paterson
Carmela Troncoso
2020
journals/popets
Tandem: Securing Keys by Using a Central Server While Preserving Privacy.
Wouter Lueks
Brinda Hampiholi
Greg Alpár
Carmela Troncoso
2020
journals/popets
Angel or Devil? A Privacy Study of Mobile Parental Control Apps.
Álvaro Feal
Paolo Calciati
Narseo Vallina-Rodriguez
Carmela Troncoso
Alessandra Gorla
2020
conf/uss
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists.
Kasra Edalatnejad
Wouter Lueks
Julien Pierre Martin
Soline Ledésert
Anne L'Hôte
Bruno Thomas
Laurent Girod
Carmela Troncoso
2020
conf/uss
VoteAgain: A scalable coercion-resistant voting system.
Wouter Lueks
Iñigo Querejeta-Azurmendi
Carmela Troncoso
2020
conf/ndss
Encrypted DNS -> Privacy? A Traffic Analysis Perspective.
Sandra Siby
Marc Juarez
Claudia Díaz
Narseo Vallina-Rodriguez
Carmela Troncoso
2019
journals/popets
Editors' Introduction.
Konstantinos Chatzikokolakis
Carmela Troncoso
2019
journals/popets
Editors' Introduction.
Kostas Chatzikokolakis
Carmela Troncoso
2019
journals/popets
Editors' Introduction.
Kostas Chatzikokolakis
Carmela Troncoso
2019
journals/popets
Editors' Introduction.
Kostas Chatzikokolakis
Carmela Troncoso
2019
conf/ccs
PPML '19: Privacy Preserving Machine Learning.
Borja Balle
Adrià Gascón
Olya Ohrimenko
Mariana Raykova
Phillipp Schoppmann
Carmela Troncoso
2019
conf/uss
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
Spyros Boukoros
Mathias Humbert
Stefan Katzenbeisser
Carmela Troncoso
2019
conf/eurosp
Rethinking Location Privacy for Unknown Mobility Behaviors.
Simon Oya
Carmela Troncoso
Fernando Pérez-González
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
journals/popets
Editors' Introduction.
Rachel Greenstadt
Damon McCoy
Carmela Troncoso
2018
conf/eurosp
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer.
Chen Chen
Daniele Enrico Asoni
Adrian Perrig
David Barrera
George Danezis
Carmela Troncoso
2018
conf/ndss
Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Apostolos Pyrgelis
Carmela Troncoso
Emiliano De Cristofaro
2017
journals/popets
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments.
Carmela Troncoso
Marios Isaakidis
George Danezis
Harry Halpin
2017
journals/popets
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Apostolos Pyrgelis
Carmela Troncoso
Emiliano De Cristofaro
2017
conf/ccs
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Simon Oya
Carmela Troncoso
Fernando Pérez-González
2017
conf/ndss
Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Srdjan Matic
Carmela Troncoso
Juan Caballero
2014
journals/tifs
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems.
Fernando Pérez-González
Carmela Troncoso
Simon Oya
2013
conf/ih
Bayesian inference to evaluate information leakage in complex scenarios.
Carmela Troncoso
2012
conf/ccs
Protecting location privacy: optimal strategy against localization attacks.
Reza Shokri
George Theodorakopoulos
Carmela Troncoso
Jean-Pierre Hubaux
Jean-Yves Le Boudec
2012
conf/sp
OB-PWS: Obfuscation-Based Private Web Search.
Ero Balsa
Carmela Troncoso
Claudia Díaz
2011
conf/uss
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Prateek Mittal
Femi G. Olumofin
Carmela Troncoso
Nikita Borisov
Ian Goldberg
2010
conf/uss
PrETP: Privacy-Preserving Electronic Toll Pricing.
Josep Balasch
Alfredo Rial
Carmela Troncoso
Bart Preneel
Ingrid Verbauwhede
Christophe Geuens
2010
conf/uss
Scalable Anonymous Communication with Provable Security.
