Claude Castelluccia

According to our database1, Claude Castelluccia authored at least 116 papers between 1993 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Taking Advice from (Dis)Similar Machines: The Impact of Human-Machine Similarity on Machine-Assisted Decision-Making.
Proceedings of the Tenth AAAI Conference on Human Computation and Crowdsourcing, 2022

2021
Towards a Governance Framework for Brain Data.
CoRR, 2021

Constrained differentially private federated learning for low-bandwidth devices.
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021

Compression Boosts Differentially Private Federated Learning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction.
Proceedings of the ACM CHIL '21: ACM Conference on Health, 2021

2020
Federated Learning in Adversarial Settings.
CoRR, 2020

DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020

Techniques d'anonymisation tabulaire : concepts et mise en oeuvre.
CoRR, 2020

Position Paper: Analyzing the Impacts of Facial Recognition.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
UPRISE-IoT: User-Centric Privacy & Security in the IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Differentially Private Mixture of Generative Neural Networks.
IEEE Trans. Knowl. Data Eng., 2019

Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

2018
Privacy-Preserving Release of Spatio-Temporal Density.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Fine-Grained Control over Tracking to Support the Ad-Based Web Economy.
ACM Trans. Internet Techn., 2018

On the Cost-Effectiveness of Mass Surveillance.
IEEE Access, 2018

To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Enhancing Transparency and Consent in the IoT.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
<i>MyAdChoices</i>: Bringing Transparency and Control to Online Advertising.
ACM Trans. Web, 2017

Towards Implicit Visual Memory-Based Authentication.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Near-Optimal Fingerprinting with Constraints.
Proc. Priv. Enhancing Technol., 2016

MyAdChoices: Bringing Transparency and Control to Online Advertising.
CoRR, 2016

MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.
CoRR, 2016

MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences.
CoRR, 2016

2015
The leaking battery: A privacy analysis of the HTML5 Battery Status API.
IACR Cryptol. ePrint Arch., 2015

On the Unicity of Smartphone Applications.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Probabilistic km-anonymity efficient anonymization of large set-valued datasets.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Detecting privacy leaks in the RATP App: how we proceeded and what we found.
J. Comput. Virol. Hacking Tech., 2014

Learning from Neuroscience to Improve Internet Security.
ERCIM News, 2014

Retargeting Without Tracking.
CoRR, 2014

On the uniqueness of Web browsing history patterns.
Ann. des Télécommunications, 2014

Selling off User Privacy at Auction.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

A case study: privacy preserving release of spatio-temporal density in paris.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
Mobilitics: Analyzing Privacy Leaks in Smartphones.
ERCIM News, 2013

When Privacy meets Security: Leveraging personal information for password cracking
CoRR, 2013

Detecting relay attacks in RFID systems using physical layer characteristics.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Distributed Key Certification Using Accumulators for Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Towards Web-Based Biometric Systems Using Personal Browsing Interests.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
DREAM: DiffeRentially privatE smArt Metering
CoRR, 2012

On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Adaptive Password-Strength Meters from Markov Models.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Differentially Private Histogram Publishing through Lossy Compression.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Differentially private sequential data publication via variable-length n-grams.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Behavioural Tracking on the Internet: A Technical Perspective.
Proceedings of the European Data Protection: In Good Health?, 2012

2011
A security framework for privacy-preserving data aggregation in wireless sensor networks.
ACM Trans. Sens. Networks, 2011

Towards clock skew based services in wireless sensor networks.
Int. J. Sens. Networks, 2011

Protecting against physical resource monitoring.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

How Unique and Traceable Are Usernames?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

I Have a DREAM! (DiffeRentially privatE smArt Metering).
Proceedings of the Information Hiding - 13th International Conference, 2011

EphPub: Toward robust Ephemeral Publishing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
A Survey on the Encryption of Convergecast Traffic with In-Network Processing.
IEEE Trans. Dependable Secur. Comput., 2010

Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

Private Information Disclosure from Web Searches. (The case of Google Web History)
CoRR, 2010

