FPDetective: dusting the web for fingerprinters G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 470 | 2013 |
Engineering privacy by design S Gürses, C Gonzalez Troncoso, C Diaz Computers, Privacy & Data Protection, 2011 | 412 | 2011 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 332 | 2020 |
A comparison of security requirements engineering methods B Fabian, S Gürses, M Heisel, T Santen, H Schmidt Requirements engineering 15, 7-40, 2010 | 323 | 2010 |
Privacy engineering: Shaping an emerging field of research and practice S Gürses, JM Del Alamo IEEE Security & Privacy 14 (2), 40-46, 2016 | 147 | 2016 |
Ubiquitous social networks: Opportunities and challenges for privacy-aware user modelling S Preibusch, B Hoser, S Gürses, B Berendt DIW Discussion Papers, 2007 | 146 | 2007 |
Privacy after the agile turn S Gurses, J Van Hoboken SocArXiv, 2017 | 104 | 2017 |
A critical review of 10 years of privacy technology G Danezis, S Gürses Proceedings of Surveillance Cultures: A Global Surveillance Society, 2010 | 97 | 2010 |
Two tales of privacy in online social networks S Gürses, C Diaz IEEE Security & Privacy 11 (3), 29-37, 2013 | 95 | 2013 |
Crypto and empire: The contradictions of counter-surveillance advocacy S Gürses, A Kundnani, J Van Hoboken Media, Culture & Society 38 (4), 576-590, 2016 | 87 | 2016 |
POTs: protective optimization technologies B Kulynych, R Overdorf, C Troncoso, S Gürses Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020 | 86 | 2020 |
Multilateral Privacy Requirements Analysis in Online Social Networks S Gürses, CS HMDB, E COSIC Ph. D. Thesis, HMDB, Department of Computer Science, KU Leuven, Belgium, May, 2010 | 76* | 2010 |
Engineering privacy by design reloaded S Gürses, C Troncoso, C Diaz Amsterdam Privacy Conference 21, 2015 | 73 | 2015 |
Is Moore's Party Over? MY Vardi Commun. ACM 54 (11), 5, 2011 | 69* | 2011 |
Multilateral security requirements analysis for preserving privacy in ubiquitous environments F Guerses, B Berendt, T Santen Proceedings of the UKDU Workshop, 51-64, 2006 | 67 | 2006 |
Can you engineer privacy? S Gürses Communications of the ACM 57 (8), 20-23, 2014 | 62 | 2014 |
Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback. SF Gürses, R Rizk, O Günther ICIS, 90, 2008 | 61 | 2008 |
Contextual integrity through the lens of computer science S Benthall, S Gürses, H Nissenbaum Foundations and Trends® in Privacy and Security 2 (1), 1-69, 2017 | 58 | 2017 |
Eliciting confidentiality requirements in practice S Gürses, JH Jahnke, C Obry, A Onabajo, T Santen, M Price Proceedings of the 2005 conference of the Centre for Advanced Studies on …, 2005 | 47 | 2005 |
Hero or Villain: The Data Controller in Privacy Law and Technologies C Diaz, O Tene, S Gurses Ohio St. LJ 74, 923-1335, 2013 | 46 | 2013 |