Personal Homepage of Claudia Diaz       


   Associate Professor at COSIC
    KU Leuven Department of Electrical Engineering (ESAT)

   
    Address: Kasteelpark Arenberg 10, B-3001 Leuven (Belgium)

    Office:   B01.28
   
    Phone:  +32 (0)16  32 18 14
    Email:
  claudia.diaz (at) esat.kuleuven.be  





Short Bio

I am an Associate Professor at the COSIC research group of the Department of Electrical Engineering (ESAT) at the KU Leuven, where I lead the Privacy Technologies Team.


I obtained a Master's degree in Telecommunications Engineering at the University of Vigo (Spain) in 2000, and a Ph.D. in Engineering at the KU Leuven (Belgium) in 2005 with a dissertation on Anonymity and Privacy in Electronic Services. I was supported by a postdoctoral fellowship from the National Fund for Scientific Research in Flanders (FWO) between 2009 and 2012. I was a research visitor at the Computer Lab Security Group of the University of Cambridge (UK) in 2009, at the Department of Media, Culture, and Communication of New York University (USA) in 2014, and at Privacy International in 2019. 


My research is focused on the design, analysis, and applications of technologies to protect online privacy, and in particular technologies that offer protection for metadata to prevent surveillance, traffic analysis, tracking, localization, and behavioral profiling.


Below you can find all the details of my research, teaching, and academic service activities.



Publications   Awards   Committees   Teaching   Students   Projects   Events   Talks   Links 