Toward Clock Skew based Wireless Sensor Node Services.
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010

Empirical analysis of UWB channel characteristics for secret key generation in indoor environments.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Private Information Disclosure from Web Searches.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

2009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Owner-Centric Networking: A New Architecture for a Pollution-Free Internet.
ERCIM News, 2009

Extending SAT Solvers to Cryptographic Problems.
Proceedings of the Theory and Applications of Satisfiability Testing, 2009

Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements.
Proceedings of the NTMS 2009, 2009

Geolocalization of proxied services and its application to fast-flux hidden servers.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Proximity-based access control for implantable medical devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Defending embedded systems against control flow attacks.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

On the difficulty of software-based attestation of embedded devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Hierarchical Mobile IPv6 (HMIPv6) Mobility Management.
RFC, October, 2008

ABBA: A Balls and bins approach to secure aggregation in WSNs.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

On the (Im)possibility of aggregate message authentication codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Code injection attacks on harvard-architecture devices.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

De la mobilité à la sécurité des réseaux.
, 2008

2007
Robust self-keying mobile ad hoc networks.
Comput. Networks, 2007

TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

On the Privacy of Concealed Data Aggregation.
Proceedings of the Computer Security, 2007

2006
Authenticated Interleaved Encryption.
IACR Cryptol. ePrint Arch., 2006

Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

Packet Coding for Strong Anonymity in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Hierarchical Mobile IPv6 Mobility Management (HMIPv6).
RFC, August, 2005

Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes.
IACR Cryptol. ePrint Arch., 2005

Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Shake them up!: a movement-based pairing protocol for CPU-constrained devices.
Proceedings of the 3rd International Conference on Mobile Systems, 2005

E.cient Aggregation of encrypted data in Wireless Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Compact neighbor discovery: a bandwidth defense through bandwidth optimization.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Cryptographically Generated Addresses for Constrained Devices.
Wirel. Pers. Commun., 2004

Crypto-based identifiers (CBIDs): Concepts and applications.
ACM Trans. Inf. Syst. Secur., 2004

Hash-Based Paging and Location Update Using Bloom Filters.
Mob. Networks Appl., 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptol. ePrint Arch., 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Hash-Based Dynamic Source Routing.
Proceedings of the NETWORKING 2004, 2004

A Simple Privacy Extension for Mobile IPV6.
Proceedings of the Mobile and Wireless Communication Networks, 2004

Hindering Eavesdropping via IPv6 Opportunistic Encryption.
Proceedings of the Computer Security, 2004

2003
Priorities in WLANs.
Comput. Networks, 2003

EnhancingIEEE 802.11 performance in congested environments.
Ann. des Télécommunications, 2003

Securing Group Management in IPv6 with Cryptographically Generated Addresses.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2002
Protecting AODV against impersonation attacks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002

How to convert any ID-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2002

Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Requirements and Functional Architecture for an IP Host Alerting Protocol.
RFC, August, 2001

Extending mobile IP with adaptive individual paging: a performance analysis.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001

Flexible Network Support for Mobile Hosts.
Mob. Networks Appl., 2001

An adaptive per-host IP paging architecture.
Comput. Commun. Rev., 2001

Differentiation Mechanisms for IEEE 802.11.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

2000
HMIPv6: A hierarchical mobile IPv6 proposal.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2000

Introducing Service Differentiation into IEEE 802.11.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1998
Flexible Network Support for Mobility.
Proceedings of the MOBICOM '98, 1998

A hierarchical mobility management scheme for IPv6.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

Toward a Hierarchical Mobile IPv6.
Proceedings of the High Performance Networking, 1998

1997
Generating efficient protocol code from an abstract specification.
IEEE/ACM Trans. Netw., 1997

1994
Modular Communication Subsystem Implementation Using A Synchronous Approach.
Proceedings of the USENIX 1994 High-Speed Networking Symposium, 1994

1993
Recovery of missing speech packets using the short-time energy and zero-crossing measurements.
IEEE Trans. Speech Audio Process., 1993


  Loading...