default search action
Claude Castelluccia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j26]Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradoux, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy:
Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems. DTRAP 3(3): 28:1-28:20 (2022) - [c69]Nina Grgic-Hlaca, Claude Castelluccia, Krishna P. Gummadi:
Taking Advice from (Dis)Similar Machines: The Impact of Human-Machine Similarity on Machine-Assisted Decision-Making. HCOMP 2022: 74-88 - [i34]Nina Grgic-Hlaca, Claude Castelluccia, Krishna P. Gummadi:
Taking Advice from (Dis)Similar Machines: The Impact of Human-Machine Similarity on Machine-Assisted Decision-Making. CoRR abs/2209.03821 (2022) - 2021
- [c68]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction. CHIL 2021: 25-35 - [c67]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Compression Boosts Differentially Private Federated Learning. EuroS&P 2021: 304-318 - [c66]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Constrained differentially private federated learning for low-bandwidth devices. UAI 2021: 1756-1765 - [i33]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Constrained Differentially Private Federated Learning for Low-bandwidth Devices. CoRR abs/2103.00342 (2021) - [i32]Marcello Ienca, Joseph J. Fins, Ralf J. Jox, Fabrice Jotterand, Silja Voeneky, Roberto Andorno, Tonio Ball, Claude Castelluccia, Ricardo Chavarriaga, Hervé Chneiweiss, Agata Ferretti, Orsolya Friedrich, Samia Hurst, Grischa Merkel, Fruzsina Molnár-Gábor, Jean-Marc Rickli, James Scheibner, Effy Vayena, Rafael Yuste, Philipp Kellmeyer:
Towards a Governance Framework for Brain Data. CoRR abs/2109.11960 (2021) - 2020
- [c65]Claude Castelluccia, Daniel Le Métayer:
Position Paper: Analyzing the Impacts of Facial Recognition. APF 2020: 43-57 - [i31]Benjamin Nguyen, Claude Castelluccia:
Techniques d'anonymisation tabulaire : concepts et mise en oeuvre. CoRR abs/2001.02650 (2020) - [i30]Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca:
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems. CoRR abs/2008.01621 (2020) - [i29]Raouf Kerkouche, Gergely Ács, Claude Castelluccia:
Federated Learning in Adversarial Settings. CoRR abs/2010.07808 (2020) - [i28]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Compression Boosts Differentially Private Federated Learning. CoRR abs/2011.05578 (2020)
2010 – 2019
- 2019
- [j25]Gergely Ács, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro:
Differentially Private Mixture of Generative Neural Networks. IEEE Trans. Knowl. Data Eng. 31(6): 1109-1121 (2019) - [c64]Ali Kassem, Gergely Ács, Claude Castelluccia, Catuscia Palamidessi:
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets. IEEE Symposium on Security and Privacy Workshops 2019: 72-79 - [p2]Silvia Giordano, Victor Morel, Melek Önen, Mirco Musolesi, Davide Andreoletti, Felipe Cardoso, Alan Ferrari, Luca Luceri, Claude Castelluccia, Daniel Le Métayer, Cédric Van Rompay, Benjamin Baron:
UPRISE-IoT: User-Centric Privacy & Security in the IoT. Security and Privacy in the Internet of Things 2019: 44-60 - 2018
- [j24]Javier Parra-Arnau, Claude Castelluccia:
On the Cost-Effectiveness of Mass Surveillance. IEEE Access 6: 46538-46557 (2018) - [j23]Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:
Fine-Grained Control over Tracking to Support the Ad-Based Web Economy. ACM Trans. Internet Techn. 18(4): 51:1-51:25 (2018) - [c63]Claude Castelluccia, Mathieu Cunche, Daniel Le Métayer, Victor Morel:
Enhancing Transparency and Consent in the IoT. EuroS&P Workshops 2018: 116-119 - [c62]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins. WPES@CCS 2018: 14-27 - [r1]Gergely Ács, Gergely Biczók, Claude Castelluccia:
