Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
-
1L. Jacquin.
Compromis performance/sécurité des passerelles très haut débit pour Internet., Université de Grenoble, November 2013.
http://hal.inria.fr/tel-00911075 -
2V. Roca.
Codes AL-FEC et protocoles de diffusion robuste de contenus : composants pour des services performants et passant à l'échelle, Université de Grenoble, April 2014, version 1.0, 30 décembre 2013.
http://hal.inria.fr/tel-00925955
Articles in International Peer-Reviewed Journals
-
3A. Chaabane, E. De Cristofaro, M. A. Kaafar, E. Uzun.
Privacy in Content-Oriented Networking: Threats and Countermeasures, in: ACM Computer Communication Review, July 2013, pp. 167–174.
http://hal.inria.fr/hal-00939179 -
4M. Cunche.
I know your MAC address: targeted tracking of individual using Wi-Fi, in: Journal of Computer Virology and Hacking Techniques, December 2013. [ DOI : 10.1007/s11416-013-0196-1 ]
http://hal.inria.fr/hal-00923467 -
5M. Cunche, M. A. Kaafar, R. Boreli.
Linking wireless devices using information contained in Wi-Fi probe requests, in: Pervasive and Mobile Computing, 2013. [ DOI : 10.1016/j.pmcj.2013.04.001 ]
http://hal.inria.fr/hal-00816374 -
6L. Olejnik, C. Castelluccia, A. Janc.
On the Uniqueness of Web Browsing History Patterns, in: Annales des Télécommunications, September 2013. [ DOI : 10.1007/s12243-013-0392-5 ]
http://hal.inria.fr/hal-00917042 -
7Y. Zhang, M. Minier.
How network coding system constrains packet pollution attacks in wireless sensor networks, in: IJGUC - International Journal of Grid and Utility Computing, 2013, vol. 4, no 2/3, pp. 197-203.
http://hal.inria.fr/hal-00918953 -
8W. Znaidi, M. Minier, S. Ubéda.
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks, in: IJDSN - International Journal of Distributed Sensor Networks, 2013, vol. 2013, 12 p. p. [ DOI : 10.1155/2013/745069 ]
http://hal.inria.fr/hal-00918969
Articles in Non Peer-Reviewed Journals
-
9J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca, F. Baudot, G. Delcroix.
Mobilitics: Analyzing Privacy Leaks in Smartphones, in: ERCIM Newsletter, April 2013.
http://hal.inria.fr/hal-00917417 -
10M. Cunche, M. A. Kaafar, R. Boreli.
Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones, in: ERCIM News, April 2013, no 93, pp. 33-34.
http://hal.inria.fr/hal-00818202
International Conferences with Proceedings
-
11J. Achara, J.-D. Lefruit, V. Roca, C. Castelluccia.
Detecting Privacy Leaks in the RATP App: how we proceeded and what we found, in: GREHACK 2013, Grenoble, France, Guillaume Jeanne, November 2013, to appear also in Springer Journal of Computer Virology and Hacking Techniques (JCVHT).
http://hal.inria.fr/hal-00872967 -
12J. Y. Bae, C. Castelluccia, C. Lauradoux, F. Rousseau.
Distributed Key Certification using Accumulators for Wireless Sensor Networks, in: International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MOBIQUITOUS 2013, Tokyo, Japan, Springer, December 2013.
http://hal.inria.fr/hal-00915741 -
13T. P. Berger, M. Minier, G. Thomas.
Extended Generalized Feistel Networks using Matrix Representation, in: Selected Areas in Cryptography 2013, Burnaby, British Columbia, Canada, L. R. Knudsen, H. Wu (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7707, pp. 355-371.
http://hal.inria.fr/hal-00913881 -
14D. Butin, M. Chicote, D. Le Métayer.
Log Design for Accountability, in: DUMA13 - 4th International Workshop on Data Usage Management - 2013, San Francisco, United States, May 2013. [ DOI : 10.1109/SPW.2013.26 ]
http://hal.inria.fr/hal-00799100 -
15D. Butin, D. Gray, G. Bella.
