Claude Castelluccia

According to our database1, Claude Castelluccia
  • authored at least 110 papers between 1993 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
MyAdChoices: Bringing Transparency and Control to Online Advertising.
TWEB, 2017

Differentially Private Mixture of Generative Neural Networks.
CoRR, 2017

Towards Implicit Visual Memory-Based Authentication.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Differentially Private Mixture of Generative Neural Networks.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

2016
Near-Optimal Fingerprinting with Constraints.
PoPETs, 2016

MyAdChoices: Bringing Transparency and Control to Online Advertising.
CoRR, 2016

Near-Optimal Fingerprinting with Constraints.
CoRR, 2016

MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.
CoRR, 2016

MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences.
CoRR, 2016

2015
The leaking battery: A privacy analysis of the HTML5 Battery Status API.
IACR Cryptology ePrint Archive, 2015

On the Unicity of Smartphone Applications.
CoRR, 2015

On the Unicity of Smartphone Applications.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Probabilistic km-anonymity efficient anonymization of large set-valued datasets.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Detecting privacy leaks in the RATP App: how we proceeded and what we found.
J. Computer Virology and Hacking Techniques, 2014

Learning from Neuroscience to Improve Internet Security.
ERCIM News, 2014

Retargeting Without Tracking.
CoRR, 2014

On the uniqueness of Web browsing history patterns.
Annales des Télécommunications, 2014

Selling off User Privacy at Auction.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

A case study: privacy preserving release of spatio-temporal density in paris.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
Mobilitics: Analyzing Privacy Leaks in Smartphones.
ERCIM News, 2013

When Privacy meets Security: Leveraging personal information for password cracking
CoRR, 2013

Detecting relay attacks in RFID systems using physical layer characteristics.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Distributed Key Certification Using Accumulators for Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Towards Web-Based Biometric Systems Using Personal Browsing Interests.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
DREAM: DiffeRentially privatE smArt Metering
CoRR, 2012

On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Adaptive Password-Strength Meters from Markov Models.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Differentially Private Histogram Publishing through Lossy Compression.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Differentially private sequential data publication via variable-length n-grams.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Behavioural Tracking on the Internet: A Technical Perspective.
Proceedings of the European Data Protection: In Good Health?, 2012

2011
A security framework for privacy-preserving data aggregation in wireless sensor networks.
TOSN, 2011

Towards clock skew based services in wireless sensor networks.
IJSNet, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
CoRR, 2011

How Unique and Traceable are Usernames?
CoRR, 2011

Protecting against physical resource monitoring.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

How Unique and Traceable Are Usernames?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

I Have a DREAM! (DiffeRentially privatE smArt Metering).
Proceedings of the Information Hiding - 13th International Conference, 2011

EphPub: Toward robust Ephemeral Publishing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
A Survey on the Encryption of Convergecast Traffic with In-Network Processing.
IEEE Trans. Dependable Sec. Comput., 2010

Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

Private Information Disclosure from Web Searches. (The case of Google Web History)
CoRR, 2010

Toward Clock Skew based Wireless Sensor Node Services.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Empirical analysis of UWB channel characteristics for secret key generation in indoor environments.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Private Information Disclosure from Web Searches.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
TOSN, 2009

Owner-Centric Networking: A New Architecture for a Pollution-Free Internet.
ERCIM News, 2009

Code injection attacks on harvard-architecture devices
CoRR, 2009

Extending SAT Solvers to Cryptographic Problems.
Proceedings of the Theory and Applications of Satisfiability Testing, 2009

Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements.
Proceedings of the NTMS 2009, 2009

Geolocalization of proxied services and its application to fast-flux hidden servers.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Proximity-based access control for implantable medical devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

On the difficulty of software-based attestation of embedded devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Hierarchical Mobile IPv6 (HMIPv6) Mobility Management.
RFC, October, 2008

ABBA: A Balls and bins approach to secure aggregation in WSNs.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

On the (Im)possibility of aggregate message authentication codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Code injection attacks on harvard-architecture devices.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

De la mobilité à la sécurité des réseaux.
, 2008

2007
Robust self-keying mobile ad hoc networks.
Computer Networks, 2007

TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

On the Privacy of Concealed Data Aggregation.
Proceedings of the Computer Security, 2007

2006
Authenticated Interleaved Encryption.
IACR Cryptology ePrint Archive, 2006

Secure acknowledgment aggregation and multisignatures with limited robustness.
Computer Networks, 2006

Packet Coding for Strong Anonymity in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Improving secure server performance by re-balancing SSL/TLS handshakes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Hierarchical Mobile IPv6 Mobility Management (HMIPv6).
RFC, August, 2005

Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes.
IACR Cryptology ePrint Archive, 2005

Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Shake them up!: a movement-based pairing protocol for CPU-constrained devices.
Proceedings of the 3rd International Conference on Mobile Systems, 2005

E.cient Aggregation of encrypted data in Wireless Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Compact neighbor discovery: a bandwidth defense through bandwidth optimization.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Cryptographically Generated Addresses for Constrained Devices.
Wireless Personal Communications, 2004

Crypto-based identifiers (CBIDs): Concepts and applications.
ACM Trans. Inf. Syst. Secur., 2004

Hash-Based Paging and Location Update Using Bloom Filters.
MONET, 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptology ePrint Archive, 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Hash-Based Dynamic Source Routing.
Proceedings of the NETWORKING 2004, 2004

A Simple Privacy Extension for Mobile IPV6.
Proceedings of the Mobile and Wireless Communication Networks, 2004

Hindering Eavesdropping via IPv6 Opportunistic Encryption.
Proceedings of the Computer Security, 2004

Secret Handshakes from CA-Oblivious Encryption.
Proceedings of the Advances in Cryptology, 2004

2003
Priorities in WLANs.
Computer Networks, 2003

EnhancingIEEE 802.11 performance in congested environments.
Annales des Télécommunications, 2003

Securing Group Management in IPv6 with Cryptographically Generated Addresses.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
Protecting AODV against impersonation attacks.
Mobile Computing and Communications Review, 2002

How to convert any ID-based Signature Schemes.
IACR Cryptology ePrint Archive, 2002

Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Requirements and Functional Architecture for an IP Host Alerting Protocol.
RFC, August, 2001

Extending mobile IP with adaptive individual paging: a performance analysis.
Mobile Computing and Communications Review, 2001

Flexible Network Support for Mobile Hosts.
MONET, 2001

An adaptive per-host IP paging architecture.
Computer Communication Review, 2001

Differentiation Mechanisms for IEEE 802.11.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
HMIPv6: A hierarchical mobile IPv6 proposal.
Mobile Computing and Communications Review, 2000

Extending Mobile IP with Adaptive Individual Paging: A Performance Analysis.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Introducing Service Differentiation into IEEE 802.11.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1998
Flexible Network Support for Mobility.
Proceedings of the MOBICOM '98, 1998

A hierarchical mobility management scheme for IPv6.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

Toward a Hierarchical Mobile IPv6.
Proceedings of the High Performance Networking, 1998

1997
Generating efficient protocol code from an abstract specification.
IEEE/ACM Trans. Netw., 1997

1996
Generating Efficient Protocol Code from an Abstract Specification.
Proceedings of the ACM SIGCOMM 1996 Conference on Applications, 1996

1994
Modular Communication Subsystem Implementation Using A Synchronous Approach.
Proceedings of the USENIX 1994 High-Speed Networking Symposium, 1994

1993
Recovery of missing speech packets using the short-time energy and zero-crossing measurements.
IEEE Trans. Speech and Audio Processing, 1993


  Loading...