Team, Visitors, External Collaborators
Overall Objectives
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Publications of the year

Articles in International Peer-Reviewed Journals

[1]
G. Acs, L. Melis, C. Castelluccia, E. De Cristofaro.
Differentially Private Mixture of Generative Neural Networks, in: IEEE Transactions on Knowledge and Data Engineering, June 2019, vol. 31, no 6, pp. 1109-1121, A shorter version of this paper appeared at the 17th IEEE International Conference on Data Mining (ICDM 2017). This is the full version, publishedin IEEE Transactions on Knowledge and Data Engineering (TKDE). [ DOI : 10.1109/TKDE.2018.2855136 ]
https://hal.inria.fr/hal-01921923
[2]
G. Celosia, M. Cunche.
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, in: Proceedings on Privacy Enhancing Technologies, July 2020, vol. 2020, pp. 26 - 46. [ DOI : 10.2478/popets-2020-0003 ]
https://hal.inria.fr/hal-02394619
[3]
T. Jourdan, A. Boutet, C. Frindel.
Vers la protection de la vie privée dans les objets connectés pour la reconnaissance d'activité en santé, in: Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2019, pp. 1-27, forthcoming. [ DOI : 10.3166/RIA.28.1-27 ]
https://hal.inria.fr/hal-02421854

International Conferences with Proceedings

[4]
C. Boniface, I. Fouad, N. Bielova, C. Lauradoux, C. Santos.
Security Analysis of Subject Access Request Procedures How to authenticate data subjects safely when they request for their data, in: APF 2019 - Annual Privacy Forum, Rome, Italy, June 2019, pp. 1-20.
https://hal.inria.fr/hal-02072302
[5]
A. Boutet, S. Gambs.
Demo: Inspect what your location history reveals about you Raising user awareness on privacy threats associated with disclosing his location data, in: CIKM 2019 - 28th ACM International Conference on Information and Knowledge Management, Beijing, China, ACM, November 2019, pp. 2861-2864. [ DOI : 10.1145/3357384.3357837 ]
https://hal.inria.fr/hal-02421828
[6]
G. Celosia, M. Cunche.
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile, in: IoT S&P 2019 - 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, London, United Kingdom, ACM Press, November 2019, pp. 24-31. [ DOI : 10.1145/3338507.3358617 ]
https://hal.inria.fr/hal-02359914
[7]
G. Celosia, M. Cunche.
Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, in: MobiQuitous 2019 - 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, United States, December 2019, pp. 1-10. [ DOI : 10.1145/3360774.3360777 ]
https://hal.inria.fr/hal-02394629
[8]
M. Cunche, D. Le Métayer, V. Morel.
A Generic Information and Consent Framework for the IoT, in: TRUSTCOM 2019 - 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Rotorua, New Zealand, August 2019, pp. 1-8.
https://hal.inria.fr/hal-02166181
[9]
J. Decouchant, A. Boutet, J. Yu, P. Esteves-Verissimo.
P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming, in: SRDS 2019 - 38th International Symposium on Reliable Distributed Systems, Lyon, France, October 2019, pp. 1-10.
https://hal.inria.fr/hal-02421820
[10]
A. Kassem, G. Acs, C. Castelluccia, C. Palamidessi.
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets, in: SPW 2019 - 40th IEEE Symposium on Security and Privacy Workshops, San Francisco, United States, IEEE, May 2019, pp. 72-79. [ DOI : 10.1109/SPW.2019.00024 ]
https://hal.archives-ouvertes.fr/hal-02422992
[11]
R. Pardo, D. Le Métayer.
Analysis of Privacy Policies to Enhance Informed Consent, in: DBSEC 2019 - 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Charleston, SC, United States, S. N. Foley (editor), Data and Applications Security and Privacy XXXIII, Springer International Publishing, July 2019, vol. LNCS-11559, pp. 177-198, Part 3: Privacy. [ DOI : 10.1007/978-3-030-22479-0_10 ]
https://hal.inria.fr/hal-02384593

