Members
Overall Objectives
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 3D. Le Métayer, L. Christophe.
    Le consentement au traitement des données personnelles : une perspective comparative sur l’autonomie du sujet, in: La Revue Juridique Themis, 2014, vol. 48, no 3, 32 p.
    https://hal.inria.fr/hal-01089902
  • 4M. Minier, F. Dedouit, D. Maret, M. Vergnault, F.-Z. Mokrane, H. Rousseau, N. Telmon, D. Rougé, P. Adalian.
    Fetal age estimation using MSCT scans of the mandible, in: International Journal of Legal Medicine, 2014, vol. 128, no 3, pp. 493-499. [ DOI : 10.1007/s00414-013-0933-5 ]
    https://hal.archives-ouvertes.fr/hal-01085005
  • 5M. Minier, D. Maret, F. Dedouit, M. Vergnault, F.-Z. Mokrane, H. Rousseau, P. Adalian, D. Rougé, N. Telmon.
    Fetal age estimation using MSCT scans of deciduous tooth germs, in: International Journal of Legal Medicine, 2014, vol. 128, no 1, pp. 177-182. [ DOI : 10.1007/s00414-013-0890-z ]
    https://hal.archives-ouvertes.fr/hal-01085019

Articles in National Peer-Reviewed Journals

  • 6G. Gössler, D. Le Métayer, E. Mazza, M.-L. Potet, L. Astefanoaei.
    Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel, in: Technique et Science Informatiques (TSI), 2014, pp. 63-84. [ DOI : 10.3166/tsi.33.63-84 ]
    https://hal.inria.fr/hal-01078220

