Fields of interest
Privacy Enhancing Technologies
G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The Web never forgets: Persistent tracking mechanisms in the wild,” In ACM Conference on Computer and Communications Security, ACM, pp. 674-689, 2014.
M. Juarez, S. Afroz, G. Acar, C. Diaz, and R. Greenstadt, “A Critical Evaluation of Website Fingerprinting Attacks,” In ACM Conference on Computer and Communications Security, ACM, pp. 263-274, 2014.
M. Herrmann, A. Rial, C. Diaz, and B. Preneel, “Practical Privacy-Preserving Location-Sharing Based Services with Aggregate Statistics,” In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), ACM, pp. 87-98 , 2014.
D. Rebollo-Monedero, J. Parra-Arnau, J. Forne, and C. Diaz, “Optimizing the design parameters of threshold pool mixes for anonymity and delay,” Computer Networks 67, pp. 180-200, 2014.
E. Balsa, L. Brandimarte, A. Acquisti, C. Diaz, and S. Gürses, “Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools,” In Workshop on Usable Security, Lecture Notes in Computer Science, Springer-Verlag, pp. 1-10, 2014.
C. Diaz, O. Tene, and S. Gürses, “Hero or Villain: The Data Controller in Privacy Law and Technologies,” Ohio State Law Journal 74(6), pp. 923-964, 2013.
M. Herrmann, C. Troncoso, C. Diaz, and B. Preneel, “Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints,” In Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), ACM, pp. 167-178, 2013.
G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses, F. Piessens, and B. Preneel, “FPDetective: Dusting the web for fingerprinters,” In 20th ACM Conference on Computer and Communications Security, ACM, pp. 1129-1140, 2013.
S. Gürses, and C. Diaz, “Two tales of privacy in online social networks,” IEEE Security & Privacy 11(3), pp. 29-37, 2013.
D. Rebollo-Monedero, J. Parra-Arnau, C. Diaz, and J. Forne, “On the Measurement of Privacy as an Attacker’s Estimation Error,” International Journal of Information Security 12(2), pp. 129-149, 2013.
E. Balsa, C. Troncoso, and C. Diaz, “OB-PWS: Obfuscation-Based Private Web Search,” In IEEE Symposium on Security and Privacy 2012, IEEE, pp. 491-505, 2012.