Follow
Seda Gurses
Seda Gurses
Associate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4212013
Engineering privacy by design
S Gürses, C Gonzalez Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
3742011
A comparison of security requirements engineering methods
B Fabian, S Gürses, M Heisel, T Santen, H Schmidt
Requirements engineering 15, 7-40, 2010
3132010
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
2992020
Ubiquitous social networks: Opportunities and challenges for privacy-aware user modelling
S Preibusch, B Hoser, S Gürses, B Berendt
DIW Discussion Papers, 2007
1442007
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM Del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
1212016
A critical review of 10 years of privacy technology
G Danezis, S Gürses
Proceedings of Surveillance Cultures: A Global Surveillance Society, 2010
962010
Two tales of privacy in online social networks
S Gürses, C Diaz
IEEE Security & Privacy 11 (3), 29-37, 2013
942013
Privacy after the agile turn
S Gurses, J Van Hoboken
SocArXiv, 2017
802017
Multilateral Privacy Requirements Analysis in Online Social Networks
S Gürses, CS HMDB, E COSIC
Ph. D. Thesis, HMDB, Department of Computer Science, KU Leuven, Belgium, May, 2010
74*2010
Crypto and empire: The contradictions of counter-surveillance advocacy
S Gürses, A Kundnani, J Van Hoboken
Media, Culture & Society 38 (4), 576-590, 2016
732016
Multilateral security requirements analysis for preserving privacy in ubiquitous environments
F Guerses, B Berendt, T Santen
Proceedings of the UKDU Workshop, 51-64, 2006
672006
Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
SF Gürses, R Rizk, O Günther
ICIS, 90, 2008
612008
Can you engineer privacy?
S Gürses
Communications of the ACM 57 (8), 20-23, 2014
562014
POTs: protective optimization technologies
B Kulynych, R Overdorf, C Troncoso, S Gürses
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
552020
Engineering privacy by design reloaded
S Gürses, C Troncoso, C Diaz
Amsterdam Privacy Conference 21, 2015
552015
Hero or Villain: The Data Controller in Privacy Law and Technologies
C Diaz, O Tene, S Gurses
Ohio St. LJ 74, 923-1335, 2013
482013
Eliciting confidentiality requirements in practice
S Gürses, JH Jahnke, C Obry, A Onabajo, T Santen, M Price
Proceedings of the 2005 conference of the Centre for Advanced Studies on …, 2005
462005
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
J Lee, Z Lee, KRT Larsen
Communications of the ACM 46 (7), 137-142, 2003
44*2003
Contextual integrity through the lens of computer science
S Benthall, S Gürses, H Nissenbaum
Now Publishers, 2017
432017
The system can't perform the operation now. Try again later.
Articles 1–20