International Conferences with Proceedings

  • 7C. Abdelberi, T. Chen, M. Cunche, E. Decristofaro, A. Friedman, M. A. Kaafar.
    Censorship in the Wild: Analyzing Internet Filtering in Syria, in: Internet Measurement Conference (IMC), Vancouver, BC, Canada, Canada, November 2014.
    https://hal.inria.fr/hal-01052581
  • 8P. Achara, M. Cunche, V. Roca, A. Francillon.
    Short Paper: WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission, in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)), Oxford, United Kingdom, July 2014. [ DOI : 10.1145/2627393.2627399 ]
    https://hal.inria.fr/hal-00997716
  • 9G. Acs, C. Castelluccia.
    A Case Study: Privacy Preserving Release of Spatio-temporal Density in Paris, in: KDD '14 Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, United States, ACM, August 2014.
    https://hal.inria.fr/hal-01060070
  • 10T. Antignac, D. Le Métayer.
    Privacy Architectures: Reasoning About Data Minimisation and Integrity, in: STM - 10th International Workshop on Security and Trust Management, Wroclaw, France, C. Damsgaard Jensen, S. Mauw (editors), Springer, September 2014, vol. 8743.
    https://hal.inria.fr/hal-01054758
  • 11T. Antignac, D. Le Métayer.
    Privacy by Design: From Technologies to Architectures (Position Paper), in: APF - Annual Privacy Forum 2014, Athens, Greece, B. Preneel, D. Ikonomou (editors), Springer, May 2014, vol. 8450, pp. 1-17. [ DOI : 10.1007/978-3-319-06749-0_1 ]
    https://hal.inria.fr/hal-01070140
  • 12D. Butin, D. Le Métayer.
    Log Analysis for Data Protection Accountability, in: FM2014 - 19th International Symposium on Formal Methods, Singapore, Singapore, Springer, May 2014, vol. 8442, pp. 163-178. [ DOI : 10.1007/978-3-319-06410-9_12 ]
    https://hal.inria.fr/hal-00984308
  • 13C. Castelluccia, C. Castelluccia, L. Olejnik, T. Minh-Dung.
    Selling Off Privacy at Auction, in: Network and Distributed System Security Symposium (NDSS), San Diego, California, United States, NDSS, ISOC, November 2014.
    https://hal.inria.fr/hal-01087557
  • 14A. Chaabane, Y. Ding, R. Dey, M. Ali Kaafar, K. Ross.
    A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?, in: Passive and Active Measurement conference (2014), Los Angeles, United States, Springer, March 2014.
    https://hal.inria.fr/hal-00939175
  • 15M. Cunche, M. A. Kaafar, R. Boreli.
    Asynchronous Covert Communication Using BitTorrent Trackers, in: International Symposium on Cyberspace Safety and Security (CSS), Paris, France, August 2014.
    https://hal.inria.fr/hal-01053147
  • 16L. Demir, M. Cunche, C. Lauradoux.
    Analysing the privacy policies of Wi-Fi trackers, in: Workshop on Physical Analytics, Bretton Woods, United States, ACM, June 2014. [ DOI : 10.1145/2611264.2611266 ]
    https://hal.inria.fr/hal-00983363
  • 17O. Erdene-Ochir, M. Abdallah, K. Qaraqe, M. Minier, F. Valois.
    Routing Resilience Evaluation for Smart Metering: Definition, Metric and Techniques, in: PIMRC - IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications, Washington DC, United States, September 2014.
    https://hal.inria.fr/hal-01015801
  • 18S. Gambs, M.-O. Killijian, C. Lauradoux, C. Onete, M. Roy, M. Traoré.
    VSSDB: A Verifiable Secret-Sharing and Distance-Bounding protocol, in: International Conference on Cryptography and Information security (BalkanCryptSec'14), Istanbul, Turkey, October 2014.
    https://hal.inria.fr/hal-01090056
  • 19L. Jacquin, V. Roca, J.-L. Roch.
    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways, in: IEEE Global Communications Conference (GLOBECOM'14), Austin, United States, T. Rappaport (editor), IEEE, December 2014.
    https://hal.inria.fr/hal-01052994
  • 20D. Le Métayer, H. Kopp, R. Van der Heijden, F. Kargl, M. Fazouane.
    Formal verification of privacy properties in electrical vehicle charging, in: International Symposium on Engineering Secure Software and Systems (ESSOS15), Milan, Italy, March 2015.
    https://hal.inria.fr/hal-01089925
  • 21Z. Li, G. Xie, J. Lin, Y. Jin, M. A. Kaafar, K. Salamatian.
    On the geographic patterns of a large-scale mobile video-on-demand system, in: 33rd IEEE INFOCOM conference, Toronto, Canada, April 2014, pp. 397-405. [ DOI : 10.1109/INFOCOM.2014.6847962 ]
    https://hal.archives-ouvertes.fr/hal-01066515
  • 22Z. Ma, D. Butin, F. Jaime, F. Coudert, A. Kung, C. Gayrel, A. Maña, C. Jouvray, N. Trussart, N. Grandjean, V. Manuel Hidalgo, M. Bossuet, F. Casado, M. C. Hidalgo.
    Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems, in: Second Annual Privacy Forum (APF 2014), Athènes, Greece, Springer, May 2014, vol. 8450, pp. 101-116. [ DOI : 10.1007/978-3-319-06749-0_7 ]
    https://hal.inria.fr/hal-00994303
  • 23K. Matsuzono, V. Roca, H. Asaeda.
    Structured Random Linear Codes (SRLC): Bridging the Gap between Block and Convolutional Codes, in: IEEE Global Communications Conference (GLOBECOM'14), Austin, United States, T. Rappaport (editor), IEEE, December 2014.
    https://hal.inria.fr/hal-01059554
  • 24N. Notario, D. Le Métayer, A. Crespo, A. Kung, I. Kroener, C. Troncoso, J. del Alamo, Y.-S. Martín.
    PRIPARE: A New Vision on Engineering Privacy and Security by Design, in: Cyber Security & Privacy Forum, Athènes, Greece, May 2014.
    https://hal.inria.fr/hal-01089889
  • 25L. Olejnik, K. Agnieszka, C. Castelluccia.
    I'm 2.8% Neanderthal - The Beginning of Genetic Exhibitionism?, in: Workshop on Genome Privacy, Amsterdam, Netherlands, Netherlands, July 2014.
    https://hal.inria.fr/hal-01087696
  • 26V.-T. Ta, T. Antignac.
    Privacy by Design: On the Conformance Between Protocols and Architectures, in: FPS - 7th International Symposium on Foundations & Practice of Security, Montreal, Canada, P. W. L. Fong, F. Cuppens, J. Garcia-Alfaro, N. Zincir Heywood (editors), Springer, November 2014.
    https://hal.inria.fr/hal-01103546