Prateek Mittal
Nikita Borisov
Carmela Troncoso
Alfredo Rial
2009
conf/ccs
The bayesian traffic analysis of mix networks.
Carmela Troncoso
George Danezis
2009
conf/esorics
The Wisdom of Crowds: Attacks and Optimal Constructions.
George Danezis
Claudia Díaz
Emilia Käsper
Carmela Troncoso
2008
conf/esorics
A Framework for the Analysis of Mix-Based Steganographic File Systems.
Claudia Díaz
Carmela Troncoso
Bart Preneel
2007
conf/ih
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Carmela Troncoso
Claudia Díaz
Orr Dunkelman
Bart Preneel
Coauthors
Adrià Gascón
(1)
Adrian Perrig
(1)
Alessandra Gorla
(1)
Alfredo Rial
(2)
Ali Utkan Sahin
(1)
Álvaro Feal
(1)
Anne L'Hôte
(1)
Apostolos Pyrgelis
(6)
Bart Preneel
(3)
Ben Stock
(1)
Bogdan Kulynych
(2)
Borja Balle
(1)
Boya Wang
(1)
Brinda Hampiholi
(1)
Bristena Oprisanu
(1)
Bruno Thomas
(1)
Carmela Troncoso
(55)
Chen Chen
(1)
Christian Knabenhans
(2)
Christian Mouchet
(2)
Christophe Geuens
(1)
Christopher A. Wood
(1)
Claudia Díaz
(5)
Damon McCoy
(4)
Daniele Enrico Asoni
(1)
Dario Pasquini
(2)
David Barrera
(1)
Edouard Bugnion
(1)
Emilia Käsper
(1)
Emiliano De Cristofaro
(2)
Ero Balsa
(1)
Eva Luvison
(1)
Femi G. Olumofin
(1)
Fernando Pérez-González
(3)
George Danezis
(4)
George Theodorakopoulos
(1)
Giovanni Cherubin
(2)
Giuseppe Ateniese
(1)
Greg Alpár
(1)
Harry Halpin
(1)
Ian Goldberg
(1)
Ingrid Verbauwhede
(1)
Iñigo Querejeta-Azurmendi
(1)
Jean-Pierre Hubaux
(4)
Jean-Yves Le Boudec
(1)
Josep Balasch
(1)
Juan Caballero
(1)
Julien Pierre Martin
(1)
Justinas Sukaitis
(3)
Kasra Edalatnejad
(3)
Kenneth G. Paterson
(1)
Klim Kireev
(2)
Konstantinos Chatzikokolakis
(1)
Kostas Chatzikokolakis
(3)
Laurent Girod
(1)
Ludovic Barman
(1)
Marc Juarez
(1)
Marcel Salathé
(1)
Mariana Raykova
(1)
Marios Isaakidis
(1)
Marwan Fayed
(1)
Massimo Marelli
(1)
Mathias Humbert
(1)
Mathilde Raynal
(3)
Michael Veale
(2)
Mohammad Yaghini
(1)
Narseo Vallina-Rodriguez
(2)
Nick Sullivan
(1)
Nikita Borisov
(2)
Olya Ohrimenko
(1)
Orr Dunkelman
(1)
Paolo Calciati
(1)
Phillipp Schoppmann
(1)
Prateek Mittal
(2)
Rachel Greenstadt
(4)
Rebekah Overdorf
(1)
Reza Shokri
(1)
Rob Jansen
(1)
Saiid El Hajj Chehade
(2)
Sandra Siby
(5)
Seda F. Gürses
(1)
Shaoor Munir
(1)
Simon Oya
(3)
Soline Ledésert
(1)
Spyros Boukoros
(1)
Srdjan Matic
(1)
Stefan Katzenbeisser
(1)
Steven Englehardt
(2)
Sylvain Chatel
(5)
Theresa Stadler
(1)
Umar Iqbal
(2)
Vincent Graf Narbel
(3)
Wouter Lueks
(8)
Yevhen Mykhno
(1)
Zubair Shafiq
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to