Privacy-Preserving Release of Spatio-Temporal Density. Handbook of Mobile Data Privacy 2018: 307-335 - [i27]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins. CoRR abs/1808.07359 (2018) - 2017
- [j22]Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia:
MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11(1): 7:1-7:47 (2017) - [c61]Gergely Ács, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro:
Differentially Private Mixture of Generative Neural Networks. ICDM 2017: 715-720 - [c60]Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz:
Towards Implicit Visual Memory-Based Authentication. NDSS 2017 - [i26]Gergely Ács, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro:
Differentially Private Mixture of Generative Neural Networks. CoRR abs/1709.04514 (2017) - 2016
- [j21]Gábor György Gulyás, Gergely Ács, Claude Castelluccia:
Near-Optimal Fingerprinting with Constraints. Proc. Priv. Enhancing Technol. 2016(4): 470-487 (2016) - [i25]Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia:
MyAdChoices: Bringing Transparency and Control to Online Advertising. CoRR abs/1602.02046 (2016) - [i24]Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:
MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences. CoRR abs/1604.04495 (2016) - [i23]Jagdish Prasad Achara, Vincent Roca, Claude Castelluccia, Aurélien Francillon:
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. CoRR abs/1605.08357 (2016) - [i22]Gábor György Gulyás, Gergely Ács, Claude Castelluccia:
Near-Optimal Fingerprinting with Constraints. CoRR abs/1605.08664 (2016) - 2015
- [c59]Gergely Ács, Jagdish Prasad Achara, Claude Castelluccia:
Probabilistic km-anonymity efficient anonymization of large set-valued datasets. IEEE BigData 2015: 1164-1173 - [c58]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API. DPM/QASA@ESORICS 2015: 254-263 - [c57]Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. ESSoS 2015: 119-132 - [c56]Jagdish Prasad Achara, Gergely Ács, Claude Castelluccia:
On the Unicity of Smartphone Applications. WPES@CCS 2015: 27-36 - [i21]Jagdish Prasad Achara, Gergely Ács, Claude Castelluccia:
On the Unicity of Smartphone Applications. CoRR abs/1507.07851 (2015) - [i20]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. IACR Cryptol. ePrint Arch. 2015: 616 (2015) - 2014
- [j20]Lukasz Olejnik, Claude Castelluccia, Artur Janc:
On the uniqueness of Web browsing history patterns. Ann. des Télécommunications 69(1-2): 63-74 (2014) - [j19]Jagdish Prasad Achara, James-Douglass Lefruit, Vincent Roca, Claude Castelluccia:
Detecting privacy leaks in the RATP App: how we proceeded and what we found. J. Comput. Virol. Hacking Tech. 10(4): 229-238 (2014) - [c55]Gergely Ács, Claude Castelluccia:
A case study: privacy preserving release of spatio-temporal density in paris. KDD 2014: 1679-1688 - [c54]Lukasz Olejnik, Minh-Dung Tran, Claude Castelluccia:
Selling off User Privacy at Auction. NDSS 2014 - [e2]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - [i19]Minh-Dung Tran, Gergely Ács, Claude Castelluccia:
Retargeting Without Tracking. CoRR abs/1404.4533 (2014) - [i18]Claude Castelluccia, Markus Dürmuth, Fatma Imamoglu:
Learning from Neuroscience to Improve Internet Security. ERCIM News 2014(99) (2014) - 2013
- [c53]Lukasz Olejnik, Claude Castelluccia:
Towards Web-Based Biometric Systems Using Personal Browsing Interests. ARES 2013: 274-280 - [c52]Jun-Young Bae, Claude Castelluccia, Cédric Lauradoux, Franck Rousseau:
Distributed Key Certification Using Accumulators for Wireless Sensor Networks. MobiQuitous 2013: 500-511 - [c51]Sana Tmar Ben Hamida, Pierre-Henri Thevenon, Jean-Benoît Pierrot, Olivier Savry, Claude Castelluccia:
Detecting relay attacks in RFID systems using physical layer characteristics. WMNC 2013: 1-8 - [i17]Claude Castelluccia, Chaabane Abdelberi, Markus Dürmuth, Daniele Perito:
