
Claude Castelluccia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c64]Claude Castelluccia, Daniel Le Métayer:
Position Paper: Analyzing the Impacts of Facial Recognition. APF 2020: 43-57 - [i31]Benjamin Nguyen, Claude Castelluccia:
Techniques d'anonymisation tabulaire : concepts et mise en oeuvre. CoRR abs/2001.02650 (2020) - [i30]Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, Vincent Roca:
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems. CoRR abs/2008.01621 (2020) - [i29]Raouf Kerkouche, Gergely Ács, Claude Castelluccia:
Federated Learning in Adversarial Settings. CoRR abs/2010.07808 (2020) - [i28]Raouf Kerkouche, Gergely Ács, Claude Castelluccia, Pierre Genevès:
Compression Boosts Differentially Private Federated Learning. CoRR abs/2011.05578 (2020)
2010 – 2019
- 2019
- [j25]Gergely Ács
, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro
:
Differentially Private Mixture of Generative Neural Networks. IEEE Trans. Knowl. Data Eng. 31(6): 1109-1121 (2019) - [c63]Ali Kassem, Gergely Ács, Claude Castelluccia, Catuscia Palamidessi:
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets. IEEE Symposium on Security and Privacy Workshops 2019: 72-79 - [p2]Silvia Giordano, Victor Morel, Melek Önen, Mirco Musolesi, Davide Andreoletti, Felipe Cardoso, Alan Ferrari, Luca Luceri, Claude Castelluccia, Daniel Le Métayer, Cédric Van Rompay, Benjamin Baron:
UPRISE-IoT: User-Centric Privacy & Security in the IoT. Security and Privacy in the Internet of Things 2019: 44-60 - 2018
- [j24]Javier Parra-Arnau, Claude Castelluccia:
On the Cost-Effectiveness of Mass Surveillance. IEEE Access 6: 46538-46557 (2018) - [j23]Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:
Fine-Grained Control over Tracking to Support the Ad-Based Web Economy. ACM Trans. Internet Techn. 18(4): 51:1-51:25 (2018) - [c62]Claude Castelluccia, Mathieu Cunche, Daniel Le Métayer, Victor Morel:
Enhancing Transparency and Consent in the IoT. EuroS&P Workshops 2018: 116-119 - [c61]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins. WPES@CCS 2018: 14-27 - [r1]Gergely Ács, Gergely Biczók, Claude Castelluccia:
Privacy-Preserving Release of Spatio-Temporal Density. Handbook of Mobile Data Privacy 2018: 307-335 - [i27]Gábor György Gulyás, Dolière Francis Somé, Nataliia Bielova, Claude Castelluccia:
To Extend or not to Extend: on the Uniqueness of Browser Extensions and Web Logins. CoRR abs/1808.07359 (2018) - 2017
- [j22]Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia:
MyAdChoices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web 11(1): 7:1-7:47 (2017) - [c60]Gergely Ács, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro:
Differentially Private Mixture of Generative Neural Networks. ICDM 2017: 715-720 - [c59]Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz:
Towards Implicit Visual Memory-Based Authentication. NDSS 2017 - [i26]Gergely Ács, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro:
Differentially Private Mixture of Generative Neural Networks. CoRR abs/1709.04514 (2017) - 2016
- [j21]Gábor György Gulyás, Gergely Ács, Claude Castelluccia:
Near-Optimal Fingerprinting with Constraints. Proc. Priv. Enhancing Technol. 2016(4): 470-487 (2016) - [i25]Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia:
MyAdChoices: Bringing Transparency and Control to Online Advertising. CoRR abs/1602.02046 (2016) - [i24]Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia:
MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences. CoRR abs/1604.04495 (2016) - [i23]Jagdish Prasad Achara, Vincent Roca, Claude Castelluccia, Aurélien Francillon:
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. CoRR abs/1605.08357 (2016) - [i22]Gábor György Gulyás, Gergely Ács, Claude Castelluccia:
Near-Optimal Fingerprinting with Constraints. CoRR abs/1605.08664 (2016) - 2015
- [c58]Gergely Ács, Jagdish Prasad Achara, Claude Castelluccia:
Probabilistic km-anonymity efficient anonymization of large set-valued datasets. BigData 2015: 1164-1173 - [c57]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The Leaking Battery - A Privacy Analysis of the HTML5 Battery Status API. DPM/QASA@ESORICS 2015: 254-263 - [c56]Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. ESSoS 2015: 119-132 - [c55]Jagdish Prasad Achara, Gergely Ács, Claude Castelluccia:
On the Unicity of Smartphone Applications. WPES@CCS 2015: 27-36 - [i21]Jagdish Prasad Achara, Gergely Ács, Claude Castelluccia:
On the Unicity of Smartphone Applications. CoRR abs/1507.07851 (2015) - [i20]Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:
