The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Claude Castelluccia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:293-307 [Conf]
  2. Claude Castelluccia, Gildas Avoine
    Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:289-299 [Conf]
  3. Claude Castelluccia, Einar Mykletun, Gene Tsudik
    Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:26-34 [Conf]
  4. Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
    Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:309-321 [Conf]
  5. Claude Castelluccia
    Toward a Hierarchical Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    HPN, 1998, pp:275-290 [Conf]
  6. Imad Aad, Claude Castelluccia
    Differentiation Mechanisms for IEEE 802.11. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:209-218 [Conf]
  7. Pars Mutaf, Claude Castelluccia
    Compact neighbor discovery: a bandwidth defense through bandwidth optimization. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2711-2719 [Conf]
  8. Imad Aad, Claude Castelluccia
    Introducing Service Differentiation into IEEE 802.11. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:438-443 [Conf]
  9. Claude Castelluccia
    Extending Mobile IP with Adaptive Individual Paging: A Performance Analysis. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:113-118 [Conf]
  10. Claude Castelluccia, Gabriel Montenegro
    Securing Group Management in IPv6 with Cryptographically Generated Addresses. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:588-593 [Conf]
  11. Xinhua Zhao, Claude Castelluccia, Mary Baker
    Flexible Network Support for Mobility. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1998, pp:145-156 [Conf]
  12. Claude Castelluccia, Einar Mykletun, Gene Tsudik
    E.cient Aggregation of encrypted data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:109-117 [Conf]
  13. Claude Castelluccia, Pars Mutaf
    Shake them up!: a movement-based pairing protocol for CPU-constrained devices. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2005, pp:51-64 [Conf]
  14. Claude Castelluccia, Francis Dupont, Gabriel Montenegro
    A Simple Privacy Extension for Mobile IPV6. [Citation Graph (0, 0)][DBLP]
    MWCN, 2004, pp:239-249 [Conf]
  15. Gabriel Montenegro, Claude Castelluccia
    Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  16. Claude Castelluccia, Pars Mutaf
    Hash-Based Dynamic Source Routing. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:1012-1023 [Conf]
  17. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:1083-1095 [Conf]
  18. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:394- [Conf]
  19. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:193-207 [Conf]
  20. Walid Dabbous, Sean W. O'Malley, Claude Castelluccia
    Generating Efficient Protocol Code from an Abstract Specification. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1996, pp:60-72 [Conf]
  21. Imad Aad, Claude Castelluccia
    Priorities in WLANs. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:4, pp:505-526 [Journal]
  22. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal]
  23. Pars Mutaf, Claude Castelluccia
    Hash-Based Paging and Location Update Using Bloom Filters. [Citation Graph (0, 0)][DBLP]
    MONET, 2004, v:9, n:6, pp:627-631 [Journal]
  24. Xinhua Zhao, Claude Castelluccia, Mary Baker
    Flexible Network Support for Mobile Hosts. [Citation Graph (0, 0)][DBLP]
    MONET, 2001, v:6, n:2, pp:137-149 [Journal]
  25. Claude Castelluccia
    Extending mobile IP with adaptive individual paging: a performance analysis. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2001, v:5, n:2, pp:14-26 [Journal]
  26. Claude Castelluccia, Gabriel Montenegro
    Protecting AODV against impersonation attacks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:108-109 [Journal]
  27. Gabriel Montenegro, Claude Castelluccia
    Crypto-based identifiers (CBIDs): Concepts and applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:97-127 [Journal]
  28. Claude Castelluccia, Walid Dabbous, Sean W. O'Malley
    Generating efficient protocol code from an abstract specification. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1997, v:5, n:4, pp:514-524 [Journal]
  29. Aldar C.-F. Chan, Claude Castelluccia
    On the Privacy of Concealed Data Aggregation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:390-405 [Conf]
  30. Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
    Robust self-keying mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:4, pp:1169-1182 [Journal]

  31. Code injection attacks on harvard-architecture devices. [Citation Graph (, )][DBLP]


  32. Proximity-based access control for implantable medical devices. [Citation Graph (, )][DBLP]


  33. On the difficulty of software-based attestation of embedded devices. [Citation Graph (, )][DBLP]


  34. Geolocalization of proxied services and its application to fast-flux hidden servers. [Citation Graph (, )][DBLP]


  35. Private Information Disclosure from Web Searches. [Citation Graph (, )][DBLP]


  36. Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. [Citation Graph (, )][DBLP]


  37. Extending SAT Solvers to Cryptographic Problems. [Citation Graph (, )][DBLP]


  38. An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements. [Citation Graph (, )][DBLP]


  39. EnhancingIEEE 802.11 performance in congested environments. [Citation Graph (, )][DBLP]


  40. An adaptive per-host IP paging architecture. [Citation Graph (, )][DBLP]


  41. Code injection attacks on harvard-architecture devices [Citation Graph (, )][DBLP]


  42. Private Information Disclosure from Web Searches. (The case of Google Web History) [Citation Graph (, )][DBLP]


  43. De-anonymizing BitTorrent Users on Tor [Citation Graph (, )][DBLP]


  44. Compromising Tor Anonymity Exploiting P2P Information Leakage [Citation Graph (, )][DBLP]


Search in 0.067secs, Finished in 0.069secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002