Claude Castelluccia
Claude Castelluccia
Research Director, Inria
Verified email at inria.fr
Title
Cited by
Cited by
Year
Hierarchical mobile IPv6 mobility management (HMIPv6)
H Soliman, C Castelluccia, K El Malki, L Bellier
RFC 4140, august, 2005
2840*2005
Differentiation mechanisms for IEEE 802.11
I Aad, C Castelluccia
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
8622001
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
The second annual international conference on mobile and ubiquitous systems …, 2005
6642005
Extending SAT solvers to cryptographic problems
M Soos, K Nohl, C Castelluccia
International Conference on Theory and Applications of Satisfiability …, 2009
3892009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
C Castelluccia, ACF Chan, E Mykletun, G Tsudik
ACM Transactions on Sensor Networks (TOSN) 5 (3), 1-36, 2009
3352009
I have a dream!(differentially private smart metering)
G Ács, C Castelluccia
International Workshop on Information Hiding, 118-132, 2011
3162011
Code injection attacks on harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2952008
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
2242011
Proximity-based access control for implantable medical devices
KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2232009
Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses
G Montenegro, C Castelluccia
In Proceedings of the 9th Annual Network and Distributed System Security …, 2002
2062002
HMIPv6: A hierarchical mobile IPv6 proposal
C Castelluccia
ACM SIGMOBILE Mobile Computing and Communications Review 4 (1), 48-59, 2000
2052000
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2012009
Differentially private sequential data publication via variable-length n-grams
R Chen, G Acs, C Castelluccia
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1972012
Shake them up! a movement-based pairing protocol for cpu-constrained devices
C Castelluccia, P Mutaf
Proceedings of the 3rd international conference on Mobile systems …, 2005
1722005
Adaptive Password-Strength Meters from Markov Models.
C Castelluccia, M Dürmuth, D Perito
NDSS, 2012
1652012
Secret handshakes from ca-oblivious encryption
C Castelluccia, S Jarecki, G Tsudik
International Conference on the Theory and Application of Cryptology and …, 2004
1372004
Differentially private histogram publishing through lossy compression
G Acs, C Castelluccia, R Chen
2012 IEEE 12th International Conference on Data Mining, 1-10, 2012
1282012
Flexible network support for mobility
X Zhao, C Castelluccia, M Baker
Proceedings of the 4th annual ACM/IEEE international conference on Mobile …, 1998
1241998
Noisy tags: A pretty good key exchange protocol for RFID tags
C Castelluccia, G Avoine
International Conference on Smart Card Research and Advanced Applications …, 2006
1152006
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
1102009
The system can't perform the operation now. Try again later.
Articles 1–20