Towards Verifying Voter Privacy Through Unlinkability, in: ESSoS13 - International Symposium on Engineering Secure Software and Systems - 2013, Rocquencourt, France, Lecture Notes in Computer Science, Springer, March 2013, pp. 91-106. [ DOI : 10.1007/978-3-642-36563-8_7 ]
http://hal.inria.fr/hal-00766201 -
16C. Castelluccia, S. Grumbach, L. Olejnik.
Data Harvesting 2.0: from the Visible to the Invisible Web, in: The Twelfth Workshop on the Economics of Information Security, Washington, DC, United States, Allan Friedman, June 2013.
http://hal.inria.fr/hal-00832784 -
17M. Cazorla, K. Marquet, M. Minier.
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks, in: SECRYPT 2013 - Proceedings of the International Conference on Security and Cryptography, Reykjavik, Iceland, SciTePress, 2013, pp. 543-548.
http://hal.inria.fr/hal-00918974 -
18A. Chaabane, Y. Ding, R. Dey, M. Ali Kaafar, K. Ross.
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?, in: Passive and Active Measurement conference, Springer, March 2014.
http://hal.inria.fr/hal-00939175 -
19M. Cunche.
I know your MAC Address: Targeted tracking of individual using Wi-Fi, in: International Symposium on Research in Grey-Hat Hacking - GreHack, Grenoble, France, November 2013.
http://hal.inria.fr/hal-00858324 -
20M. Cunche, C. Lauradoux, M. Minier, R. Boreli.
Private and Resilient Data Aggregation, in: IEEE Conference on Local Computer Networks - LCN, Sydney, Australia, IEEE, October 2013.
http://hal.inria.fr/hal-00915770 -
21G. Gössler, D. Le Métayer.
A General Trace-Based Framework of Logical Causality, in: FACS - 10th International Symposium on Formal Aspects of Component Software - 2013, Nanchang, China, 2013.
http://hal.inria.fr/hal-00924048 -
22C. Lauradoux, H. Hossayni, C. Hennebert.
Entropy harvesting from physical sensors, in: ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, ACM, April 2013. [ DOI : 10.1145/2462096.2462122 ]
http://hal.inria.fr/hal-00915722 -
23M. Minier.
On the security ofPiccolo lightweight block cipher against related-key impossible differentials, in: Progress in Cryptology - INDOCRYPT 2013, Mumbay, India, Springer, 2013, vol. 8250, pp. 308-318. [ DOI : 10.1007/978-3-319-03515-4_21 ]
http://hal.inria.fr/hal-00918965 -
24M. Minier, G. Thomas.
An Integral Distinguisher on Grøstl-512 v3, in: 14th International Conference on Cryptology in India, Bombay, India, G. Paul, S. Vaudenay (editors), Lecture Notes in Computer Science, Springer International Publishing, 2013, vol. 8250, pp. 50-59, Print ISBN : 978-3-319-03514-7. [ DOI : 10.1007/978-3-319-03515-4_4 ]
http://hal.inria.fr/hal-00913902 -
25L. Olejnik, C. Castelluccia.
Towards Web-based Biometric Systems Using Personal Browsing Interests, in: The 8th International Conference on Availability, Reliability and Security (ARES 2014), Regensburg, Germany, September 2013, pp. 274-280. [ DOI : 10.1109/ARES.2013.36 ]
http://hal.inria.fr/hal-00917046 -
26V. Roca, M. Cunche, C. Thienot, J. Detchart, J. Lacan.
RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance, in: 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2013), Lyon, France, A. Benslimane (editor), IEEE, August 2013.
http://hal.inria.fr/hal-00850118 -
27D. Wang, H. Park, G. Xie, S. Moon, M. A. Kaafar, S. Kavé.
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model, in: Proceedings IEEE INFOCOM, 2013, TOrino, Italy, April 2013, pp. 2391 - 2399. [ DOI : 10.1109/INFCOM.2013.6567044 ]
http://hal.inria.fr/hal-00945461
National Conferences with Proceedings
-
28M. Cunche, L. Demir, C. Lauradoux.
