Mathieu Cunche

Orcid: 0000-0002-0066-8612

Affiliations:
  • INSA Lyon, France


According to our database1, Mathieu Cunche authored at least 54 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5(3) of ePrivacy Directive.
CoRR, 2024

RSSI-based attacks for identification of BLE devices.
Comput. Secur., 2024

Privacy-Preserving Pseudonyms for LoRaWAN.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

2023
PEPPER: Precise Privacy-Preserving Contact Tracing with Cheap, BLE/UWB Capable Tokens.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

RSSI-Based Fingerprinting of Bluetooth Low Energy Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems.
DTRAP, 2022

Device Re-identification in LoRaWAN through Messages Linkage.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

RoMA: rotating MAC address for privacy protection.
Proceedings of the SIGCOMM '22 Poster and Demo Sessions, 2022

2021
Privacy issues in wireless networks: Every frame you send, they'll be watching you. (Problèmes de vie privée dans les réseaux sans-fil : Every frame you send, they'll be watching you).
, 2021

Privacy protection for Wi-Fi location positioning systems.
J. Inf. Secur. Appl., 2021

On the process of fixing privacy issues in Wi-Fi enabled devices.
Proceedings of the 25th International ITG Workshop on Smart Antennas, 2021

No need to ask the Android: bluetooth-low-energy scanning without the location permission.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Privacy in trajectory micro-data publishing: a survey.
Trans. Data Priv., 2020

Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols.
Proc. Priv. Enhancing Technol., 2020

DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020

Valkyrie: a generic framework for verifying privacy provisions in wireless networks.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
Privacy of trajectory micro-data : a survey.
CoRR, 2019

Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

A Generic Information and Consent Framework for the IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Saving private addresses: an analysis of privacy issues in the bluetooth-low-energy advertising mechanism.
Proceedings of the MobiQuitous 2019, 2019

Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Privacy-preserving Wi-Fi Analytics.
Proc. Priv. Enhancing Technol., 2018

The Pitfalls of Hashing for Privacy.
IEEE Commun. Surv. Tutorials, 2018

Detecting smartphone state changes through a Bluetooth based timing attack.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Enhancing Transparency and Consent in the IoT.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

2016
Defeating MAC Address Randomization Through Timing Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Enhanced recursive Reed-Muller erasure decoding.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Device-to-identity linking attack using targeted wi-fi geolocation spoofing.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Urban-scale cellular offloading through Wi-Fi access points: A measurement-based case study.
Proceedings of the 1st IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2015

SSIDs in the wild: Extracting semantic information from WiFi SSIDs.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
I know your MAC address: targeted tracking of individual using Wi-Fi.
J. Comput. Virol. Hacking Tech., 2014

Linking wireless devices using information contained in Wi-Fi probe requests.
Pervasive Mob. Comput., 2014

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Analysing the privacy policies of Wi-Fi trackers.
Proceedings of the 2014 Workshop on Physical Analytics, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

Asynchronous Covert Communication Using BitTorrent Trackers.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME.
RFC, February, 2013

Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones.
ERCIM News, 2013

RS + LDPC-Staircase codes for the erasure channel: Standards, usage and performance.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Private and resilient data aggregation.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

2012
Simple Low-Density Parity Check (LDPC) Staircase Forward Error Correction (FEC) Scheme for FECFRAME.
RFC, December, 2012

I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Heterogeneous Secure Multi-Party Computation.
Proceedings of the NETWORKING 2012, 2012

Inferring user relationship from hidden information in WLANs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2010
Codes AL-FEC hautes performances pour les canaux à effacements : variations autour des codes LDPC. (High performances AL-FEC codes for the erasure channel : variation around LDPC codes).
PhD thesis, 2010

Performance analysis of a high-performance real-time application with several AL-FEC schemes.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Algorithm-Based Fault Tolerance Applied to P2P Computing Networks.
Proceedings of the First International Conference on Advances in P2P Systems, 2009


  Loading...