When Privacy meets Security: Leveraging personal information for password cracking. CoRR abs/1304.6584 (2013) - [i16]Jagdish Prasad Achara, Franck Baudot, Claude Castelluccia, Geoffrey Delcroix, Vincent Roca:
Mobilitics: Analyzing Privacy Leaks in Smartphones. ERCIM News 2013(93) (2013) - 2012
- [c50]Rui Chen, Gergely Ács, Claude Castelluccia:
Differentially private sequential data publication via variable-length n-grams. CCS 2012: 638-649 - [c49]Gergely Ács, Claude Castelluccia, Rui Chen:
Differentially Private Histogram Publishing through Lossy Compression. ICDM 2012: 1-10 - [c48]Claude Castelluccia, Markus Dürmuth, Daniele Perito:
Adaptive Password-Strength Meters from Markov Models. NDSS 2012 - [c47]Claude Castelluccia, Mohamed Ali Kâafar, Minh-Dung Tran:
Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads. Privacy Enhancing Technologies 2012: 1-17 - [c46]Sana Tmar-Ben Hamida, Jean-Benoît Pierrot, Benoît Denis, Claude Castelluccia, Bernard Uguen:
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks. VTC Fall 2012: 1-5 - [p1]Claude Castelluccia:
Behavioural Tracking on the Internet: A Technical Perspective. European Data Protection 2012: 21-33 - [i15]Gergely Ács, Claude Castelluccia:
DREAM: DiffeRentially privatE smArt Metering. CoRR abs/1201.2531 (2012) - 2011
- [j18]Md. Borhan Uddin, Claude Castelluccia:
Towards clock skew based services in wireless sensor networks. Int. J. Sens. Networks 9(1): 24-37 (2011) - [j17]Aldar C.-F. Chan, Claude Castelluccia:
A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans. Sens. Networks 7(4): 29:1-29:45 (2011) - [c45]Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar:
EphPub: Toward robust Ephemeral Publishing. ICNP 2011: 165-175 - [c44]Gergely Ács, Claude Castelluccia:
I Have a DREAM! (DiffeRentially privatE smArt Metering). Information Hiding 2011: 118-132 - [c43]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - [c42]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable Are Usernames? PETS 2011: 1-17 - [c41]Gergely Ács, Claude Castelluccia, William Lecat:
Protecting against physical resource monitoring. WPES 2011: 23-32 - [i14]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable are Usernames? CoRR abs/1101.5578 (2011) - [i13]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. CoRR abs/1103.1518 (2011) - 2010
- [j16]Steffen Peter, Dirk Westhoff, Claude Castelluccia:
A Survey on the Encryption of Convergecast Traffic with In-Network Processing. IEEE Trans. Dependable Secur. Comput. 7(1): 20-34 (2010) - [c40]Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito:
Private Information Disclosure from Web Searches. Privacy Enhancing Technologies 2010: 38-55 - [c39]Sana Tmar Ben Hamida, Jean-Benoît Pierrot, Claude Castelluccia:
Empirical analysis of UWB channel characteristics for secret key generation in indoor environments. PIMRC 2010: 1984-1989 - [c38]Md. Borhan Uddin, Claude Castelluccia:
Toward Clock Skew based Wireless Sensor Node Services. WICON 2010: 1-9 - [i12]Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito:
Private Information Disclosure from Web Searches. (The case of Google Web History). CoRR abs/1003.3242 (2010) - [i11]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. CoRR abs/1004.1267 (2010) - [i10]Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. CoRR abs/1004.1461 (2010)
2000 – 2009
- 2009
- [j15]Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik:
Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Networks 5(3): 20:1-20:36 (2009) - [c37]Aurélien Francillon, Daniele Perito, Claude Castelluccia:
Defending embedded systems against control flow attacks. SecuCode@CCS 2009: 19-26 - [c36]Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente:
On the difficulty of software-based attestation of embedded devices. CCS 2009: 400-409 - [c35]Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. CCS 2009: 410-419 - [c34]Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils, Daniele Perito:
