scispace - formally typeset
C

Claude Castelluccia

Researcher at French Institute for Research in Computer Science and Automation

Publications -  178
Citations -  8914

Claude Castelluccia is an academic researcher from French Institute for Research in Computer Science and Automation. The author has contributed to research in topics: Encryption & Wireless sensor network. The author has an hindex of 45, co-authored 174 publications receiving 8248 citations. Previous affiliations of Claude Castelluccia include Commissariat à l'énergie atomique et aux énergies alternatives & University of California.

Papers
More filters
Proceedings Article

Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns

TL;DR: The first large-scale study of the uniqueness of Web browsing histories is presented, gathered from a total of 368,284 Internet users who visited a history detection demonstration website, and it is reported that it is enough to test for a small number of pages in order to both enumerate users’ interests and perform an efficient and unique behavioral fingerprint.
Proceedings ArticleDOI

A case study: privacy preserving release of spatio-temporal density in paris

TL;DR: A new anonymization scheme to release the spatio-temporal density of Paris, in France, i.e., the number of individuals in 989 different areas of the city released every hour over a whole week is presented.
Proceedings ArticleDOI

Defending embedded systems against control flow attacks

TL;DR: This paper presents a control flow enforcement technique based on an Instruction Based Memory Access Control (IBMAC) implemented in hardware specifically designed to protect low-cost embedded systems against malicious manipulation of their control flow as well as preventing accidental stack overflows.
Proceedings ArticleDOI

Flexible network support for mobility

TL;DR: Two network layer me&anisms are introduced to ensure a mobile host’s convenient and efficient communication with other hosts in a &anging environment and how they are implemented are described.
Book ChapterDOI

Noisy tags: a pretty good key exchange protocol for RFID tags

TL;DR: A protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation is proposed, using special tags that are owned by the reader's manager and set out within the readers' field.