Publications


Google Scholar page

Peer-reviewed


  1. Inside Job: Applying Traffic Analysis to Measure Tor from Within. Rob Jansen, Marc Juarez, Rafael Galvez, Tariq Elahi, and Claudia Diaz. Accepted to the Network and Distributed System Security Symposium (NDSS'18), IEEE Internet Society, 16 pages, 2018.
  2. A Survey on Routing in Anonymous Communication Protocols. Fatemeh Shirazi, Milivoj Simeonovski, Rizwan Asghar, Michael Backes, and Claudia Diaz. In ACM Computing Surveys (CSUR), vol. 51(3), article 51, 39 pages, 2018.
  3. How Unique is Your. onion? An Analysis of the Fingerprintability of Tor Onion Services. Rebekah Overdorf, Mark Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz. In ACM Conference on Computer and Communications Security (CCS'17), pp. 2021-2036, 2017.
  4. Towards inferring communication patterns in online social networks. Ero Balsa, Cristina Perez-Sola, Claudia Diaz. ACM Transactions on Internet Technology (TOIT) 17(3), Article 32, 21 pages, 2017.
  5. Toward an Efficient Website Fingerprinting Defense. Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz, Matthew Wright. European Symposium on Research in Computer Security (ESORICS), Springer LNCS 9878, pp. 27-46, 2016.
  6. Privacy in Location-Based Services: An Interdisciplinary Approach. Michael Herrmann, Mireille Hildebrandt, Laura Tielemans, Claudia Diaz. SCRIPTed - A Journal of Law, Technology & Society 13(2):144-170, 2016.
  7. Profiling Tor Users with Unsupervised Learning Techniques. Rafael Galvez, Marc Juarez, Claudia Diaz. International Workshop on Inference and Privacy in a Hyperconnected World (INFER). De Gruyter, 16p., 2016. 
  8. Leaky birds: exploiting mobile application traffic for surveillance. Eline Vanrykel, Gunes Acar, Michael Herrmann, Claudia Diaz. International Conference on Financial Cryptography and Data Security, Springer LNCS 9603, pp. 367-384, 2016.
  9. Engineering Privacy by Design Reloaded. Seda Gurses, Carmela Troncoso, Claudia Diaz. Amsterdam Privacy Conference (APC), 21p., 2015.
  10. The leaking battery: A privacy analysis of the HTML5 Battery Status API. Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Diaz. International Workshop on Data Privacy Management, Springer LNCS 9481, 8p., 2015
  11. Towards Measuring Resilience in Anonymous Communication Networks.  Fatemeh Shirazi, Claudia Diaz, and Joss Wright. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society (WPES 2015), ACM, pp. 95-99, 2015.
  12. Tor Experimentation Tools. Fatemeh Shirazi, Matthias Gohring, and Claudia Diaz. In Proceedings of IEEE Security and Privacy Workshops (SPW), International Workshop on Privacy Engineering (IWPE), IEEE, pp. 206 - 213, 2015.
  13. The Web never forgets: Persistent tracking mechanisms in the wild. Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. In ACM Conference on Computer and Communications Security (ACM CCS 2014), ACM, pp. 674-689, 2014. [Acceptance rate 19%, 114/585]
  14. A Critical Evaluation of Website Fingerprinting Attacks. Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Diaz, and Rachel Greenstadt, In ACM Conference on Computer and Communications Security (ACM CCS 2014), ACM, pp. 263-274, 2014. [Acceptance rate 19%, 114/585]
  15. Censorship-Resistant and Privacy-Preserving Distributed Web Search. Michael Herrmann, Ren Zhang, Kai-Chun Ning, Claudia Diaz, and Bart Preneel, In 14th IEEE International Conference on Peer-to-Peer Computing (P2P 2014) IEEE, pp. 1-10, 2014.
  16. Practical Privacy-Preserving Location-Sharing Based Services with Aggregate Statistics. Michael Herrmann, Alfredo Rial, Claudia Diaz, and Bart Preneel. In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), ACM, 12 pages, 2014.
  17. Optimizing the design parameters of threshold pool mixes for anonymity and delay. David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne, and Claudia Diaz. In Computer Networks vol. 67, pp. 180-200, 2014.
  18. Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools. Ero Balsa, Laura Brandimarte, Alessandro Acquisti, Claudia Diaz and Seda Gurses. In Proceedings of Workshop on Usable Security (USEC 2014), 10 pages, 2014.
  19. FPDetective: Dusting the web for fingerprinters. Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gurses, Frank Piessens, and Bart Preneel. To appear in Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ACM, 12 pages, 2013. [Acceptance rate 19%, 105/530]
  20. Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints. Michael Herrmann, Carmela Troncoso, Claudia Diaz, and Bart Preneel. In Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), ACM, 12 pages, 2013. [Acceptance rate (full papers) 19%, 20/103]
  21. Two tales of privacy in online social networks. Seda Gurses and Claudia Diaz. In IEEE Security & Privacy Magazine Vol. 11(3):29-37, Special Issue on Social Networks, May/June 2013.
  22. Hero or Villain: The Data Controller in Privacy Law and Technologies. Claudia Diaz, Omer Tene, and Seda Gürses. Ohio State Law Journal 74(6):923-964, 2013.
  23. On the Measurement of Privacy as an Attacker's Estimation Error. David Rebollo-Monedero, Javier Parra-Arnau, Claudia Diaz, and Jordi Forne. In International Journal of Information Security (IJIS), volume 12, number 2, pages 129-149, 2013.
  24. OB-PWS: Obfuscation-Based Private Web Search. Ero Balsa, Carmela Troncoso, and Claudia Diaz. In IEEE Symposium on Security and Privacy (IEEE S&P 2012) SoK, IEEE,  pp. 491-505, 2012. [Acceptance rate 13%, 40/307]
  25. A Metric to Evaluate Interaction Obfuscation in Online Social Networks. Ero Balsa, Carmela Troncoso, and Claudia Diaz. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), Vol. 20, No. 6, pages 877-892, 2012.
  26. On the difficulty of achieving anonymity for Vehicle-2-X communication. Carmela Troncoso, Enrique Costa-Montenegro, Claudia Diaz, and Stefan Schiffner. In Computer Networks, Special Issue on Deploying Vehicle-2-x Communication, volume 55, issue 14, pp. 3199-3210, 2011.
  27. Engineering Privacy by Design. Seda Gurses, Carmela Troncoso, and Claudia Diaz. In Conference on Computers, Privacy & Data Protection (CPDP 2011), 25 pages (pre-print), 2011. [Acceptance rate 26%, 14/52]