Geolocalization of proxied services and its application to fast-flux hidden servers. Internet Measurement Conference 2009: 184-189 - [c33]Sana Tmar Ben Hamida, Jean-Benoît Pierrot, Claude Castelluccia:
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements. NTMS 2009: 1-5 - [c32]Claude Castelluccia, Mohamed Ali Kâafar:
Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. SAINT 2009: 169-172 - [c31]Mate Soos, Karsten Nohl, Claude Castelluccia:
Extending SAT Solvers to Cryptographic Problems. SAT 2009: 244-257 - [i9]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CoRR abs/0901.3482 (2009) - [i8]Claude Castelluccia, Mohamed Ali Kâafar:
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet. ERCIM News 2009(77) (2009) - 2008
- [b1]Claude Castelluccia:
De la mobilité à la sécurité des réseaux. Grenoble Institute of Technology, France, 2008 - [c30]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CCS 2008: 15-26 - [c29]Aldar C.-F. Chan, Claude Castelluccia:
On the (Im)possibility of aggregate message authentication codes. ISIT 2008: 235-239 - [c28]Claude Castelluccia, Claudio Soriente:
ABBA: A Balls and bins approach to secure aggregation in WSNs. WiOpt 2008: 185-191 - [i7]Hesham Soliman, Claude Castelluccia, Karim El-Malki, Ludovic Bellier:
Hierarchical Mobile IPv6 (HMIPv6) Mobility Management. RFC 5380: 1-26 (2008) - 2007
- [j14]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Robust self-keying mobile ad hoc networks. Comput. Networks 51(4): 1169-1182 (2007) - [c27]Aldar C.-F. Chan, Claude Castelluccia:
On the Privacy of Concealed Data Aggregation. ESORICS 2007: 390-405 - [c26]Claude Castelluccia:
Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks. MASS 2007: 1-9 - [c25]Claude Castelluccia, Angelo Spognardi:
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. SecureComm 2007: 351-360 - [c24]Aurélien Francillon, Claude Castelluccia:
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. WiOpt 2007: 1-7 - 2006
- [j13]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c23]Claude Castelluccia, Gildas Avoine:
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. CARDIS 2006: 289-299 - [c22]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving secure server performance by re-balancing SSL/TLS handshakes. AsiaCCS 2006: 26-34 - [c21]Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux:
Packet Coding for Strong Anonymity in Ad Hoc Networks. SecureComm 2006: 1-10 - [i6]Claude Castelluccia:
Authenticated Interleaved Encryption. IACR Cryptol. ePrint Arch. 2006: 416 (2006) - 2005
- [c20]Pars Mutaf, Claude Castelluccia:
Compact neighbor discovery: a bandwidth defense through bandwidth optimization. INFOCOM 2005: 2711-2719 - [c19]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 - [c18]Claude Castelluccia, Pars Mutaf:
Shake them up!: a movement-based pairing protocol for CPU-constrained devices. MobiSys 2005: 51-64 - [c17]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. NETWORKING 2005: 1083-1095 - [e1]Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff:
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3313, Springer 2005, ISBN 3-540-24396-8 [contents] - [i5]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. IACR Cryptol. ePrint Arch. 2005: 37 (2005) - [i4]Hesham Soliman, Claude Castelluccia, Karim El-Malki, Ludovic Bellier:
Hierarchical Mobile IPv6 Mobility Management (HMIPv6). RFC 4140: 1-29 (2005) - 2004
- [j12]Pars Mutaf, Claude Castelluccia:
Hash-Based Paging and Location Update Using Bloom Filters. Mob. Networks Appl. 9(6): 627-631 (2004) - [j11]Gabriel Montenegro, Claude Castelluccia:
Crypto-based identifiers (CBIDs): Concepts and applications. ACM Trans. Inf. Syst. Secur. 7(1): 97-127 (2004) - [j10]Claude Castelluccia:
Cryptographically Generated Addresses for Constrained Devices. Wirel. Pers. Commun. 29(3-4): 221-232 (2004) - [c16]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 - [c15]Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann:
Hindering Eavesdropping via IPv6 Opportunistic Encryption. ESORICS 2004: 309-321 - [c14]Claude Castelluccia, Francis Dupont, Gabriel Montenegro:
A Simple Privacy Extension for Mobile IPV6. MWCN 2004: 239-249 - [c13]Claude Castelluccia, Pars Mutaf:
Hash-Based Dynamic Source Routing. NETWORKING 2004: 1012-1023 - [c12]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 - [c11]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - [i3]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. IACR Cryptol. ePrint Arch. 2004: 133 (2004) - 2003
- [j9]Imad Aad, Claude Castelluccia:
EnhancingIEEE 802.11 performance in congested environments. Ann. des Télécommunications 58(3-4): 397-416 (2003) - [j8]Imad Aad, Claude Castelluccia:
Priorities in WLANs. Comput. Networks 41(4): 505-526 (2003) - [c10]Claude Castelluccia, Gabriel Montenegro:
Securing Group Management in IPv6 with Cryptographically Generated Addresses. ISCC 2003: 588-593 - 2002
- [j7]Claude Castelluccia, Gabriel Montenegro:
Protecting AODV against impersonation attacks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(3): 108-109 (2002) - [c9]Gabriel Montenegro, Claude Castelluccia:
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. NDSS 2002 - [i2]Claude Castelluccia:
How to convert any ID-based Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 116 (2002) - 2001
- [j6]Claude Castelluccia, Pars Mutaf:
An adaptive per-host IP paging architecture. Comput. Commun. Rev. 31(5): 48-56 (2001) - [j5]Xinhua Zhao, Claude Castelluccia, Mary Baker:
Flexible Network Support for Mobile Hosts. Mob. Networks Appl. 6(2): 137-149 (2001) - [j4]Claude Castelluccia:
Extending mobile IP with adaptive individual paging: a performance analysis. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(2): 14-26 (2001) - [c8]Imad Aad, Claude Castelluccia:
Differentiation Mechanisms for IEEE 802.11. INFOCOM 2001: 209-218 - [i1]James Kempf, Claude Castelluccia, Pars Mutaf, Nobuyasu Nakajima, Yoshihiro Ohba, Ramachandran Ramjee, Yousuf Saifullah, Behçet Sarikaya, Xiaofeng Xu:
Requirements and Functional Architecture for an IP Host Alerting Protocol. RFC 3154: 1-16 (2001) - 2000
- [j3]Claude Castelluccia:
HMIPv6: A hierarchical mobile IPv6 proposal. ACM SIGMOBILE Mob. Comput. Commun. Rev. 4(1): 48-59 (2000) - [c7]Claude Castelluccia:
Extending Mobile IP with Adaptive Individual Paging: A Performance Analysis. ISCC 2000: 113-118 - [c6]Imad Aad, Claude Castelluccia:
Introducing Service Differentiation into IEEE 802.11. ISCC 2000: 438-443
1990 – 1999
- 1998
- [c5]Claude Castelluccia:
Toward a Hierarchical Mobile IPv6. HPN 1998: 275-290 - [c4]Claude Castelluccia:
A hierarchical mobility management scheme for IPv6. ISCC 1998: 305-309 - [c3]Xinhua Zhao, Claude Castelluccia, Mary Baker:
Flexible Network Support for Mobility. MobiCom 1998: 145-156 - 1997
- [j2]Claude Castelluccia, Walid Dabbous, Sean W. O'Malley:
Generating efficient protocol code from an abstract specification. IEEE/ACM Trans. Netw. 5(4): 514-524 (1997) - 1996
- [c2]Walid Dabbous, Sean W. O'Malley, Claude Castelluccia:
Generating Efficient Protocol Code from an Abstract Specification. SIGCOMM 1996: 60-72 - 1994
- [c1]Claude Castelluccia, Walid Dabbous:
Modular Communication Subsystem Implementation Using A Synchronous Approach. USENIX High-Speed Networking Symposium 1994 - 1993
- [j1]Nurgun Erdol, Claude Castelluccia, Ali Zilouchian:
Recovery of missing speech packets using the short-time energy and zero-crossing measurements. IEEE Trans. Speech Audio Process. 1(3): 295-303 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint