Members
Overall Objectives
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 3F. Mattoussi, V. Roca, B. Sayadi.
    GLDPC-Staircase AL-FEC codes: A Fundamental study and New results, in: EURASIP Journal on Wireless Communications and Networking, July 2016.
    https://hal.inria.fr/hal-01346126

International Conferences with Proceedings

  • 4G. Acs, C. Castelluccia, D. Le Métayer.
    Testing the robustness of anonymization techniques: acceptable versus unacceptable inferences, in: The Brussels Privacy Symposium, brussels, Belgium, November 2016.
    https://hal.inria.fr/hal-01399858
  • 5J. Bringer, H. Chabanne, D. Le Métayer, L. Roch.
    Reasoning about privacy properties of architectures supporting group authentication and application to biometric systems, in: 30th Annual IFIP WG 11.3 Conference on Data and Applications Information Security and Privacy (DBSec 2016), Trento, Italy, S. Ranise, V. Swarup (editors), Data and Applications Security and Privacy XXX, Springer, July 2016, vol. 9766, pp. 313-327. [ DOI : 10.1007/978-3-319-41483-6_22 ]
    https://hal.inria.fr/hal-01403885
  • 6J. Dos Santos, C. Hennebert, C. Lauradoux, J. Fonbonne.
    Ephemeral: Lightweight Pseudonyms for 6LowPAN Mac Addresses, in: 27th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC 2016, Valence, Spain, IEEE, September 2016.
    https://hal.inria.fr/hal-01399831
  • 7D. Gerault, M. Minier, C. Solnon.
    Constraint Programming Models for Chosen Key Differential Cryptanalysis, in: 22nd International Conference on Principles and Practice of Constraint Programming (CP 2016), Toulouse, France, 22nd International Conference on Principles and Practice of Constraint Programming (CP), Springer, September 2016.
    https://hal.archives-ouvertes.fr/hal-01331222
  • 8T. Gerbet, A. Kumar, C. Lauradoux.
    A Privacy Analysis of Google and Yandex Safe Browsing, in: 46th IEEE/IFIP International Conference on Dependable Systems and Networks - DSN 2016, Toulouse, France, IEEE, June 2016. [ DOI : 10.1109/DSN.2016.39 ]
    https://hal.inria.fr/hal-01399829
  • 9G. G. Gulyás, B. Simon, S. Imre.
    An Efficient and Robust Social Network De-anonymization Attack, in: Workshop on Privacy in the Electronic Society, Vienna, Austria, October 2016. [ DOI : 10.1145/2994620.2994632 ]
    https://hal.inria.fr/hal-01380768
  • 10D. Le Métayer, S. J. De.
    PRIAM: a Privacy Risk Analysis Methodology, in: Data Privacy Management and Security Assurance, Heraklion, Greece, G. Livraga, V. Torra, A. Aldini, F. Martinelli, N. Suri (editors), Springer, September 2016.
    https://hal.inria.fr/hal-01420983
  • 11D. Le Métayer, S. J. De.
    Privacy Harm Analysis: a Case Study on Smart Grids, in: International Workshop on Privacy Engineering (IWPE 2016), San Jose, United States, May 2016.
    https://hal.inria.fr/hal-01403889
  • 12A. Soro, J. Lacan, V. Roca, V. Savin, M. Cunche.
    Enhanced Recursive Reed-Muller Erasure Decoding, in: IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, IEEE (editor), IEEE International Symposium on Information Theory (ISIT), July 2016.
    https://hal.inria.fr/hal-01320563

Conferences without Proceedings

  • 13M. Alaggan, M. Cunche, M. Minier.
    Privacy-Preserving t-Incidence for WiFi-based Mobility Analytics, in: 7e Atelier sur la Protection de la Vie Privée (APVP'16), Toulouse, France, July 2016.
    https://hal.inria.fr/hal-01376798
  • 14L. Demir, M. Thiery, V. Roca, J.-L. Roch, J.-M. Tenkes.
    Improving dm-crypt performance for XTS-AES mode through extended requests: first results, in: GreHack 2016. The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack, Grenoble, France, November 2016.
    https://hal.inria.fr/hal-01399967
  • 15G. G. Gulyás, G. Acs, C. Castelluccia.
    Near-Optimal Fingerprinting with Constraints, in: PET Symposium '16, Darmstadt, Germany, July 2016. [ DOI : 10.1515/popets-2016-0051 ]
    https://hal.inria.fr/hal-01321659
  • 16C. Matte, M. Cunche.
    DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?, in: ACM WiSec 2016, Darmstadt, Germany, July 2016. [ DOI : 10.1145/2939918.2942417 ]
    https://hal.inria.fr/hal-01330479
  • 17M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, F. Piessens.
    Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, in: ACM AsiaCCS, Xi'an, China, May 2016. [ DOI : 10.1145/2897845.2897883 ]
    https://hal.inria.fr/hal-01282900

Scientific Books (or Scientific Book chapters)

  • 18D. Le Métayer, S. J. De.
    E. Bertino, R. Sandhu (editors), Privacy Risk Analysis, Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, September 2016, vol. 8, no 3, 133 p. [ DOI : 10.2200/S00724ED1V01Y201607SPT017 ]
    https://hal.inria.fr/hal-01420968
  • 19D. Le Métayer.
    Whom to trust? Using technology to enforce privacy, in: Enforcing Privacy, D. Wright, P. D. Hert (editors), Springer , February 2016.
    https://hal.inria.fr/hal-01247114

Internal Reports

  • 20S. J. De, D. Le Métayer.
    A Risk-based Approach to Privacy by Design (Extended Version), Inria - Research Centre Grenoble – Rhône-Alpes, December 2016, no 9001, 54 p.
    https://hal.inria.fr/hal-01420954
  • 21S. J. De, D. Le Métayer.
    PRIAM: A Privacy Risk Analysis Methodology, Inria - Research Centre Grenoble – Rhône-Alpes, April 2016, no RR-8876.
    https://hal.inria.fr/hal-01302541

Scientific Popularization

Other Publications

  • 23J. P. Achara, J. Parra-Arnau, C. Castelluccia.
    MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences, April 2016, Accepted at The Workshop on the Economics of Information Security (WEIS), 2016.
    https://hal.inria.fr/hal-01302613
  • 24J. P. Achara, V. Roca, C. Castelluccia, A. Francillon.
    MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs, May 2016, working paper or preprint.
    https://hal.inria.fr/hal-01322286
  • 25J. Parra-Arnau, J. P. Achara, C. Castelluccia.
    MyAdChoices: Bringing Transparency and Control to Online Advertising, February 2016, working paper or preprint.
    https://hal.inria.fr/hal-01270186
  • 26V. Roca, A. Begen.
    Forward Error Correction (FEC) Framework version 2, October 2016, Working document of the TSVWG (Transport Area Working Group) group of IETF (Internet Engineering Task Force).
    https://hal.inria.fr/hal-01345125
  • 27V. Roca, S. Fall.
    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways, January 2016, 16 p, Work in Progress document of the IPSECME (IP Security Maintenance and Extensions) of the IETF (Internet Engineering Task Force).
    https://hal.inria.fr/hal-01178390
  • 28V. Roca.
    FECFRAMEv2: Adding Sliding Encoding Window Capabilities to the FEC Framework: Problem Position, May 2016, 18 p, Working document of the NWCRG (Network Coding Research Group) group of IRTF (Internet Research Task Force).
    https://hal.inria.fr/hal-01141470
  • 29V. Roca, B. Teibi, C. Burdinat, T. Tran, C. Thienot.
    Block or Convolutional AL-FEC Codes? A Performance Comparison for Robust Low-Latency Communications, November 2016, working paper or preprint.
    https://hal.inria.fr/hal-01395937