EN FR
EN FR


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 1L. Jacquin.

    Compromis performance/sécurité des passerelles très haut débit pour Internet., Université de Grenoble, November 2013.

    http://hal.inria.fr/tel-00911075
  • 2V. Roca.

    Codes AL-FEC et protocoles de diffusion robuste de contenus : composants pour des services performants et passant à l'échelle, Université de Grenoble, April 2014, version 1.0, 30 décembre 2013.

    http://hal.inria.fr/tel-00925955

Articles in International Peer-Reviewed Journals

  • 3A. Chaabane, E. De Cristofaro, M. A. Kaafar, E. Uzun.

    Privacy in Content-Oriented Networking: Threats and Countermeasures, in: ACM Computer Communication Review, July 2013, pp. 167–174.

    http://hal.inria.fr/hal-00939179
  • 4M. Cunche.

    I know your MAC address: targeted tracking of individual using Wi-Fi, in: Journal of Computer Virology and Hacking Techniques, December 2013. [ DOI : 10.1007/s11416-013-0196-1 ]

    http://hal.inria.fr/hal-00923467
  • 5M. Cunche, M. A. Kaafar, R. Boreli.

    Linking wireless devices using information contained in Wi-Fi probe requests, in: Pervasive and Mobile Computing, 2013. [ DOI : 10.1016/j.pmcj.2013.04.001 ]

    http://hal.inria.fr/hal-00816374
  • 6L. Olejnik, C. Castelluccia, A. Janc.

    On the Uniqueness of Web Browsing History Patterns, in: Annales des Télécommunications, September 2013. [ DOI : 10.1007/s12243-013-0392-5 ]

    http://hal.inria.fr/hal-00917042
  • 7Y. Zhang, M. Minier.

    How network coding system constrains packet pollution attacks in wireless sensor networks, in: IJGUC - International Journal of Grid and Utility Computing, 2013, vol. 4, no 2/3, pp. 197-203.

    http://hal.inria.fr/hal-00918953
  • 8W. Znaidi, M. Minier, S. Ubéda.

    Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks, in: IJDSN - International Journal of Distributed Sensor Networks, 2013, vol. 2013, 12 p. p. [ DOI : 10.1155/2013/745069 ]

    http://hal.inria.fr/hal-00918969

Articles in Non Peer-Reviewed Journals

  • 9J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca, F. Baudot, G. Delcroix.

    Mobilitics: Analyzing Privacy Leaks in Smartphones, in: ERCIM Newsletter, April 2013.

    http://hal.inria.fr/hal-00917417
  • 10M. Cunche, M. A. Kaafar, R. Boreli.

    Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones, in: ERCIM News, April 2013, no 93, pp. 33-34.

    http://hal.inria.fr/hal-00818202

International Conferences with Proceedings

  • 11J. Achara, J.-D. Lefruit, V. Roca, C. Castelluccia.

    Detecting Privacy Leaks in the RATP App: how we proceeded and what we found, in: GREHACK 2013, Grenoble, France, Guillaume Jeanne, November 2013, to appear also in Springer Journal of Computer Virology and Hacking Techniques (JCVHT).

    http://hal.inria.fr/hal-00872967
  • 12J. Y. Bae, C. Castelluccia, C. Lauradoux, F. Rousseau.

    Distributed Key Certification using Accumulators for Wireless Sensor Networks, in: International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MOBIQUITOUS 2013, Tokyo, Japan, Springer, December 2013.

    http://hal.inria.fr/hal-00915741
  • 13T. P. Berger, M. Minier, G. Thomas.

    Extended Generalized Feistel Networks using Matrix Representation, in: Selected Areas in Cryptography 2013, Burnaby, British Columbia, Canada, L. R. Knudsen, H. Wu (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7707, pp. 355-371.

    http://hal.inria.fr/hal-00913881
  • 14D. Butin, M. Chicote, D. Le Métayer.

    Log Design for Accountability, in: DUMA13 - 4th International Workshop on Data Usage Management - 2013, San Francisco, United States, May 2013. [ DOI : 10.1109/SPW.2013.26 ]

    http://hal.inria.fr/hal-00799100
  • 15D. Butin, D. Gray, G. Bella.