Anonymization for Small Domains: the case of MAC address, in: Atelier sur la Protection de la Vie Privée - APVP 2013, Les Loges en Josas, France, June 2013.
http://hal.inria.fr/hal-00915789
Scientific Books (or Scientific Book chapters)
-
29D. Butin, M. Chicote, D. Le Métayer.
Strong Accountability: Beyond Vague Promises, in: Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, S. Gutwirth, R. Leenes, P. De Hert (editors), Springer, 2014, pp. 343-369. [ DOI : 10.1007/978-94-007-7540-4_16 ]
http://hal.inria.fr/hal-00917350
Internal Reports
-
30D. Butin, D. Le Métayer.
Log Analysis for Data Protection Accountability (Extended Version), Inria, December 2013, no RR-8432, 18 p.
http://hal.inria.fr/hal-00921156 -
31M. Cunche, C. Lauradoux, M. Minier.
Private and Resilient Data Aggregation, Inria, July 2013, no RR-8330.
http://hal.inria.fr/hal-00842914 -
32G. Gössler, D. Le Métayer.
A General Trace-Based Framework of Logical Causality, Inria, October 2013, no RR-8378.
http://hal.inria.fr/hal-00873665 -
33D. Le Métayer.
Privacy by Design: a Formal Framework for the Analysis of Architectural Choices (extended version), Inria, February 2013, no RR-8229, 24 p.
http://hal.inria.fr/hal-00788584
Scientific Popularization
-
34M. Cunche.
Quand les terminaux mobiles jouent les mouchards de poche, in: Podcast Interstices, September 2013.
http://hal.inria.fr/hal-00918398 -
35M. Cunche.
Smartphone, Wi-Fi et vie privée : comment votre smartphone peut se révéler être votre pire ennemi, in: Multi-system & Internet Security Cookbook (MISC), October 2013, no 8.
http://hal.inria.fr/hal-00874078
Other Publications
-
36J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca.
Privacy and Smartphones, in: CAPPRIS project reunion, Lyon, France, September 2013.
http://hal.inria.fr/hal-00915771 -
37J. Achara, C. Castelluccia, J.-D. Lefruit, V. Roca.
Smartphones: Privacy Standpoint, in: Workshop on security and privacy for location-based services - EIT ICT Labs, Saarbrücken, Germany, December 2013, 30 p.
http://hal.inria.fr/hal-00915756 -
38L. Demir.
Wi-Fi tracking : what about privacy, M2 SCCI Security, Cryptologyand Coding of Information - UFR IMAG, Grenoble, September 2013, 25 p.
http://hal.inria.fr/hal-00859013 -
39L. Jacquin, V. Roca, J.-L. Roch.
ICMP: an Attack Vector against IPsec Gateways, 2013.
http://hal.inria.fr/hal-00879997 -
40C. Lauradoux, L. Demir.
Guesswork, October 2013, Multi-system & Internet Security Cookbook (MISC).
http://hal.inria.fr/hal-00915782 -
41L. Olejnik, T. Minh-Dung, C. Castelluccia.
Selling Off Privacy at Auction, December 2013.
http://hal.inria.fr/hal-00915249 -
42V. Roca, J. Achara, J.-D. Lefruit, C. Castelluccia.
The Mobilitics Inria-CNIL project: privacy and smartphones, in: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI 2013), Mont-de-Marsan, France, September 2013.
http://hal.inria.fr/hal-00915884 -
43V. Roca, J. Achara, J.-D. Lefruit, C. Castelluccia.
The Mobilitics Inria-CNIL project: privacy and smartphones, in: Métroscope : l'observatoire scientifique d'Internet, Paris, France, July 2013.
http://hal.inria.fr/hal-00915905 -
44V. Roca, B. Adamson.
FCAST: Object Delivery for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, July 2013, Internet Engineering Task Force (IETF) Request for Comments 6968 (RFC 6968).
http://hal.inria.fr/hal-00844825 -
45V. Roca, K. Matsuzono.
Not so random RLC AL-FEC codes, in: IETF88 - NWCRG meeting, Vancouver, Canada, November 2013.
http://hal.inria.fr/hal-00879834