Jean-Pierre Hubaux
Orcid: 0000-0003-1533-6132Affiliations:
- Swiss Federal Institute of Technology in Lausanne, Switzerland
According to our database1,
Jean-Pierre Hubaux
authored at least 278 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2010, "For contributions to security in wireless networks.".
IEEE Fellow
IEEE Fellow 2009, "For contributions to wireless security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption.
J. Cryptol., April, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022
Privacy-preserving federated neural network learning for disease-associated cell classification.
Patterns, 2022
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation.
IACR Cryptol. ePrint Arch., 2022
Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing.
CoRR, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proc. Priv. Enhancing Technol., 2021
Proc. Priv. Enhancing Technol., 2021
Nat. Comput. Sci., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets.
IEEE Trans. Inf. Forensics Secur., 2020
Proc. Priv. Enhancing Technol., 2020
J. Am. Medical Informatics Assoc., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis.
CoRR, 2020
SPHN/PHRT - MedCo in Action: Empowering the Swiss Molecular Tumor Board with Privacy-Preserving and Real-Time Patient Discovery.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020
GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data.
Proceedings of the AMIA 2020, 2020
2019
MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins.
IEEE Trans. Mob. Comput., 2018
Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
Are privacy-enhancing technologies for genomic data ready for the clinic? A survey of medical experts of the Swiss HIV Cohort Study.
J. Biomed. Informatics, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
IEEE Trans. Mob. Comput., 2017
Proc. Priv. Enhancing Technol., 2017
Proc. Priv. Enhancing Technol., 2017
Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.
J. Am. Medical Informatics Assoc., 2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
Bioinform., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
IEEE Trans. Mob. Comput., 2016
Proc. Priv. Enhancing Technol., 2016
A machine-learning based approach to privacy-aware information-sharing in mobile social networks.
Pervasive Mob. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 19th ACM International Conference on Modeling, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit.
CoRR, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
IEEE Trans. Mob. Comput., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Dependable Secur. Comput., 2014
GeoInformatica, 2014
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Mob. Networks Appl., 2013
Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Protecting and evaluating genomic privacy in medical tests and personalized medicine.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Wirel. Commun., 2011
IEEE Trans. Dependable Secur. Comput., 2011
J. Syst. Softw., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the 49th Annual Allerton Conference on Communication, 2011
2010
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility.
IEEE/ACM Trans. Netw., 2010
IEEE Trans. Mob. Comput., 2010
A randomized countermeasure against parasitic adversaries in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
IEEE Trans. Wirel. Commun., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Security and Privacy in Communication Networks, 2009
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Secur. Comput., 2008
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008
Report on the "secure vehicular communications: results and challenges ahead" workshop.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008
IEEE Commun. Mag., 2008
IEEE Commun. Mag., 2008
Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
IEEE Trans. Mob. Comput., 2007
IEEE J. Sel. Areas Commun., 2007
IEEE J. Sel. Areas Commun., 2007
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
IEEE Wirel. Commun., 2006
IEEE Trans. Mob. Comput., 2006
IEEE Trans. Mob. Comput., 2006
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2006
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006
Non-Interactive Location Surveying for Sensor Networks with Mobility-Differentiated ToA.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
COMMON-Sense Net: Improved Water Management for Resource-Poor Farmers via Sensor Networks.
Proceedings of the 2006 International Conference on Information and Communication Technologies and Development, 2006
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the Distributed Computing in Sensor Systems, 2006
Proceedings of the 3rd International Conference on Broadband Communications, 2006
2005
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005
Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, 2005
Visions for dynamic network scenarios in ubiquitous environments: applications and research issues.
Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
2004
IEEE Trans. Mob. Comput., 2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
J. Comput. Secur., 2004
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004
Proceedings of the Second International Conference on Mobile Systems, 2004
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004
Joint synchronization, routing and energy saving in CSMA/CA multi-hop hybrid networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
2003
IEEE Trans. Mob. Comput., 2003
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003
Mob. Networks Appl., 2003
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
Proceedings of the Financial Cryptography, 2003
2002
Report on the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002).
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002
Comput. Networks, 2002
Proceedings of the 2002 Workshop on New Security Paradigms, 2002
Minimum-energy broadcast in all-wireless networks: : NP-completeness and distribution issues.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Modeling and testing object-oriented distributed systems with linear-time temporal logic.
Concurr. Comput. Pract. Exp., 2001
IEEE Commun. Mag., 2001
IEEE Commun. Mag., 2001
Proceedings of the Electronic Commerce, Second International Workshop, 2001
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001
2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
1999
Telecommun. Syst., 1999
IEEE J. Sel. Areas Commun., 1999
J. Netw. Syst. Manag., 1999
Comput. Networks, 1999
On applying formal techniques to the development of hybrid services: challenges and directions.
IEEE Commun. Mag., 1999
IEEE Commun. Mag., 1999
IEEE Commun. Mag., 1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Circuit Emulation Over IP Networks.
Proceedings of the Protocols for High Speed Networks VI, 1999
Proceedings of the Active Technologies for Network and Service Management, 1999
1998
Multimedia Resources: An Information Model and Its Application to an MPEG2 Video Codec.
J. Netw. Syst. Manag., 1998
Testing Temporal Logic Properties in Distributed Systems.
Proceedings of the Testing of Communicating Systems, IFIP TC6 11th International Workshop on Testing Communicating Systems (IWTCS), August 31, 1998
Proceedings of the 1998 IEEE International Conference on Communications, 1998
1997
A Generic Component Model for the design of future.
Proceedings of the Management of Multimedia Networks and Services, 1997
A new flexible and modular QoS mapping framework based on psychophysics.
Proceedings of the Management of Multimedia Networks and Services, 1997
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1997
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997
Workshop 1: Object-Oriented Technology for Telecommunications Services Engineering (Introduction).
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997
1996
DEAL: A DElegated Agent Language for Developing Network Management Functions.
Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1996
Proceedings of the MASCOTS '96, 1996
Proceedings of the Broadband Communications, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
A New System Engineering Methodology Coupling Formal Specification and Performance Evaluation.
Proceedings of the FME '96: Industrial Benefit and Advances in Formal Methods, 1996
Perceptual Video Quality and Activity Metrics: Optimization of Video Services Based on MPEG-2 Encoding.
Proceedings of the Multimedia Telecommunications and Applications, 1996
New Network and ATM Adaptation Layers for Real-Time Multimedia Applications: A Performance Study Based on Psychophysics.
Proceedings of the Multimedia Telecommunications and Applications, 1996
1995
Object-oriented design of a VPN bandwidth management system.
Proceedings of the Integrated Network Management IV, 1995
1994
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994