Vincent Toubiana

According to our database1, Vincent Toubiana authored at least 23 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions.
Proceedings of the 33rd USENIX Security Symposium, 2024

2021
No need to ask the Android: bluetooth-low-energy scanning without the location permission.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2012
A Critical Look at Decentralized Personal Data Architectures
CoRR, 2012

Photo-TaPE: user privacy preferences in photo tagging.
Proceedings of the 21st World Wide Web Conference, 2012

A Semantics to Define Web Templates for Adaptive Ubicomp Applications.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Cookie-based privacy issues on google services.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
An Analysis of Google Logs Retention Policies.
J. Priv. Confidentiality, 2011

Toward an Adaptive Semantic Search Mechanism for the 'Web of Things'.
Int. J. Semantic Comput., 2011

TrackMeNot: Enhancing the privacy of Web Search
CoRR, 2011

Show Me Your Cookie And I Will Tell You Who You Are
CoRR, 2011

The web of things vision: Things as a service and interaction patterns.
Bell Labs Tech. J., 2011

Providing user support in Web-of-Things enabled smart spaces.
Proceedings of the Second International Workshop on Web of Things, 2011

Searching the 'Web of Things'.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Scribee Experimentation - Early Statistics on Email Conversations.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

2010
A global security architecture for operated hybrid WLAN mesh networks.
Comput. Networks, 2010

Adnostic: Privacy Preserving Targeted Advertising.
Proceedings of the Network and Distributed System Security Symposium, 2010

R2M: A Reputation Model for Mashups.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2008
Performance comparison of multipath reactive Ad hoc routing protocols.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Bayesian Filter to Detect Misbehaving Nodes in MANETs.
Proceedings of the NTMS 2008, 2008

Towards a flexible security management solution for dynamic MANETs.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

An analysis of ASMA performances against packet dropping attacks in dense networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
Event Based Mobility Model for Subway Scenarios.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

2006
ASMA : Towards Adaptive Secured Multipath in MANETs.
Proceedings of the Mobile and Wireless Communication Networks, 2006


  Loading...