  28. Unraveling an Old Cloak: k-anonymity for Location Privacy. Reza Shokri, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux. In Proceedings of the 9th ACM workshop on Privacy in the electronic society (WPES 2010), K. Frikken (ed.), ACM, pp. 115-118, 2010. [Acceptance rate 31%, 15/48]
  29. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. Claudia Diaz, Steven J. Murdoch, and Carmela Troncoso. In Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), M. Atallah and N. Hopper (Eds), Springer LNCS 6205, pp. 184-201, 2010. [Acceptance rate 28%, 16/57]
  30. Drac: An Architecture for Anonymous Low-Volume Communications. George Danezis, Claudia Diaz, Carmela Troncoso, and Ben Laurie. In Proceedings of the 10th Privacy Enhancing Technologies Symposium (PETS 2010), M. Atallah and N. Hopper (Eds), Springer LNCS 6205, pp. 202-219, 2010. [Acceptance rate 28%, 16/57]
  31. The wisdom of Crowds: attacks and optimal constructions. George Danezis, Claudia Diaz, Emilia Kasper, and Carmela Troncoso. In Procceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), M. Backes and P. Ning (Eds), Springer LNCS 5789, pp. 406-423, 2009. [Acceptance rate 19%, 42/220]
  32. Privacy-Enabling Social Networking over Untrusted Networks. Jonathan Anderson, Claudia Diaz, Joseph Bonneau, and Frank Stajano. In Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN 2009), pp. 1-6, 2009. [Acceptance rate 35%, 11/31]
  33. Privacy Preserving Electronic Petitions. Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss, and Girma Nigusse. In Journal of Identity in the Information Society (IDIS), vol. 1, pp. 203-219, 2009.
  34. A Framework for the Analysis of Mix-Based Steganographic File Systems. Claudia Diaz, Carmela Troncoso and Bart Preneel. In 13th European Symposium on Research in Computer Security (ESORICS 2008), S. Jajodia, and J. Lopez (Eds), Springer LNCS 5283, pp. 428-445, 2008. [Acceptance rate 22%, 37/168]
  35. Revisiting A Combinatorial Approach Toward Measuring Anonymity. Benedikt Gierlichs, Carmela Troncoso, Claudia Diaz, Bart Preneel, and Ingrid Verbauwhede, In Workshop on Privacy in the Electronic Society (WPES 2008), V. Atluri , and M. Winslett (Eds.), pp. 111-116,  ACM Press, 2008. [Acceptance rate 35%, 15/42]
  36. On the Impact of Social Network Profiling on Anonymity. Claudia Diaz, Carmela Troncoso and Andrei Serjantov. In Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS'08), N. Borisov and I. Goldberg (Eds), Springer LNCS 5134, pp. 44-62, 2008. [Acceptance rate 26%, 13/49]
  37. Does additional information always reduce anonymity? Claudia Diaz, Carmela Troncoso and George Danezis. In Proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES'07), T. Yu (Ed), pp.72-75, ACM Press, 2007. [Acceptance rate 33%, 16/48]
  38. Efficient Negative Databases from Cryptographic Hash Functions. George Danezis, Claudia Diaz, Sebastian Faust, Emilia Kasper, Carmela Troncoso and Bart Preneel. In Proceedings of the 10th Information Security Conference (ISC'07), J. Garay et al. (Eds.), Springer LNCS 4779, pp. 423-436, 2007. [Acceptance rate 25%, 29/116]
  39. Two-Sided Statistical Disclosure Attack. George Danezis, Claudia Diaz and Carmela Troncoso. In Proceedings of the 7th Privacy Enhancing Technologies (PET'07), N. Borisov and P. Golle (Eds), Springer LNCS 4776, pp. 30-44, 2007. [Acceptance rate 19%, 16/84]
  40. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. Carmela Troncoso, Claudia Diaz, Orr Dunkelman and Bart Preneel.  In proceedings of 9th Information Hiding (IH'07), T. Furon et al. (Eds), Springer LNCS 4567, pp. 220-236, 2007.  [Acceptance rate 23%, 25/106]
  41. Space-Efficient Private Search. George Danezis and Claudia Diaz.  In the Proceedings of the 11th International Conference on Financial Cryptography and Data Security (FC'07), S. Dietrich and R. Dhamija (Eds), Springer LNCS 4886, pp. 148-162, 2007.  [Acceptance rate 20%, 17/85]
  42. Mix Cascades vs. Peer-to-Peer: Is One Concept Superior?. Rainer Bohme, George Danezis, Claudia Diaz, Stefan Kopsell, and Andreas Pfitzman. In the proceedings of Privacy Enhancing Technologies (PET'04), D. Martin and A. Serjantov  (Eds), Springer LNCS 3424, pp. 243-255, 2004.
  43. Comparison between two practical mix designs. Claudia Diaz, Len Sassaman and Evelyne Dewitte. Computer Security (ESORICS'04). P. Samarati et al. (Eds), Springer LNCS 3193, pp. 141-159, 2004.  [Acceptance rate 17%, 27/159]
  44. Taxonomy of Mixes and Dummy Traffic. Claudia Diaz and Bart Preneel. In Information Security Management, Education and Privacy (I-NetSec'04). Kluwer Academic Publishers, Y. Deswarte, F. Cuppens, S. Jajodia and L. Wang (Eds), ISBN 1-4020-8144-8, Vol. 3 pp. 215-230, 2004.
  45. Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic. Claudia Diaz and Bart Preneel. Information Hiding (IH'04). J. Fridrich (Ed.), Springer LNCS 3200, pp. 309-325, 2004. [Acceptance rate 35%, 25/70]
  46. Anonymous communication. Claudia Diaz and Bart Preneel. WHOLES - A Multiple View of Individual Privacy in a Networked World. Internet publication, 7 p., 2004.
  47. Generalising Mixes. Claudia Diaz and Andrei Serjantov. In the proceedings of Privacy Enhancing Technologies (PET'03). R. Dingledine (Ed.), Springer LNCS 2760, pp. 18-31, 2003. [Acceptance rate 26%, 14/52]
  48. Revocable anonymous access to the Internet. Joris Claessens, Claudia Diaz, Caroline Goemans, Bart Preneel, Joos Vandewalle and Jos Dumortier. Journal of Internet Research: Electronic Networking Applications and Policy, Volume 13, Number 4, pages 242--258, 2003.
  49. APES: Anonymity and Privacy in Electronic Services. Claudia Diaz, Joris Claessens and Bart Preneel. In Journal DuD (Datenschutz und Datensicherheit), 27(3):143-145, 2003.
  50. Information Theory and anonymity. Claudia Diaz, Joris Claessens, Stefaan Seys and Bart Preneel. Werkgemeenschap voor Informatie en Communicatietheorie. B. Macq and J.-J. Quisquater (Eds), pp. 179-186, 2002.
  51. Towards measuring anonymity. Claudia Diaz, Stefaan Seys, Joris Claessens and Bart Preneel. Designing Privacy Enhancing Technologies (PET'02). R. Dingledine and P. Syverson (Eds), Springer LNCS 2482, pp. 54-68, 2002.[Acceptance rate 35%, 17/47]

Edited Journals and Books

  1. Proceedings on Privacy Enhancing Technologies (PoPETs) volume 2017 (4 issues, 52 articles). Claudia Diaz, Rachel Greenstadt and Damon McCoy (Eds.). ISSN 2299-0984. De Gruyter Open. 
  2. Proceedings on Privacy Enhancing Technologies (PoPETs) volume 2016 (4 issues, 51 articles). Claudia Diaz and Apu Kapadia (Eds.). ISSN 2299-0984. De Gruyter Open. 
  3. Computer Security - ESORICS 2011. Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Lecture Notes in Computer Science (LNCS), Vol. 6879, Vijay Atluri and Claudia Diaz (Eds.), 686 pages, Springer.

Invited Papers and Book Chapters

  1. Understanding the landscape of privacy technologies. Claudia Diaz and Seda Gurses. Extended abstract of invited talk in proceedings of the Information Security Summit, pp. 58-63, 2012.
  2. Systems for Anonymous Communication. George Danezis, Claudia Diaz, and Paul Syverson. Chapter in CRC Handbook of Financial Cryptography and Security, CRC Cryptography and Network Security Series, B. Rosenberg, and D. Stinson (Eds.), Chapman & Hall, pp. 341-390, 2010
  3. Accountable Anonymous Communication. Claudia Diaz and Bart Preneel. Chapter in Security, Privacy and Trust in Modern Data Management, M. Petkovic and W. Jonker (Eds), ISBN: 978-3-540-69860-9, pp. 239-256, Springer, 2007.
  4. Anonymity Metrics Revisited. Claudia Diaz. In Anonymous Communication and its Applications, In Anonymous Communication and its Applications, Dagstuhl Seminar Proceedings number 0541Internationales Begegnungs- und Forschungszentrum fur Informatik (IBFI), Schloss Dagstuhl, S. Dolev, R. Ostrovsky, and A. Pfitzmann (Eds), 6 pages, 2006.
  5. Improving the Decoding Efficiency of Private Search. George Danezis and Claudia Diaz. In Anonymous Communication and its Applications, Dagstuhl Seminar Proceedings number 0541Internationales Begegnungs- und Forschungszentrum fur Informatik (IBFI), Schloss Dagstuhl, S. Dolev, R. Ostrovsky, and A. Pfitzmann (Eds), 11 pages, 2006.


Technical Reports

  1. Facebook Tracking Through Social Plug-ins. Gunes Acar, Brendan Van Alsenoy, Frank Piessens, Claudia Diaz, and Bart Preneel. Technical report prepared for the Belgian Privacy Commission, 24 pages, 2015.
  2. Towards Measuring Resilience in Anonymous Communication Networks. Fatemeh Shirazi, Claudia Diaz, Ciaran Mullan, Joss Wright, and Johannes Buchmann. In 6th Hot Topics in Privacy Enhancing Technologies (HotPETs 2013), 9 pages, 2013.
  3. A Survey of Anonymous Communication Channels. George Danezis and Claudia Diaz. Microsoft Technical Report MSR-TR-2008-35, 46 pages, February 2008.
  4. A secure and privacy-preserving web banner system for targeted advertising. Joris Claessens, Claudia Diaz, Raimondo Faustinelli and Bart Preneel. COSIC technical report, 31 pages, August 2003.

PhD thesis


  1. Anonymity and Privacy in Electronic Services. Claudia Diaz. Ph.D. Thesis. Katholieke Univesiteit Leuven, 2005.


Abstracts and Posters


  1. Hero or Villain: The Data Controller in Privacy Law and Technologies. Claudia Diaz, Omer Tene, and Seda Gürses. Extended abstract presented at the Ohio State Law Journal Symposium "The Second Wave of Global Privacy Protection", 4 pages, 2012.
  2. Mining anonymized traffic data. Claudia Diaz. Poster presentation at the NATO Advanced Study Institute on Mining Massive Data Sets for Security. Villa Cagnola, (Italy), September 20, 2007. [poster]
  3. Anonymity Metrics Applied to Partial Profiling. Claudia Diaz. FIDIS 2nd PhD Event. October 2005, 2 pages.
  4. Profiling Game. Claudia Diaz. FIDIS 1st PhD Event. January 2005, 4 pages.
  5. Anonymity and Mixes. Claudia Diaz. FIDIS 1st PhD Event. January 2005, 2 pages.



Awards and Media

Awards

Media



Committees


Chair


Advisory



Editorial Boards



Program Committee Member



Service as journal scientific reviewer




Teaching


I am currently responsible for two courses at the master level:


I give a guest lecture in the course:


I am a member of the steering committee of the summer school:



Student and postdoc supervision



Ph.D. Advisor


Current PhD students:


Former PhD students:


Former postdocs:


Ph.D. Assessor or Member of the Examination Committee (KU Leuven)

Current:


Former:



Ph.D. Examination Committees (as external member)



Master Students

As Thesis Supervisor:

As Daily Supervisor:


I was supervisor from 2002 to 2004 of the crypto group for the HJ82 design seminar.

 


Projects



Current projects


As principal investigator (PI):

As promoter (personal fellowships):



Past projects

As fellow:


As principal investigator (PI):

As promoter (personal fellowships):

As scientific coordinator:

As researcher:



I have (co-)organized the following events



Talks and Panels (not comprehensive)



Talks with video available online:



Other talks:

  1. Anonymity loves company, and funding. Panel at the Computers, Privacy and Data Protection (CPDP 2019). Brussels (Belgium). January 31, 2019. [video]
  2. Introduction to Privacy. Guest lecture at the KU Leuven Postgraduate course on IoT security. Leuven (Belgium). November 8, 2018.
  3. Anonymity in digital systems. Keynote at the Belgian Cybersecurity Convention. Mechelen (Belgium). October 25, 2018.
  4. Mixnets for anonymous messaging. Keynote at PET-CON 2018.2. Hamburg (Germany). October 11-12, 2018.
  5. Anonymous communications infrastructures for the protection of metadata? Panel at the Computers, Privacy and Data Protection (CPDP 2018). Brussels (Belgium). January 31, 2018. [video]
  6. Introduction to Privacy Technologies. Secure Application Development (SecAppDev 2018). Leuven (Belgium). February 23, 2018.
  7. Website Fingerprinting. Invited lecturer at the Summer School on Real-World Crypto and Privacy. Sibenik (Croatia). June 5-9, 2017
  8. Introduction to Privacy. Invited lecturer at the Summer School on Real-World Crypto and Privacy. Sibenik (Croatia). June 5-9, 2017
  9. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services. Invited talk at the University College London Carnival of Decentralization and Privacy. London (UK). May 22, 2017.
  10. Designing Mixnets. Invited seminar at INRIA Paris. Paris (France). March 1, 2017.
  11. Privacy concerns in 2015 from a technology perspective. Invited seminar at Emergent Leuven. Leuven (Belgium). November 12, 2015.
  12. Privacy and Anonymity. Invited lecturer at the Summer School on Real-World Crypto and Privacy. Sibenik (Croatia). June 1-5, 2015
  13. Introduction to Privacy Technologies. Guest lectures at Royal Holloway, University of London. London (UK). May 11-12, 2015
  14. In PETs we trust: Gaps between privacy enhancing technologies and information privacy law. Invited talk at Real World Crypto (RWC 2015). London (UK). January 7, 2015.
  15. Overview of security and privacy technologies. Guest lecture at the Postgraduate Studies in ICT & Media Law programme. Leuven (Belgium). October 27, 2014. 
  16. A critical review of Privacy Technologies. Keynote talk at LatinCrypt. Florianopolis (Brazil). September 17, 2014.
  17. From privacy principles to engineering requirements. Cyber Security and Privacy (CSP) Forum 2014. Athens (Greece). May 22, 2014. 
  18. Research challenges for Privacy Enhancing Technologies. Trust in Digital Life (TDL) Workshop. Vienna (Austria). April 8, 2014.
  19. Privacy and risk management. OECD Privacy Expert Roundtable. Paris (France). March 21, 2014.
  20. Technical solutions for enhancing privacy in Online Social Networks. Leuven.Inc workshop on Big Data: legal, privacy and information security issues. Leuven (Belgium). March 18, 2014
  21. Privacy Enhancing Technologies. Invited seminar at the Radboud Universiteit Nijmegen. Nijmegen (The Netherlands). March 11, 2014.
  22. In PETs we Trust: tensions between Privacy Enhancing Technologies and Information Privacy Law. NYU Dept. of Media, Culture, and Communication Seminar. New York (NY, USA). March 5, 2014.
  23. Obfuscation-based private web search. Invited talk at the NYU Symposium on Obfuscation. New York (NY, USA). February 15, 2014.
  24. Overview of security and privacy technologies. Guest lecture at the Postgraduate Studies in ICT & Media Law programme. Leuven (Belgium). November 25, 2013. [slides]
  25. Meanings of "trust" and "privacy" in technology. Lecture at the KU Leuven ATHENS Course. Heverlee (Belgium). November 18, 2013. [slides]
  26. Meanings of "Privacy" in Privacy Enhancing Technologies. Keynote at the ACM Digital Identity Management Workshop 2013. Berlin (Germany). November 8, 2013. [slides]
  27. Personal Data and Citizenship - The Technical Perspective. Keynote at the Digital Enlightenment Forum 2013. Brussels (Belgium). September 18, 2013. [slides]
  28. Towards Measuring Resilience in Anonymous Communication Networks. 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013). Bloomington (Indiana, USA). July 12, 2013. [slides]
  29. Academic publishing. Panel at the 13th Privacy Enhancing Technologies Symposium (PETS 2013). Bloomington (Indiana, USA). July 11, 2013.
  30. Privacy Technologies. COSIC Course. Heverlee (Belgium). June 4, 2013 [slides]
  31. Developing Trust in Cyberspace: Pulling Together Law, Technology, and Policy. Invited talk at GREPSEC. San Francisco (CA, USA). May 19, 2013. 
  32. Two tales of privacy in OSNs. Guest seminar at Palo Alto
  33. Research Center (PARC). Palo Alto (CA, USA). May 16, 2013. [slides]
  34. Two tales of privacy in OSNs. Guest lecture at the University of Waterloo. Waterloo (Canada). April 5, 2013. [slides]
  35. Two tales of privacy in OSNs. Guest talk for the Information Systems Security Association (ISSA-BE). Brussels (Belgium). March 14, 2013. [slides]
  36. Introduction to privacy technologies. Secure Application Development (SecAppDev 2013). Leuven (Belgium). March 6, 2013. [slides]
  37. Two tales of privacy in OSNs. Guest lecture at TU Darmstadt. Darmstadt (Germany). February 12, 2013. [slides]
  38. Security and privacy protection in online social networks. Panel at the For Your Eyes Only Conference. Brussels, November 30, 2012. [link]
  39. Consensual exploitation on social media. Panel at the For Your Eyes Only Conference. Brussels, November 29, 2012. [link]
  40. Overview of security and privacy technologies. Guest lecture at the course "Interdisciplinary perspectives on ICT". Brussels (Belgium). November 26, 2012. [slides]
  41. Hero or Villain: The Data Controller in Privacy Law and Technologies. Invited talk at the Ohio State Law Journal Symposium "The Second Wave of Global Privacy Protection". Columbus  (OH, USA). November 16, 2012. [slides]  [abstract]
  42. Obfuscation-based private web search. Invited talk at the Amsterdam Privacy Conference (APC'12). Amsterdam (The Netherlands). October 9, 2012. [slides]
  43. The impact of upcoming privacy legislation for PETs. Panel at the 12th Privacy Enhancing Technologies Symposium (PETS 2012). Vigo (Spain). July 11, 2012.
  44. Technologies for private search. Interdisciplinary Privacy Course. Leuven (Belgium). June 28, 2012 [slides]
  45. Introduction to Privacy. Interdisciplinary Privacy Course. Leuven (Belgium). June 27, 2012 [slides]
  46. Privacy research paradigms. Invited talk at the Information Security Summit (IS2). Prague (Czech Republic). May 31, 2012.
  47. 3x3: Confidentialtiy, Control and transparency. Guest talk (jointly with Seda Gurses) at re:publica 2012. Berlin (Germany). May 2, 2012.
  48. Introduction to privacy technologies. Secure Application Development (SecAppDev 2012). Leuven (Belgium). March 6, 2012.
  49. A Trusted Panel: A Need for Constructive Distrust? Computers, Privacy and Data Protection (CPDP 2012). Brussels (Belgium). January 25, 2012.
  50. Overview of security and privacy technologies. Guest lecture at the Postgraduate Studies in ICT & Media Law programme. Leuven (Belgium). December 5, 2011. [slides]
  51. Engineering privacy by design. Invited seminar at the Oxford Internet Institute. Oxford (UK). November 23, 2011. [slides]
  52. Engineering privacy by design. Invited talk at the Xootic alumni association. Eindhoven (Netherlands). September 23, 2011. [slides]
  53. A closer look at cloaking techniques for location privacy. Keynote talk 6th International Workshop on Data Privacy Management (DPM). Leuven (Belgium). September 15, 2011.
  54. Analysis of cloaking techniques for location privacy. Invited talk at the NII Workshop in ICT Resilience. Karuizawa (Japan). August 2, 2011.
  55. Trust, security, and privacy technologies. Guest seminar at the University of Vigo. Vigo (Spain). July 8, 2011
  56. Privacy & trust in architectures. 4th Summer School on Network and Information Security. Heraklion (Crete, Greece). June 30, 2011 [slides]
  57. Technical Aspects of Location Privacy. Interdisciplinary Privacy Course. Leuven (Belgium). June 27, 2011 [slides]
  58. Introduction to Privacy. Interdisciplinary Privacy Course. Leuven (Belgium). June 27, 2011 [slides]
  59. Privacy research challenges. Workshop Socio-economics in trustworthy ICT. Brussels (Belgium). June 22, 2011
  60. Privacy Technologies. COSIC Course. Heverlee (Belgium). June 14, 2011 [slides]
  61. What information do we leak through our online activities? Algemene Vergadering Overlegcentrum voor Ethiek: Internet en privacy. Leuven (Belgium). May 30, 2011. [slides]
  62. Invited speaker at the launching of the Belgian Association for Studies and Research into the Protection of Privacy. House of Representatives, Brussels (Belgium). May 18, 2011.
  63. What can be learnt about your private life? IEEE Student Branch Soiree Technique. Heverlee (Belgium). May 5, 2011.
  64. The challenge of protecting privacy in the information era. Inaugural lecture. Heverlee (Belgium). April 8, 2011. [slides]
  65. Introduction to privacy technologies. Guest lecture at the Universidad Autonoma de Barcelona. Barcelona (Spain). March 10, 2011. [slides]
  66. Introduction to privacy technologies. Secure Application Development (SecAppDev 2011). Leuven (Belgium). March 2, 2011. [slides]
  67. Privacy by design and privacy models. Computers, Privacy and Data Protection (CPDP 2011). Brussels (Belgium). January 27, 2011
  68. Panel on implementing privacy in online service models. Panel moderator. Computers, Privacy and Data Protection (CPDP 2011). Brussels (Belgium). January 25, 2011
  69. Security and privacy technologies. Guest lecture at the Postgraduate Studies in ICT & Media Law programme. Leuven (Belgium). December 20, 2010. [slides]
  70. Trust, security, and privacy technologies. Keynote talk at the Trust in Digital Life workshop. Nice (France). December 2, 2010. [slides]
  71. Panel on Privacy by Design. Panelist. Plenary panel at the 32nd International Conference of Data Protection and Privacy Commissioners. Jerusalem (Israel). October 28, 2010. [video link1] [video link 2]
  72. Unraveling an Old Cloak: k-anonymity for Location Privacy. ACM Workshop on Privacy in the Electronic Society (WPES'10). Chicago, IL (USA). October 4th, 2010 [slides]
  73. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. Privacy Enhancing Technologies Symposium (PETS) 2010. Berlin (Germany). July 22, 2010. [slides]
  74. Panel on Using and Choosing PETs for ITS Applications. Privacy in ITS Applications Workshop. Berlin (Germany). July 20, 2010. [slide]
  75. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. COSIC Seminar. Heverlee (Belgium). July 15, 2010.
  76. Privacy Enhancing Technologies. Invited talk at the Microsoft Roundtable on Privacy by Design. Brussels (Belgium). June 23, 2010 [slides]
  77. Overview of Privacy Enhancing Technologies. Interdisciplinary Privacy Course. Leuven (Belgium). June 23, 2010 [slides]
  78. Introduction to Privacy. Interdisciplinary Privacy Course. Leuven (Belgium). June 23, 2010 [slides]
  79. Privacy Enhancing Technologies. 10 hour course for the Ph.D. program at the Universitat Politecnica de Catalunya (UPC). Barcelona (Spain). June 14-18, 2010. [slides]
  80. PrETP: Privacy-Preserving Electronic Toll Pricing. LICT Industrial Affiliation Day. Heverlee (Belgium). June 3, 2010. [slides]
  81. Drac: An Architecture for Anonymous Low-Volume Communications. INRIA workshop on privacy. Grenoble (France). March 9, 2010. [slides]
  82. Privacy Technologies. Secure Application Development (SecAppDev 2010). Leuven (Belgium). February 24, 2010 [slides]
  83. Panel on Forgetfulness and Data Retention. Panel moderator. Computers, Privacy and Data Protection. Brussels (Belgium). January 29, 2010
  84. Attacks on the Vehicle Infrastructure Integration (VII) anonymous certificates. Seminar for the EPFL Laboratory for Computer Communications and Applications. Lausanne (Switzerland). December 2, 2009.
  85. The wisdom of Crowds: attacks and optimal constructions. ZISC Information Security Colloquium. Zurich (Switzerland). December 1, 2009. [slides]
  86. Privacy in the information society. LICT Distinguished Lecture Program. Heverlee (Belgium). November 10, 2009. [slides]
  87. Management of a Data Breach. Panel moderator. EDPS/ENISA Seminar on Responding to Data Breaches. Brussels (Belgium). October 23, 2009.
  88. Privacy Issues of Imaging Technologies for Security Search Applications. LICT Workshop on Millimeter Wave Imaging and Technologies for Security Applications. Heverlee (Belgium). July 9, 2009 [slides]
  89. Privacy technologies. COSIC Course. Heverlee (Belgium). July 7, 2009 [slides]
  90. Privacy at the communication layer. Interdisciplinary Privacy Course. Heverlee (Belgium). June 16, 2009 [slides]
  91. Introduction to Privacy. Interdisciplinary Privacy Course. Heverlee (Belgium). June 11, 2009 [slides]
  92. A Framework for the Analysis of Mix-Based Steganographic File Systems. Computer Lab Departmental Seminar. Cambridge (UK). January 28th, 2009 [slides]
  93. Panel on Data Breaches by Government Departments and Problems with E-Voting. Panel moderator. Computers, Privacy and Data Protection Brussels (Belgium). January 17, 2009
  94. Panel on Future of the Internet: Real World Internet. Panelist. Future of the Internet Assembly (session on Real World Internet). Madrid (Spain). December 10, 2008
  95. Security and Privacy Challenges in the Real World Internet. Invited talk at the Future of the Internet Assembly (session on Real World Internet). Madrid (Spain). December 9, 2008 [slides]
  96. Privacy and anonymity. Invited seminar at the Universitat Politecnica de Catalunya (Information Security Group). Barcelona (Spain), November 24, 2008 [slides]
  97. A Framework for the Analysis of Mix-Based Steganographic File Systems. ESORICS: 13th European Symposium on Research in Computer Security. October 8th 2008, Malaga, Spain. [slides]
  98. A Framework for the Analysis of Mix-Based Steganographic File Systems. COSIC Seminar. Heverlee (Belgium). October 2nd, 2008
  99. Privacy preserving electronic petitions. Identity in the Information Society (IDIS) Workshop. Arona (Italy) May 29, 2008 [slides]
  100. Steganographic file systems. One-hour lecture at the Computer Security course of the Master in Computer Science Research of the Universidad Complutense de Madrid. Madrid (Spain) April 23, 2008. [slides]
  101. Introduction to anonymous communication. Two-hour lecture at the ATHENS Intensive Course Programme. Heverlee (Belgium) March 13, 2008 [slides]
  102. Advanced applications for e-ID cards. L-SEC Identity management and e-ID conference. Leuven (Belgium). February 28, 2008 [slides]
  103. Steganographic file systems. Invited colloquium talk at Karlstad University. Karlstad (Sweden). January 21st, 2008
  104. Steganographic file systems. Invited talk at the Santa's Crypto Get-together 2007. Prague (Czech Republic). December 6th, 2007
  105. Does additional information always reduce anonymity? 6th ACM Workshop on Privacy in the Electronic Society (WPES'07). Alexandria, VA (USA). October 29th, 2007 [slides]
  106. Does additional information always reduce anonymity? COSIC Seminar. Heverlee (Belgium). October 26th, 2007 [slides]
  107. Efficient Negative Databases from Cryptographic Hash Functions. 10th Information Security Conference (ISC'07). Viņa del Mar (Chile). October 12th, 2007 [slides]
  108. Introduction to Anonymous Communications. One hour tutorial at the 10th Information Security Conference (ISC'07). Viņa del Mar (Chile). October 9th, 2007 [slides]
  109. Efficient Negative Databases from Cryptographic Hash Functions. COSIC Seminar. Heverlee (Belgium). October 5th, 2007 [slides]
  110. Privacy-Enhanced e-Petitions. 2nd ADAPID Workshop. Heverlee (Belgium). September 28th, 2007 [slides]
  111. Anonymity Metrics, Mixes, and Space-Efficient Private Search. Curso en Seguridad de Computadores, Maestria en Investigacion Informatica la Universidad Complutense de Madrid. Madrid (Spain), May 21st, 2007.
  112. Space-Efficient Private Search. 11th International Conference on Financial Cryptography and Data Security (FC'07). Scarborough (Trinidad and Tobago). February 13th, 2007 [slides]
  113. Space-Efficient Private Search. COSIC Seminar. Heverlee (Belgium). February 7th, 2007 [slides]
  114. Requirements for e-ID Applications. 1st ADAPID Workshop. Heverlee (Belgium). September 26th, 2006 [slides]
  115. Privacy and Anonymity in Electronic Services. PhD defense. Heverlee (Belgium). December 19th, 2005 [slides]
  116. Anonymity Metrics Applied to Partial Profiling. 2nd FIDIS PhD Event. Santorini (Greece). October 21st, 2005.
  117. Anonymity Metrics Revisited.  Dagstuhl Seminar on Anonymity and its Applications. Saarbrucken (Germany). October 13th, 2005.
  118. ADAPID: eID in Belgium.  FIDIS Workshop on ID documents. Frankfurt (Germany). June 22nd, 2005.
  119. Panel on revocable anonymity. Panelist. Workshop on Privacy Enhancing Technologies (PET) 2005. Cavtat (Croatia). May 31st, 2005.
  120. Profiling game. COSIC Seminar. Heverlee (Belgium). March 23rd, 2005.
  121. Privacy-Enhanced Ambient Intelligence Profiling. FIDIS Workshop on Profiling. Brussels (Belgium). March 3rd, 2005.
  122. Anonymity and Mixes. 1st FIDIS PhD Event. Riezlern (Austria). January 22nd, 2005.
  123. Controlled Anonymous Communication. 5th APES Workshop. Heverlee (Belgium). November 23rd, 2004. [slides]
  124. Comparison between two practical mix designs. ESORICS: 9th European Symposium on Research in Computer Security. September 13th 2004, Sophia Antipolis, French Riviera, France. [slides]
  125. Taxonomy of Mixes and Dummy traffic . I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems. August 26th 2004, Toulouse, France. [slides]
  126. Anonymity and Privacy. Course G13 of the 2004 Summer Complutense School (ECV 2004) on Practical Security for the Internet and Intranet July 5-30. Madrid (Spain). July 23rd 2004. [slides]
  127. Panel on Mix Cascades vs. Peer-to-Peer: Is One Concept Superior? Panel moderator. Workshop on Privacy Enhancing Technologies (PET) 2004. Toronto (Canada). May 257h, 2004.
  128. Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic. 6th Information Hiding Workshop. Toronto (Canada). May 25th, 2004. [slides]
  129. Anonymous communications. WHOLES - A Multiple View of Individual Privacy in a Networked World . Stockholm (Sweden). January 30th, 2004. [slides]
  130. Reasoning about the anonymity provided by pool mixes that generate dummy traffic. COSIC Seminar. Heverlee (Belgium). December 17th, 2003. [slides]
  131. Privacy Rights Management. Digital Rights Management -- L-SEC Technology Workshop. Heverlee (Belgium). December 4th, 2003.[slides]
  132. Building blocks for controlled anonymity. 4th APES Workshop. Heverlee (Belgium). September 24, 2003. [slides]
  133. Ph.D. progress presentation. Heverlee (Belgium). May 20, 2003. [slides]
  134. Generalising mixes. Workshop on Privacy Enhancing Technologies (PET) 2003. Dresden (Germany), March 26, 2003. [slides]
  135. Generalising mixes. COSIC Seminar. Heverlee (Belgium). January 22, 2003. [slides]
  136. Anonymous Targeted Advertising System. 3rd APES Workshop. Heverlee (Belgium). November 5, 2002. [slides]
  137. Information Theory and Anonymity. 23rd Symposium on Information Theory in the Benelux. Louvain la Neuve (Belgium). May 29, 2002.[slides]
  138. Towards Measuring Anonymity. Workshop on Privacy Enhancing Technologies (PET) 2002. San Francisco (USA). April 14, 2002. [slides]
  139. Overview of technologies and building blocks for anonimity. 2nd APES Workshop. Heverlee (Belgium). November 21, 2001.[slides]
  140. Towards Measuring Anonymity. COSIC Seminar. Heverlee (Belgium). October 3, 2001. [slides]
  141. Anonymity requirements for eCommerce schemes and online elections. 1st APES Workshop. Heverlee (Belgium). April 19, 2001. [slides]



Links

Anonymity related links, blogs, awards, and conferences


PET Symposium, PET Award, CPDP Conference, Anonymity bibliography, Tor    


Utils


Trains, Kayak, Currency Converter, Brussels Airport


Entertainment


This is my academic genealogy. You can reconstruct your own genealogy with the Mathematics Genealogy Project.


You should definitely check Piled Higher & Deeper if you are considering doing a Ph.D. If it is too late (you already *are* in Grad School) it will help you realize that everyone else feels the same.




[Go to top of this page]