Members
Overall Objectives
Application Domains
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
F. Mattoussi.
Design and optimization of AL-FEC codes: the GLDPC-Staircase codes, Université de Grenoble, February 2014.
https://tel.archives-ouvertes.fr/tel-00969573
[2]
V. Roca.
AL-FEC codes and robust content distribution protocols: components for high performance and scalable services, Université de Grenoble, April 2014, version 2.0, 20 février 2014, Habilitation à diriger des recherches.
https://tel.archives-ouvertes.fr/tel-00925955

Articles in International Peer-Reviewed Journals

[3]
D. Le Métayer, L. Christophe.
Le consentement au traitement des données personnelles : une perspective comparative sur l’autonomie du sujet, in: La Revue Juridique Themis, 2014, vol. 48, no 3, 32 p.
https://hal.inria.fr/hal-01089902
[4]
M. Minier, F. Dedouit, D. Maret, M. Vergnault, F.-Z. Mokrane, H. Rousseau, N. Telmon, D. Rougé, P. Adalian.
Fetal age estimation using MSCT scans of the mandible, in: International Journal of Legal Medicine, 2014, vol. 128, no 3, pp. 493-499. [ DOI : 10.1007/s00414-013-0933-5 ]
https://hal.archives-ouvertes.fr/hal-01085005
[5]
M. Minier, D. Maret, F. Dedouit, M. Vergnault, F.-Z. Mokrane, H. Rousseau, P. Adalian, D. Rougé, N. Telmon.
Fetal age estimation using MSCT scans of deciduous tooth germs, in: International Journal of Legal Medicine, 2014, vol. 128, no 1, pp. 177-182. [ DOI : 10.1007/s00414-013-0890-z ]
https://hal.archives-ouvertes.fr/hal-01085019

Articles in National Peer-Reviewed Journals

[6]
G. Gössler, D. Le Métayer, E. Mazza, M.-L. Potet, L. Astefanoaei.
Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel, in: Technique et Science Informatiques (TSI), 2014, pp. 63-84. [ DOI : 10.3166/tsi.33.63-84 ]
https://hal.inria.fr/hal-01078220