    Towards Verifying Voter Privacy Through Unlinkability, in: ESSoS13 - International Symposium on Engineering Secure Software and Systems - 2013, Rocquencourt, France, Lecture Notes in Computer Science, Springer, March 2013, pp. 91-106. [ DOI : 10.1007/978-3-642-36563-8_7 ]

    http://hal.inria.fr/hal-00766201
  • 16C. Castelluccia, S. Grumbach, L. Olejnik.

    Data Harvesting 2.0: from the Visible to the Invisible Web, in: The Twelfth Workshop on the Economics of Information Security, Washington, DC, United States, Allan Friedman, June 2013.

    http://hal.inria.fr/hal-00832784
  • 17M. Cazorla, K. Marquet, M. Minier.

    Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, in: SECRYPT 2013 - Proceedings of the International Conference on Security and Cryptography, Reykjavik, Iceland, SciTePress, 2013, pp. 543-548.

    http://hal.inria.fr/hal-00918974
  • 18A. Chaabane, Y. Ding, R. Dey, M. Ali Kaafar, K. Ross.

    A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?, in: Passive and Active Measurement conference, Springer, March 2014.

    http://hal.inria.fr/hal-00939175
  • 19M. Cunche.

    I know your MAC Address: Targeted tracking of individual using Wi-Fi, in: International Symposium on Research in Grey-Hat Hacking - GreHack, Grenoble, France, November 2013.

    http://hal.inria.fr/hal-00858324
  • 20M. Cunche, C. Lauradoux, M. Minier, R. Boreli.

    Private and Resilient Data Aggregation, in: IEEE Conference on Local Computer Networks - LCN, Sydney, Australia, IEEE, October 2013.

    http://hal.inria.fr/hal-00915770
  • 21G. Gössler, D. Le Métayer.

    A General Trace-Based Framework of Logical Causality, in: FACS - 10th International Symposium on Formal Aspects of Component Software - 2013, Nanchang, China, 2013.

    http://hal.inria.fr/hal-00924048
  • 22C. Lauradoux, H. Hossayni, C. Hennebert.

    Entropy harvesting from physical sensors, in: ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, ACM, April 2013. [ DOI : 10.1145/2462096.2462122 ]

    http://hal.inria.fr/hal-00915722
  • 23M. Minier.

    On the security ofPiccolo lightweight block cipher against related-key impossible differentials, in: Progress in Cryptology - INDOCRYPT 2013, Mumbay, India, Springer, 2013, vol. 8250, pp. 308-318. [ DOI : 10.1007/978-3-319-03515-4_21 ]

    http://hal.inria.fr/hal-00918965
  • 24M. Minier, G. Thomas.

    An Integral Distinguisher on Grøstl-512 v3, in: 14th International Conference on Cryptology in India, Bombay, India, G. Paul, S. Vaudenay (editors), Lecture Notes in Computer Science, Springer International Publishing, 2013, vol. 8250, pp. 50-59, Print ISBN : 978-3-319-03514-7. [ DOI : 10.1007/978-3-319-03515-4_4 ]

    http://hal.inria.fr/hal-00913902
  • 25L. Olejnik, C. Castelluccia.

    Towards Web-based Biometric Systems Using Personal Browsing Interests, in: The 8th International Conference on Availability, Reliability and Security (ARES 2014), Regensburg, Germany, September 2013, pp. 274-280. [ DOI : 10.1109/ARES.2013.36 ]

    http://hal.inria.fr/hal-00917046
  • 26V. Roca, M. Cunche, C. Thienot, J. Detchart, J. Lacan.

    RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance, in: 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2013), Lyon, France, A. Benslimane (editor), IEEE, August 2013.

    http://hal.inria.fr/hal-00850118
  • 27D. Wang, H. Park, G. Xie, S. Moon, M. A. Kaafar, S. Kavé.

    A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model, in: Proceedings IEEE INFOCOM, 2013, TOrino, Italy, April 2013, pp. 2391 - 2399. [ DOI : 10.1109/INFCOM.2013.6567044 ]

    http://hal.inria.fr/hal-00945461

National Conferences with Proceedings

  • 28M. Cunche, L. Demir, C. Lauradoux.