Scientific Books (or Scientific Book chapters)

[12]
S. Kremer, L. , D. Rémy, V. Roca.
Cybersecurity : Current challenges and Inria's research directions, Inria white book, Inria, January 2019, no 3, 172 p.
https://hal.inria.fr/hal-01993308
[13]
S. Kremer, L. , D. Rémy, V. Roca.
Cybersécurité : Défis actuels et axes de recherche à l'Inria, Inria white book, Inria, May 2019, no 3, 18 p.
https://hal.inria.fr/hal-02414281

Internal Reports

[14]
C. Castelluccia, D. Le Métayer.
Analyse des impacts de la reconnaissance faciale - Quelques éléments de méthode, Inria Grenoble Rhône-Alpes, November 2019.
https://hal.inria.fr/hal-02373093
[15]
C. Henin, D. Le Métayer.
Towards a Generic Framework for Black-box Explanation Methods (Extended Version), Inria Grenoble Rhône-Alpes ; Ecole des Ponts ParisTech, May 2019, no RR-9276, pp. 1-28.
https://hal.inria.fr/hal-02131174
[16]
V. Morel, R. Pardo.
Three Dimensions of Privacy Policies, Inria - Research Centre Grenoble – Rhône-Alpes ; CITI - CITI Centre of Innovation in Telecommunications and Integration of services, August 2019, no RR-9287, https://arxiv.org/abs/1908.06814.
https://hal.inria.fr/hal-02267641
[17]
R. Pardo, D. Le Métayer.
Analysis of Privacy Policies to Enhance Informed Consent (Extended Version), Inria Rhône-Alpes, March 2019, no RR-9262, pp. 1-22, https://arxiv.org/abs/1903.06068 - Extended Version.
https://hal.inria.fr/hal-02067924

Other Publications

[18]
G. Avoine, C. Lauradoux, T.-R. Rolando.
Should Chess Players Learn Computer Security ?, February 2019, pp. 1-11, HACKING IT SECURITY MAGAZINE.
https://hal.inria.fr/hal-02082837
[19]
G. Celosia, M. Cunche.
DEMO: Himiko: A human interface for monitoring and inferring knowledge on Bluetooth-Low-Energy objects, ACM Press, May 2019, pp. 292-293, WiSec 2019 - 12th Conference on Security and Privacy in Wireless and Mobile Networks, Poster. [ DOI : 10.1145/3317549.3326297 ]
https://hal.inria.fr/hal-02154148
[20]
V. Roca, A. Begen.
Forward Error Correction (FEC) Framework Extension to Sliding Window Codes (RFC 8680), RFC Editor (https://www.rfc-editor.org/), January 2020, RFC 8680, Standards Track, TSVWG (Transport Area) working group of IETF (Internet Engineering Task Force), https://www.rfc-editor.org/rfc/rfc8680.html.
https://hal.inria.fr/hal-01345125
[21]
V. Roca, B. Teibi.
Sliding Window Random Linear Code (RLC) Forward Erasure Correction (FEC) Schemes for FECFRAME (RFC 8681), RFC Editor (https://www.rfc-editor.org/), January 2020, RFC 8681, Standards Track, TSVWG (Transport Area) working group of IETF (Internet Engineering Task Force), https://www.rfc-editor.org/rfc/rfc8681.html.
https://hal.inria.fr/hal-01630089
[22]
M. Saito, M. Matsumoto, V. Roca, E. Baccelli.
TinyMT32 Pseudorandom Number Generator (PRNG) (RFC 8682), RFC Editor (https://www.rfc-editor.org/), January 2020, RFC 8682, Standards Track, TSVWG (Transport Area) working group of IETF (Internet Engineering Task Force), https://www.rfc-editor.org/rfc/rfc8682.html.
https://hal.inria.fr/hal-02449210
[23]
M. Thiery, V. Roca, A. Legout.
Privacy implications of switching ON a light bulb in the IoT world, July 2019, working paper or preprint.
https://hal.inria.fr/hal-02196544