International Conferences with Proceedings

[7]
C. Abdelberi, T. Chen, M. Cunche, E. Decristofaro, A. Friedman, M. A. Kaafar.
Censorship in the Wild: Analyzing Internet Filtering in Syria, in: Internet Measurement Conference (IMC), Vancouver, BC, Canada, Canada, November 2014.
https://hal.inria.fr/hal-01052581
[8]
P. Achara, M. Cunche, V. Roca, A. Francillon.
Short Paper: WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission, in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)), Oxford, United Kingdom, July 2014. [ DOI : 10.1145/2627393.2627399 ]
https://hal.inria.fr/hal-00997716
[9]
G. Acs, C. Castelluccia.
A Case Study: Privacy Preserving Release of Spatio-temporal Density in Paris, in: KDD '14 Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, United States, ACM, August 2014.
https://hal.inria.fr/hal-01060070
[10]
T. Antignac, D. Le Métayer.
Privacy Architectures: Reasoning About Data Minimisation and Integrity, in: STM - 10th International Workshop on Security and Trust Management, Wroclaw, France, C. Damsgaard Jensen, S. Mauw (editors), Springer, September 2014, vol. 8743.
https://hal.inria.fr/hal-01054758
[11]
T. Antignac, D. Le Métayer.
Privacy by Design: From Technologies to Architectures (Position Paper), in: APF - Annual Privacy Forum 2014, Athens, Greece, B. Preneel, D. Ikonomou (editors), Springer, May 2014, vol. 8450, pp. 1-17. [ DOI : 10.1007/978-3-319-06749-0_1 ]
https://hal.inria.fr/hal-01070140
[12]
D. Butin, D. Le Métayer.
Log Analysis for Data Protection Accountability, in: FM2014 - 19th International Symposium on Formal Methods, Singapore, Singapore, Springer, May 2014, vol. 8442, pp. 163-178. [ DOI : 10.1007/978-3-319-06410-9_12 ]
https://hal.inria.fr/hal-00984308
[13]
C. Castelluccia, C. Castelluccia, L. Olejnik, T. Minh-Dung.
Selling Off Privacy at Auction, in: Network and Distributed System Security Symposium (NDSS), San Diego, California, United States, NDSS, ISOC, November 2014.
https://hal.inria.fr/hal-01087557
[14]
A. Chaabane, Y. Ding, R. Dey, M. Ali Kaafar, K. Ross.
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?, in: Passive and Active Measurement conference (2014), Los Angeles, United States, Springer, March 2014.
https://hal.inria.fr/hal-00939175
[15]
M. Cunche, M. A. Kaafar, R. Boreli.
Asynchronous Covert Communication Using BitTorrent Trackers, in: International Symposium on Cyberspace Safety and Security (CSS), Paris, France, August 2014.
https://hal.inria.fr/hal-01053147
[16]
L. Demir, M. Cunche, C. Lauradoux.
Analysing the privacy policies of Wi-Fi trackers, in: Workshop on Physical Analytics, Bretton Woods, United States, ACM, June 2014. [ DOI : 10.1145/2611264.2611266 ]
https://hal.inria.fr/hal-00983363
[17]
O. Erdene-Ochir, M. Abdallah, K. Qaraqe, M. Minier, F. Valois.
Routing Resilience Evaluation for Smart Metering: Definition, Metric and Techniques, in: PIMRC - IEEE 25th International Symposium on Personal, Indoor and Mobile Radio Communications, Washington DC, United States, September 2014.
https://hal.inria.fr/hal-01015801
[18]
S. Gambs, M.-O. Killijian, C. Lauradoux, C. Onete, M. Roy, M. Traoré.
VSSDB: A Verifiable Secret-Sharing and Distance-Bounding protocol, in: International Conference on Cryptography and Information security (BalkanCryptSec'14), Istanbul, Turkey, October 2014.
https://hal.inria.fr/hal-01090056
[19]
L. Jacquin, V. Roca, J.-L. Roch.
Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways, in: IEEE Global Communications Conference (GLOBECOM'14), Austin, United States, T. Rappaport (editor), IEEE, December 2014.
https://hal.inria.fr/hal-01052994
[20]
D. Le Métayer, H. Kopp, R. Van der Heijden, F. Kargl, M. Fazouane.
Formal verification of privacy properties in electrical vehicle charging, in: International Symposium on Engineering Secure Software and Systems (ESSOS15), Milan, Italy, March 2015.
https://hal.inria.fr/hal-01089925
[21]
Z. Li, G. Xie, J. Lin, Y. Jin, M. A. Kaafar, K. Salamatian.
On the geographic patterns of a large-scale mobile video-on-demand system, in: 33rd IEEE INFOCOM conference, Toronto, Canada, April 2014, pp. 397-405. [ DOI : 10.1109/INFOCOM.2014.6847962 ]
https://hal.archives-ouvertes.fr/hal-01066515
[22]
Z. Ma, D. Butin, F. Jaime, F. Coudert, A. Kung, C. Gayrel, A. Maña, C. Jouvray, N. Trussart, N. Grandjean, V. Manuel Hidalgo, M. Bossuet, F. Casado, M. C. Hidalgo.
Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems, in: Second Annual Privacy Forum (APF 2014), Athènes, Greece, Springer, May 2014, vol. 8450, pp. 101-116. [ DOI : 10.1007/978-3-319-06749-0_7 ]
https://hal.inria.fr/hal-00994303
[23]
K. Matsuzono, V. Roca, H. Asaeda.
Structured Random Linear Codes (SRLC): Bridging the Gap between Block and Convolutional Codes, in: IEEE Global Communications Conference (GLOBECOM'14), Austin, United States, T. Rappaport (editor), IEEE, December 2014.
https://hal.inria.fr/hal-01059554
[24]
N. Notario, D. Le Métayer, A. Crespo, A. Kung, I. Kroener, C. Troncoso, J. del Alamo, Y.-S. Martín.
PRIPARE: A New Vision on Engineering Privacy and Security by Design, in: Cyber Security & Privacy Forum, Athènes, Greece, May 2014.
https://hal.inria.fr/hal-01089889
[25]
L. Olejnik, K. Agnieszka, C. Castelluccia.
I'm 2.8% Neanderthal - The Beginning of Genetic Exhibitionism?, in: Workshop on Genome Privacy, Amsterdam, Netherlands, Netherlands, July 2014.
https://hal.inria.fr/hal-01087696
[26]
V.-T. Ta, T. Antignac.
Privacy by Design: On the Conformance Between Protocols and Architectures, in: FPS - 7th International Symposium on Foundations & Practice of Security, Montreal, Canada, P. W. L. Fong, F. Cuppens, J. Garcia-Alfaro, N. Zincir Heywood (editors), Springer, November 2014.
https://hal.inria.fr/hal-01103546