    Anonymization for Small Domains: the case of MAC address, in: Atelier sur la Protection de la Vie Privée - APVP 2013, Les Loges en Josas, France, June 2013.

    http://hal.inria.fr/hal-00915789

Scientific Books (or Scientific Book chapters)

  • 29D. Butin, M. Chicote, D. Le Métayer.

    Strong Accountability: Beyond Vague Promises, in: Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, S. Gutwirth, R. Leenes, P. De Hert (editors), Springer, 2014, pp. 343-369. [ DOI : 10.1007/978-94-007-7540-4_16 ]

    http://hal.inria.fr/hal-00917350

Internal Reports

  • 30D. Butin, D. Le Métayer.

    Log Analysis for Data Protection Accountability (Extended Version), Inria, December 2013, no RR-8432, 18 p.

    http://hal.inria.fr/hal-00921156
  • 31M. Cunche, C. Lauradoux, M. Minier.

    Private and Resilient Data Aggregation, Inria, July 2013, no RR-8330.

    http://hal.inria.fr/hal-00842914
  • 32G. Gössler, D. Le Métayer.

    A General Trace-Based Framework of Logical Causality, Inria, October 2013, no RR-8378.

    http://hal.inria.fr/hal-00873665
  • 33D. Le Métayer.

    Privacy by Design: a Formal Framework for the Analysis of Architectural Choices (extended version), Inria, February 2013, no RR-8229, 24 p.

    http://hal.inria.fr/hal-00788584

Scientific Popularization

  • 34M. Cunche.

    Quand les terminaux mobiles jouent les mouchards de poche, in: Podcast Interstices, September 2013.

    http://hal.inria.fr/hal-00918398
  • 35M. Cunche.

    Smartphone, Wi-Fi et vie privée : comment votre smartphone peut se révéler être votre pire ennemi, in: Multi-system & Internet Security Cookbook (MISC), October 2013, no 8.

    http://hal.inria.fr/hal-00874078

Other Publications

  • 36J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca.

    Privacy and Smartphones, in: CAPPRIS project reunion, Lyon, France, September 2013.

    http://hal.inria.fr/hal-00915771
  • 37J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca.

    Smartphones: Privacy Standpoint, in: Workshop on security and privacy for location-based services - EIT ICT Labs, Saarbrücken, Germany, December 2013, 30 p.

    http://hal.inria.fr/hal-00915756
  • 38L. Demir.

    Wi-Fi tracking : what about privacy, M2 SCCI Security, Cryptologyand Coding of Information - UFR IMAG, Grenoble, September 2013, 25 p.

    http://hal.inria.fr/hal-00859013
  • 39L. Jacquin, V. Roca, J.-L. Roch.

    ICMP: an Attack Vector against IPsec Gateways, 2013.

    http://hal.inria.fr/hal-00879997
  • 40C. Lauradoux, L. Demir.

    Guesswork, October 2013, Multi-system & Internet Security Cookbook (MISC).

    http://hal.inria.fr/hal-00915782
  • 41L. Olejnik, T. Minh-Dung, C. Castelluccia.

    Selling Off Privacy at Auction, December 2013.

    http://hal.inria.fr/hal-00915249
  • 42V. Roca, J. Achara, J.-D. Lefruit, C. Castelluccia.

    The Mobilitics Inria-CNIL project: privacy and smartphones, in: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI 2013), Mont-de-Marsan, France, September 2013.

    http://hal.inria.fr/hal-00915884
  • 43V. Roca, J. Achara, J.-D. Lefruit, C. Castelluccia.

    The Mobilitics Inria-CNIL project: privacy and smartphones, in: Métroscope : l'observatoire scientifique d'Internet, Paris, France, July 2013.

    http://hal.inria.fr/hal-00915905
  • 44V. Roca, B. Adamson.

    FCAST: Object Delivery for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, July 2013, Internet Engineering Task Force (IETF) Request for Comments 6968 (RFC 6968).

    http://hal.inria.fr/hal-00844825
  • 45V. Roca, K. Matsuzono.

    Not so random RLC AL-FEC codes, in: IETF88 - NWCRG meeting, Vancouver, Canada, November 2013.

    http://hal.inria.fr/hal-00879834