Hierarchical mobile IPv6 mobility management (HMIPv6) H Soliman RFC4140 on IETF, 2005 | 2731* | 2005 |
Differentiation mechanisms for IEEE 802.11 I Aad, C Castelluccia Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 933 | 2001 |
Efficient aggregation of encrypted data in wireless sensor networks C Castelluccia, E Mykletun, G Tsudik The second annual international conference on mobile and ubiquitous systems …, 2005 | 779 | 2005 |
Extending SAT solvers to cryptographic problems M Soos, K Nohl, C Castelluccia International Conference on Theory and Applications of Satisfiability …, 2009 | 743 | 2009 |
I have a dream!(differentially private smart metering) G Ács, C Castelluccia International Workshop on Information Hiding, 118-132, 2011 | 532 | 2011 |
Efficient and provably secure aggregation of encrypted data in wireless sensor networks C Castelluccia, ACF Chan, E Mykletun, G Tsudik ACM Transactions on Sensor Networks (TOSN) 5 (3), 1-36, 2009 | 428 | 2009 |
Code injection attacks on harvard-architecture devices A Francillon, C Castelluccia Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 396 | 2008 |
Differentially private sequential data publication via variable-length n-grams R Chen, G Acs, C Castelluccia Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 371 | 2012 |
How unique and traceable are usernames? D Perito, C Castelluccia, MA Kaafar, P Manils International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011 | 331 | 2011 |
Ephpub: Toward robust ephemeral publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar 2011 19th IEEE International Conference on Network Protocols, 165-175, 2011 | 316 | 2011 |
Proximity-based access control for implantable medical devices KB Rasmussen, C Castelluccia, TS Heydt-Benjamin, S Capkun Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 302 | 2009 |
On the difficulty of software-based attestation of embedded devices C Castelluccia, A Francillon, D Perito, C Soriente Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 298 | 2009 |
Adaptive password-strength meters from markov models. C Castelluccia, M Dürmuth, D Perito NDSS, 2012 | 260 | 2012 |
Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses G Montenegro Proc. NDSS02, 2002 | 228 | 2002 |
Differentially private histogram publishing through lossy compression G Acs, C Castelluccia, R Chen 2012 IEEE 12th International Conference on Data Mining, 1-10, 2012 | 218 | 2012 |
HMIPv6: A hierarchical mobile IPv6 proposal C Castelluccia ACM SIGMOBILE Mobile Computing and Communications Review 4 (1), 48-59, 2000 | 215 | 2000 |
Shake them up! a movement-based pairing protocol for cpu-constrained devices C Castelluccia, P Mutaf Proceedings of the 3rd international conference on Mobile systems …, 2005 | 191 | 2005 |
On the uniqueness of web browsing history patterns L Olejnik, C Castelluccia, A Janc annals of telecommunications-annales des télécommunications 69, 63-74, 2014 | 175 | 2014 |
Differentially private mixture of generative neural networks G Acs, L Melis, C Castelluccia, E De Cristofaro IEEE Transactions on Knowledge and Data Engineering 31 (6), 1109-1121, 2018 | 166 | 2018 |
Selling off privacy at auction L Olejnik, T Minh-Dung, C Castelluccia | 164 | 2013 |