Claude Castelluccia
According to our database1,
Claude Castelluccia
authored at least 117 papers
between 1993 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
10
1
1
1
1
1
3
1
2
1
4
1
4
2
1
2
4
2
1
1
2
2
4
2
2
4
1
1
1
1
3
1
1
2
1
3
2
3
5
5
3
7
3
4
2
4
5
1
1
1
1
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2022
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems.
DTRAP, 2022
Taking Advice from (Dis)Similar Machines: The Impact of Human-Machine Similarity on Machine-Assisted Decision-Making.
Proceedings of the Tenth AAAI Conference on Human Computation and Crowdsourcing, 2022
2021
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction.
Proceedings of the ACM CHIL '21: ACM Conference on Health, 2021
2020
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020
2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
IEEE Trans. Knowl. Data Eng., 2019
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
2018
Proceedings of the Handbook of Mobile Data Privacy., 2018
ACM Trans. Internet Techn., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
2017
ACM Trans. Web, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2016
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.
CoRR, 2016
CoRR, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
Ann. des Télécommunications, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014
2013
CoRR, 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the European Data Protection: In Good Health?, 2012
2011
A security framework for privacy-preserving data aggregation in wireless sensor networks.
ACM Trans. Sens. Networks, 2011
Int. J. Sens. Networks, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
CoRR, 2010
Proceedings of the 5th Annual International Conference on Wireless Internet, 2010
Empirical analysis of UWB channel characteristics for secret key generation in indoor environments.
Proceedings of the IEEE 21st International Symposium on Personal, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
2009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
ACM Trans. Sens. Networks, 2009
ERCIM News, 2009
Proceedings of the Theory and Applications of Satisfiability Testing, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements.
Proceedings of the NTMS 2009, 2009
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the Computer Security, 2007
2006
Comput. Networks, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the 3rd International Conference on Mobile Systems, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
Wirel. Pers. Commun., 2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Mobile and Wireless Communication Networks, 2004
Proceedings of the Computer Security, 2004
2003
Ann. des Télécommunications, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2002
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses.
Proceedings of the Network and Distributed System Security Symposium, 2002
2001
RFC, August, 2001
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
2000
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
1998
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Toward a Hierarchical Mobile IPv6.
Proceedings of the High Performance Networking, 1998
1997
IEEE/ACM Trans. Netw., 1997
1994
Proceedings of the USENIX 1994 High-Speed Networking Symposium, 1994
1993
Recovery of missing speech packets using the short-time energy and zero-crossing measurements.
IEEE Trans. Speech Audio Process., 1993