Claude Castelluccia
Claude Castelluccia
Research Director, Inria
Adresse e-mail validée de inria.fr
Titre
Citée par
Citée par
Année
Hierarchical mobile IPv6 mobility management (HMIPv6)
H Soliman, C Castelluccia, K El Malki, L Bellier
RFC 4140, august, 2005
2840*2005
Differentiation mechanisms for IEEE 802.11
I Aad, C Castelluccia
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
8622001
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
The second annual international conference on mobile and ubiquitous systems …, 2005
6642005
Extending SAT solvers to cryptographic problems
M Soos, K Nohl, C Castelluccia
International Conference on Theory and Applications of Satisfiability …, 2009
3892009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
C Castelluccia, ACF Chan, E Mykletun, G Tsudik
ACM Transactions on Sensor Networks (TOSN) 5 (3), 1-36, 2009
3352009
I have a dream!(differentially private smart metering)
G Ács, C Castelluccia
International Workshop on Information Hiding, 118-132, 2011
3162011
Code injection attacks on harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2952008
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
2242011
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2232009
Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses
G Montenegro, C Castelluccia
In Proceedings of the 9th Annual Network and Distributed System Security …, 2002
2062002
HMIPv6: A hierarchical mobile IPv6 proposal
C Castelluccia
ACM SIGMOBILE Mobile Computing and Communications Review 4 (1), 48-59, 2000
2052000
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2012009
Differentially private sequential data publication via variable-length n-grams
R Chen, G Acs, C Castelluccia
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1972012
Shake them up! a movement-based pairing protocol for cpu-constrained devices
C Castelluccia, P Mutaf
Proceedings of the 3rd international conference on Mobile systems …, 2005
1722005
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1652012
Secret handshakes from ca-oblivious encryption
C Castelluccia, S Jarecki, G Tsudik
International Conference on the Theory and Application of Cryptology and …, 2004
1372004
Differentially private histogram publishing through lossy compression
G Acs, C Castelluccia, R Chen
2012 IEEE 12th International Conference on Data Mining, 1-10, 2012
1282012
Flexible network support for mobility
X Zhao, C Castelluccia, M Baker
Proceedings of the 4th annual ACM/IEEE international conference on Mobile …, 1998
1241998
Noisy tags: A pretty good key exchange protocol for RFID tags
C Castelluccia, G Avoine
International Conference on Smart Card Research and Advanced Applications …, 2006
1152006
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
1102009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20