Search the dblp DataBase
Claude Castelluccia :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Claude Castelluccia , Stanislaw Jarecki , Gene Tsudik Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:293-307 [Conf ] Claude Castelluccia , Gildas Avoine Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. [Citation Graph (0, 0)][DBLP ] CARDIS, 2006, pp:289-299 [Conf ] Claude Castelluccia , Einar Mykletun , Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:26-34 [Conf ] Claude Castelluccia , Gabriel Montenegro , Julien Laganier , Christoph Neumann Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:309-321 [Conf ] Claude Castelluccia Toward a Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP ] HPN, 1998, pp:275-290 [Conf ] Imad Aad , Claude Castelluccia Differentiation Mechanisms for IEEE 802.11. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:209-218 [Conf ] Pars Mutaf , Claude Castelluccia Compact neighbor discovery: a bandwidth defense through bandwidth optimization. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:2711-2719 [Conf ] Imad Aad , Claude Castelluccia Introducing Service Differentiation into IEEE 802.11. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:438-443 [Conf ] Claude Castelluccia Extending Mobile IP with Adaptive Individual Paging: A Performance Analysis. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:113-118 [Conf ] Claude Castelluccia , Gabriel Montenegro Securing Group Management in IPv6 with Cryptographically Generated Addresses. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:588-593 [Conf ] Xinhua Zhao , Claude Castelluccia , Mary Baker Flexible Network Support for Mobility. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1998, pp:145-156 [Conf ] Claude Castelluccia , Einar Mykletun , Gene Tsudik E.cient Aggregation of encrypted data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:109-117 [Conf ] Claude Castelluccia , Pars Mutaf Shake them up!: a movement-based pairing protocol for CPU-constrained devices. [Citation Graph (0, 0)][DBLP ] MobiSys, 2005, pp:51-64 [Conf ] Claude Castelluccia , Francis Dupont , Gabriel Montenegro A Simple Privacy Extension for Mobile IPV6. [Citation Graph (0, 0)][DBLP ] MWCN, 2004, pp:239-249 [Conf ] Gabriel Montenegro , Claude Castelluccia Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Claude Castelluccia , Pars Mutaf Hash-Based Dynamic Source Routing. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2004, pp:1012-1023 [Conf ] Claude Castelluccia , Nitesh Saxena , Jeong Hyun Yi Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:1083-1095 [Conf ] Claude Castelluccia , Stanislaw Jarecki , Gene Tsudik Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:394- [Conf ] Claude Castelluccia , Stanislaw Jarecki , Jihye Kim , Gene Tsudik A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:193-207 [Conf ] Walid Dabbous , Sean W. O'Malley , Claude Castelluccia Generating Efficient Protocol Code from an Abstract Specification. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 1996, pp:60-72 [Conf ] Imad Aad , Claude Castelluccia Priorities in WLANs. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:4, pp:505-526 [Journal ] Claude Castelluccia , Stanislaw Jarecki , Jihye Kim , Gene Tsudik Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal ] Pars Mutaf , Claude Castelluccia Hash-Based Paging and Location Update Using Bloom Filters. [Citation Graph (0, 0)][DBLP ] MONET, 2004, v:9, n:6, pp:627-631 [Journal ] Xinhua Zhao , Claude Castelluccia , Mary Baker Flexible Network Support for Mobile Hosts. [Citation Graph (0, 0)][DBLP ] MONET, 2001, v:6, n:2, pp:137-149 [Journal ] Claude Castelluccia Extending mobile IP with adaptive individual paging: a performance analysis. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2001, v:5, n:2, pp:14-26 [Journal ] Claude Castelluccia , Gabriel Montenegro Protecting AODV against impersonation attacks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2002, v:6, n:3, pp:108-109 [Journal ] Gabriel Montenegro , Claude Castelluccia Crypto-based identifiers (CBIDs): Concepts and applications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:97-127 [Journal ] Claude Castelluccia , Walid Dabbous , Sean W. O'Malley Generating efficient protocol code from an abstract specification. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:514-524 [Journal ] Aldar C.-F. Chan , Claude Castelluccia On the Privacy of Concealed Data Aggregation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:390-405 [Conf ] Claude Castelluccia , Nitesh Saxena , Jeong Hyun Yi Robust self-keying mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:4, pp:1169-1182 [Journal ] Code injection attacks on harvard-architecture devices. [Citation Graph (, )][DBLP ] Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP ] On the difficulty of software-based attestation of embedded devices. [Citation Graph (, )][DBLP ] Geolocalization of proxied services and its application to fast-flux hidden servers. [Citation Graph (, )][DBLP ] Private Information Disclosure from Web Searches. [Citation Graph (, )][DBLP ] Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. [Citation Graph (, )][DBLP ] Extending SAT Solvers to Cryptographic Problems. [Citation Graph (, )][DBLP ] An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements. [Citation Graph (, )][DBLP ] EnhancingIEEE 802.11 performance in congested environments. [Citation Graph (, )][DBLP ] An adaptive per-host IP paging architecture. [Citation Graph (, )][DBLP ] Code injection attacks on harvard-architecture devices [Citation Graph (, )][DBLP ] Private Information Disclosure from Web Searches. (The case of Google Web History) [Citation Graph (, )][DBLP ] De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP ] Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP ] Search in 0.083secs, Finished in 0.087secs