Follow
Seda Gurses
Seda Gurses
Associate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,
Verified email at tudelft.nl - Homepage
Title
Cited by
Cited by
Year
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3932013
Engineering privacy by design
S Gürses, C Gonzalez Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
3442011
A comparison of security requirements engineering methods
B Fabian, S Gürses, M Heisel, T Santen, H Schmidt
Requirements engineering 15 (1), 7-40, 2010
3012010
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
2402020
Ubiquitous social networks: Opportunities and challenges for privacy-aware user modelling
S Preibusch, B Hoser, S Gürses, B Berendt
DIW Discussion Papers, 2007
1432007
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM Del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
972016
A critical review of 10 years of privacy technology
G Danezis, S Gürses
Proceedings of Surveillance Cultures: A Global Surveillance Society, 2010
942010
Two tales of privacy in online social networks
S Gürses, C Diaz
IEEE Security & Privacy 11 (3), 29-37, 2013
892013
Multilateral Privacy Requirements Analysis in Online Social Networks
S Gürses, CS HMDB, E COSIC
Ph. D. Thesis, HMDB, Department of Computer Science, KU Leuven, Belgium, May, 2010
71*2010
Crypto and empire: The contradictions of counter-surveillance advocacy
S Gürses, A Kundnani, J Van Hoboken
Media, Culture & Society 38 (4), 576-590, 2016
682016
Multilateral security requirements analysis for preserving privacy in ubiquitous environments
F Guerses, B Berendt, T Santen
Proceedings of the UKDU Workshop, 51-64, 2006
652006
Privacy after the agile turn
S Gurses, J Van Hoboken
SocArXiv, 2017
622017
Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
SF Gürses, R Rizk, O Günther
ICIS, 90, 2008
602008
Can you engineer privacy?
S Gürses
Communications of the ACM 57 (8), 20-23, 2014
512014
Engineering privacy by design reloaded
S Gürses, C Troncoso, C Diaz
Amsterdam Privacy Conference 21, 2015
492015
POTs: protective optimization technologies
B Kulynych, R Overdorf, C Troncoso, S Gürses
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
462020
Eliciting confidentiality requirements in practice
S Gürses, JH Jahnke, C Obry, A Onabajo, T Santen, M Price
Proceedings of the 2005 conference of the Centre for Advanced Studies on …, 2005
462005
Hero or Villain: The Data Controller in Privacy Law and Technologies
C Diaz, O Tene, S Gurses
Ohio St. LJ 74, 923-1335, 2013
412013
Understanding the landscape of privacy technologies
C Diaz, S Gürses
Proceedings of the information security summit 12, 58-63, 2012
382012
Contextual integrity through the lens of computer science
S Benthall, S Gürses, H Nissenbaum
Now Publishers, 2017
352017
The system can't perform the operation now. Try again later.
Articles 1–20