Conferences without Proceedings

  • 27C. Matte, M. Cunche.
    Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoofing, in: 1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France, December 2014.
    https://hal.inria.fr/hal-01093524

Scientific Books (or Scientific Book chapters)

  • 28D. Butin, M. Chicote, D. Le Métayer.
    Strong Accountability: Beyond Vague Promises, in: Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, S. Gutwirth, R. Leenes, P. De Hert (editors), Springer, 2014, pp. 343-369. [ DOI : 10.1007/978-94-007-7540-4_16 ]
    https://hal.inria.fr/hal-00917350

Internal Reports

  • 29P. Achara, M. Cunche, V. Roca, A. Francillon.
    WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission, May 2014, no RR-8539, 21 p, A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd - 25th 2014.
    https://hal.inria.fr/hal-00994926
  • 30C. Boura, M. Minier, M. Naya-Plasencia, V. Suder.
    Improved Impossible Differential Attacks against Round-Reduced LBlock, IACR, April 2014, http://eprint.iacr.org/2014/279.
    https://hal.archives-ouvertes.fr/hal-01068887
  • 31P. Brunisholz, M. Minier, F. Valois.
    The Gain of Network Coding in Wireless Sensor Networking, Inria ; INP Grenoble, December 2014, no RR-8650.
    https://hal.inria.fr/hal-01092287
  • 32M. Cunche, M. A. Kaafar, R. Boreli.
    Asynchronous Covert Communication Using BitTorrent Trackers, June 2014, no RR-8554.
    https://hal.inria.fr/hal-01011739
  • 33L. Demir, M. Cunche, C. Lauradoux.
    Analysing the privacy policies of Wi-Fi trackers, March 2014, no RR-8506.
    https://hal.inria.fr/hal-00968585
  • 34T. Gerbet, A. Kumar, C. Lauradoux.
    The Power of Evil Choices in Bloom Filters, Inria Grenoble, November 2014, no RR-8627.
    https://hal.inria.fr/hal-01082158
  • 35T. Gerbet, A. Kumar, C. Lauradoux.
    (Un)Safe Browsing, September 2014, no RR-8594.
    https://hal.inria.fr/hal-01064822
  • 36A. Kumar, P. Lafourcade, C. Lauradoux.
    Performances of Cryptographic Accumulators, May 2014.
    https://hal.archives-ouvertes.fr/hal-00999432

Scientific Popularization

Patents

Other Publications

  • 39J. Detchart, V. Roca, J. Lacan, E. Lochin.
    Tetrys, an On-the-Fly Network Coding protocol, October 2014, Working document of the NWCRG (Network Coding Research Group) group of IRTF (Internet Research Task Force).
    https://hal.inria.fr/hal-01089745
  • 40V. Firoiu, B. Adamson, V. Roca, C. Adjih, J. Bilbao, F. Fitzek, A. Masucci, M.-J. Montpetit.
    Network Coding Taxonomy, November 2014, Internet Research Task Force - Working document of the Network Coding Research Group (NWCRG).
    https://hal.inria.fr/hal-00998506
  • 41D. Le Métayer, G. Danezis, M. Hansen, J.-H. Hoepman, R. Tirtea, S. Schiffner, J. Domingo-Ferrer.
    Privacy and Data Protection by Design - from policy to engineering, December 2014, ENISA Report.
    https://hal.inria.fr/hal-01097119
  • 42M. Minier, C. Solnon, J. Reboul.
    Solving a Symmetric Key Cryptographic Problemwith Constraint Programming, July 2014, 13 p, ModRef 2014, Workshop of the CP 2014 Conference, September 2014, Lyon, France.
    https://hal.inria.fr/hal-01092574
  • 43V. Roca, K. Matsuzono.
    Structured RLC codes: an update, March 2014, IETF89 - NWCRG meeting.
    https://hal.inria.fr/hal-00955772
  • 44V. Roca.
    A. Vazquez-Castro (editor), RLC and AL-FEC @ IETF: when codes meet transport protocols and practical aspects, February 2014, Algebraic approaches to storage and network coding - COST IC1104.
    https://hal.inria.fr/hal-00948895