Conferences without Proceedings

[27]
C. Matte, M. Cunche.
Beam me up, Scotty: identifying the individual behind a MAC address using Wi-Fi geolocation spoofing, in: 1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France, December 2014.
https://hal.inria.fr/hal-01093524

Scientific Books (or Scientific Book chapters)

[28]
D. Butin, M. Chicote, D. Le Métayer.
Strong Accountability: Beyond Vague Promises, in: Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, S. Gutwirth, R. Leenes, P. De Hert (editors), Springer, 2014, pp. 343-369. [ DOI : 10.1007/978-94-007-7540-4_16 ]
https://hal.inria.fr/hal-00917350

Internal Reports

[29]
P. Achara, M. Cunche, V. Roca, A. Francillon.
WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission, May 2014, no RR-8539, 21 p, A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd - 25th 2014.
https://hal.inria.fr/hal-00994926
[30]
C. Boura, M. Minier, M. Naya-Plasencia, V. Suder.
Improved Impossible Differential Attacks against Round-Reduced LBlock, IACR, April 2014, http://eprint.iacr.org/2014/279.
https://hal.archives-ouvertes.fr/hal-01068887
[31]
P. Brunisholz, M. Minier, F. Valois.
The Gain of Network Coding in Wireless Sensor Networking, Inria ; INP Grenoble, December 2014, no RR-8650.
https://hal.inria.fr/hal-01092287
[32]
M. Cunche, M. A. Kaafar, R. Boreli.
Asynchronous Covert Communication Using BitTorrent Trackers, June 2014, no RR-8554.
https://hal.inria.fr/hal-01011739
[33]
L. Demir, M. Cunche, C. Lauradoux.
Analysing the privacy policies of Wi-Fi trackers, March 2014, no RR-8506.
https://hal.inria.fr/hal-00968585
[34]
T. Gerbet, A. Kumar, C. Lauradoux.
The Power of Evil Choices in Bloom Filters, Inria Grenoble, November 2014, no RR-8627.
https://hal.inria.fr/hal-01082158
[35]
T. Gerbet, A. Kumar, C. Lauradoux.
(Un)Safe Browsing, September 2014, no RR-8594.
https://hal.inria.fr/hal-01064822
[36]
A. Kumar, P. Lafourcade, C. Lauradoux.
Performances of Cryptographic Accumulators, May 2014.
https://hal.archives-ouvertes.fr/hal-00999432

Scientific Popularization

[37]
V. Roca.
Privacy and Smartphones: the Mobilitics Inria/CNIL project, November 2014, Séminaire Guilde.
https://hal.inria.fr/hal-01087967

Patents

[38]
A. Kountouris, O. Erdene-Ochir, M. Minier, F. Valois.
Protocole de routage à sauts multiples, May 2014, no 12773078.6 - 1857.
https://hal.inria.fr/hal-01003848

Other Publications

[39]
J. Detchart, V. Roca, J. Lacan, E. Lochin.
Tetrys, an On-the-Fly Network Coding protocol, October 2014, Working document of the NWCRG (Network Coding Research Group) group of IRTF (Internet Research Task Force).
https://hal.inria.fr/hal-01089745
[40]
V. Firoiu, B. Adamson, V. Roca, C. Adjih, J. Bilbao, F. Fitzek, A. Masucci, M.-J. Montpetit.
Network Coding Taxonomy, November 2014, Internet Research Task Force - Working document of the Network Coding Research Group (NWCRG).
https://hal.inria.fr/hal-00998506
[41]
D. Le Métayer, G. Danezis, M. Hansen, J.-H. Hoepman, R. Tirtea, S. Schiffner, J. Domingo-Ferrer.
Privacy and Data Protection by Design - from policy to engineering, December 2014, ENISA Report.
https://hal.inria.fr/hal-01097119
[42]
M. Minier, C. Solnon, J. Reboul.
Solving a Symmetric Key Cryptographic Problemwith Constraint Programming, July 2014, 13 p, ModRef 2014, Workshop of the CP 2014 Conference, September 2014, Lyon, France.
https://hal.inria.fr/hal-01092574
[43]
V. Roca, K. Matsuzono.
Structured RLC codes: an update, March 2014, IETF89 - NWCRG meeting.
https://hal.inria.fr/hal-00955772
[44]
V. Roca.
A. Vazquez-Castro (editor), RLC and AL-FEC @ IETF: when codes meet transport protocols and practical aspects, February 2014, Algebraic approaches to storage and network coding - COST IC1104.
https://hal.inria.fr/hal-00948895