Hierarchical mobile IPv6 mobility management (HMIPv6) H Soliman, C Castelluccia, K El Malki, L Bellier | 1931* | 2005 |
Differentiation mechanisms for IEEE 802.11 I Aad, C Castelluccia Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 907 | 2001 |
Efficient aggregation of encrypted data in wireless sensor networks C Castelluccia, E Mykletun, G Tsudik The second annual international conference on mobile and ubiquitous systems …, 2005 | 749 | 2005 |
Extending SAT solvers to cryptographic problems M Soos, K Nohl, C Castelluccia Theory and Applications of Satisfiability Testing-SAT 2009: 12th …, 2009 | 606 | 2009 |
I Have a DREAM!(DiffeRentially privatE smArt Metering). G Ács, C Castelluccia Information hiding 6958, 118-132, 2011 | 476 | 2011 |
Efficient and provably secure aggregation of encrypted data in wireless sensor networks C Castelluccia, ACF Chan, E Mykletun, G Tsudik ACM Transactions on Sensor Networks (TOSN) 5 (3), 1-36, 2009 | 397 | 2009 |
Code injection attacks on harvard-architecture devices A Francillon, C Castelluccia Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 365 | 2008 |
Differentially private sequential data publication via variable-length n-grams R Chen, G Acs, C Castelluccia Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 308 | 2012 |
How unique and traceable are usernames? D Perito, C Castelluccia, MA Kaafar, P Manils Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 301 | 2011 |
Proximity-based access control for implantable medical devices KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 282 | 2009 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 262 | 2009 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 232 | 2012 |
Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses G Montenegro Proc. NDSS02, 2002 | 221 | 2002 |
Ephpub: Toward robust ephemeral publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar 2011 19th IEEE International Conference on Network Protocols, 165-175, 2011 | 213 | 2011 |
HMIPv6: A hierarchical mobile IPv6 proposal C Castelluccia ACM SIGMOBILE Mobile Computing and Communications Review 4 (1), 48-59, 2000 | 210 | 2000 |
Differentially private histogram publishing through lossy compression G Acs, C Castelluccia, R Chen 2012 IEEE 12th International Conference on Data Mining, 1-10, 2012 | 191 | 2012 |
Shake them up! a movement-based pairing protocol for cpu-constrained devices C Castelluccia, P Mutaf Proceedings of the 3rd international conference on Mobile systems …, 2005 | 187 | 2005 |
Secret Handshakes from CA-Oblivious Encryption. C Castelluccia, S Jarecki, G Tsudik Asiacrypt 3329, 293-307, 2004 | 158 | 2004 |
Selling off privacy at auction L Olejnik, T Minh-Dung, C Castelluccia | 152 | 2013 |
Defending embedded systems against control flow attacks A Francillon, D Perito, C Castelluccia Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009 | 133 | 2009 |