Ero Balsa
Ero Balsa
imec-COSIC KU Leuven
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
OB-PWS: Obfuscation-based private web search
E Balsa, C Troncoso, C Diaz
2012 IEEE Symposium on Security and Privacy, 491-505, 2012
802012
Questioning the assumptions behind fairness solutions
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1811.11293, 2018
132018
Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools.
E Balsa, L Brandimarte, A Acquisti, C Diaz, S Gürses
Lecture Notes in Computer Science, 2014
122014
A Metric to Evaluate Interaction Obfuscation in Online Social Networks
E Balsa, C Troncoso, C Diaz
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012
122012
SPION Deliverable D2. 1-State of the Art
A Acquisti, B Van Alsenoy, E Balsa, B Berendt, D Clarke, C Diaz, B Gao, ...
10*2011
POTs: Protective Optimization Technologies
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1806.02711, 2018
82018
POTs: The revolution will not be optimized
S Gurses, R Overdorf, E Balsa
11th Hot Topics in Privacy Enhancing Technologies (HotPETs), 2018
82018
Privacy-preserving social networks. design and evaluation
E Balsa
Master’s thesis, KU Leuven, 2010
5*2010
The SPION Project
A Acquisti, B Van Alesenoy, E Balsa, B Berendt, D Clarke, C Diaz, B Gao, ...
5
Towards inferring communication patterns in online social networks
E Balsa, C Pérez-Sola, C Diaz
ACM Transactions on Internet Technology (TOIT) 17 (3), 32, 2017
42017
A metric for the evaluation of traffic analysis-resistant online social networks
E Balsa, C Troncoso, C Diaz
Technical report, Katholieke Universiteit Leuven, 2011
32011
STIRRING THE POTS: PROTECTIVE OPTIMIZATION TECHNOLOGIES1
S GÜRSES, R OVERDORF, ERO BALSA
3*
Rights and obligations of actors in social networking sites
A Acquisti, E Balsa, B Berendt, R Sayaf, R Heyman, S Gürses
February, 2014
22014
Why Can’t Online Social Networks Encrypt?
E Balsa, F Beato, S Gürses
Proceedings of W3C Workshop Privacy UserCentric Controls, 2014
12014
Chaff-based profile obfuscation
E Balsa
KU Leuven, 2019
2019
Being Profiled: Cogitas Ergo Sum
I Baraliuc, E Bayamlioglu, M Hildebrandt, L Janssens
Amsterdam University Press, 2019
2019
Final specification of an end-to-end secure architecture
L Adkinson, P Dago, JL Otero, RM de la Escalera, J Troncoso, E Balsa, ...
2016
Preliminary Standardisation Reports
E Balsa, L Adkinson, AB Sunil, I Iliashenko, N Notario, SS Roy, ...
2016
WITDOM formalized technological requirements
J Troncoso, L Adkinson, C Troncoso, N Notario, E Balsa, S Nikova, ...
2015
D9. 1: First iteration of software prototypes and report describing those prototypes
W De Groef, B Gao, R Sayaf, E Balsa, F Piessens, B Berendt, D Clarke, ...
2012
The system can't perform the operation now. Try again later.
Articles 1–20