“CryptoDSPs for Cloud Privacy”, in International Workshop on Cloud Information System Engineering (CISE), Hong Kong, China, 2010, vol. 6724.
, “Efficient Protocols for Secure Adaptive Filtering”, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Prage, Czech Republic, 2011, pp. 5860-5863. secure_adaptive_filteringICASSP2011.pdf (115.55 KB)
, “Encrypted Domain Processing for Cloud Privacy: Concept and Practical Experience”, in International Conference on Cloud Computing and Services Science (CLOSER), Noordwijkerhout, The Netherlands, 2011.
, “Fully Homomorphic Faces”, in IEEE International Conference on Image Processing (ICIP), Lake Buena Vista, Florida, USA, 2012. cryptofaces.pdf (213.56 KB)
, “Privacy Preserving Error Resilient DNA Searching through Oblivious Automata”, in ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, USA, 2007, pp. 519–528.
, “PRNU-leaks: facts and remedies”, in 2020 28th European Signal Processing Conference (EUSIPCO), 2021, pp. 720-724.
, “Secure and Private Medical Clouds using Encrypted Processing”, in Virtual Physiological Human (VPH), Brussels, Belgium, 2010.
, “Secure Direct and Iterative Protocols for Solving Systems of Linear Equations”, in Signal Processing in the Encrypted Domain (SPEED) Workshop, Lausanne, Switzerland, 2009, pp. 122–141. secure_sle_speedws09.pdf (193.97 KB)
, “A Secure Multidimensional Point Inclusion Protocol”, in ACM Workshop on Multimedia and Security (MMSEC), Dallas, Texas, USA, 2007, pp. 109–120.
, “Videosurveillance and privacy: covering the two sides of the mirror with DRM”, in ACM Workshop on Digital Rights Management (DRM), Chicago, IL, USA, 2009. drm18-troncoso.pdf (417.17 KB)
, “Information Forensics and Security: A quarter-century-long journey”, IEEE Signal Processing Magazine, vol. 40, pp. 67-79, 2023.
, “Secure Adaptive Filtering”, IEEE Transactions on Information Forensics and Security, vol. 6, pp. 469 -485, 2011. TPPGTIFS11-Secure_Adaptive_Filtering.pdf (396.27 KB)
,