The leaking battery: A privacy analysis of the HTML5 Battery Status API. IACR Cryptol. ePrint Arch. 2015: 616 (2015) - 2014
- [j20]Lukasz Olejnik, Claude Castelluccia, Artur Janc:
On the uniqueness of Web browsing history patterns. Ann. des Télécommunications 69(1-2): 63-74 (2014) - [j19]Jagdish Prasad Achara, James-Douglass Lefruit, Vincent Roca, Claude Castelluccia:
Detecting privacy leaks in the RATP App: how we proceeded and what we found. J. Comput. Virol. Hacking Tech. 10(4): 229-238 (2014) - [c54]Gergely Ács, Claude Castelluccia:
A case study: privacy preserving release of spatio-temporal density in paris. KDD 2014: 1679-1688 - [c53]Lukasz Olejnik, Minh-Dung Tran, Claude Castelluccia:
Selling off User Privacy at Auction. NDSS 2014 - [e2]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - [i19]Minh-Dung Tran, Gergely Ács, Claude Castelluccia:
Retargeting Without Tracking. CoRR abs/1404.4533 (2014) - [i18]Claude Castelluccia, Markus Dürmuth, Fatma Imamoglu:
Learning from Neuroscience to Improve Internet Security. ERCIM News 2014(99) (2014) - 2013
- [c52]Lukasz Olejnik, Claude Castelluccia:
Towards Web-Based Biometric Systems Using Personal Browsing Interests. ARES 2013: 274-280 - [c51]Jun-Young Bae, Claude Castelluccia, Cédric Lauradoux, Franck Rousseau:
Distributed Key Certification Using Accumulators for Wireless Sensor Networks. MobiQuitous 2013: 500-511 - [c50]Sana Tmar Ben Hamida, Pierre-Henri Thevenon, Jean-Benoît Pierrot, Olivier Savry, Claude Castelluccia:
Detecting relay attacks in RFID systems using physical layer characteristics. WMNC 2013: 1-8 - [i17]Claude Castelluccia, Chaabane Abdelberi, Markus Dürmuth, Daniele Perito:
When Privacy meets Security: Leveraging personal information for password cracking. CoRR abs/1304.6584 (2013) - [i16]Jagdish Prasad Achara, Franck Baudot, Claude Castelluccia, Geoffrey Delcroix, Vincent Roca:
Mobilitics: Analyzing Privacy Leaks in Smartphones. ERCIM News 2013(93) (2013) - 2012
- [c49]Rui Chen, Gergely Ács, Claude Castelluccia:
Differentially private sequential data publication via variable-length n-grams. CCS 2012: 638-649 - [c48]Gergely Ács, Claude Castelluccia, Rui Chen:
Differentially Private Histogram Publishing through Lossy Compression. ICDM 2012: 1-10 - [c47]Claude Castelluccia, Markus Dürmuth, Daniele Perito:
Adaptive Password-Strength Meters from Markov Models. NDSS 2012 - [c46]Claude Castelluccia, Mohamed Ali Kâafar
, Minh-Dung Tran:
Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads. Privacy Enhancing Technologies 2012: 1-17 - [c45]Sana Tmar-Ben Hamida, Jean-Benoît Pierrot, Benoît Denis
, Claude Castelluccia, Bernard Uguen:
On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks. VTC Fall 2012: 1-5 - [p1]Claude Castelluccia:
Behavioural Tracking on the Internet: A Technical Perspective. European Data Protection 2012: 21-33 - [i15]Gergely Ács, Claude Castelluccia:
DREAM: DiffeRentially privatE smArt Metering. CoRR abs/1201.2531 (2012) - 2011
- [j18]Md. Borhan Uddin, Claude Castelluccia:
Towards clock skew based services in wireless sensor networks. Int. J. Sens. Networks 9(1): 24-37 (2011) - [j17]Aldar C.-F. Chan
, Claude Castelluccia:
A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans. Sens. Networks 7(4): 29:1-29:45 (2011) - [c44]Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar
:
EphPub: Toward robust Ephemeral Publishing. ICNP 2011: 165-175 - [c43]Gergely Ács, Claude Castelluccia:
I Have a DREAM! (DiffeRentially privatE smArt Metering). Information Hiding 2011: 118-132 - [c42]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - [c41]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar
, Pere Manils:
How Unique and Traceable Are Usernames? PETS 2011: 1-17 - [c40]Gergely Ács, Claude Castelluccia, William Lecat:
Protecting against physical resource monitoring. WPES 2011: 23-32 - [i14]Daniele Perito, Claude Castelluccia, Mohamed Ali Kâafar, Pere Manils:
How Unique and Traceable are Usernames? CoRR abs/1101.5578 (2011) - [i13]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. CoRR abs/1103.1518 (2011) - 2010
- [j16]Steffen Peter, Dirk Westhoff, Claude Castelluccia:
A Survey on the Encryption of Convergecast Traffic with In-Network Processing. IEEE Trans. Dependable Secur. Comput. 7(1): 20-34 (2010) - [c39]Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito:
Private Information Disclosure from Web Searches. Privacy Enhancing Technologies 2010: 38-55 - [c38]Sana Tmar Ben Hamida, Jean-Benoît Pierrot, Claude Castelluccia:
Empirical analysis of UWB channel characteristics for secret key generation in indoor environments. PIMRC 2010: 1984-1989 - [c37]Md. Borhan Uddin, Claude Castelluccia:
Toward Clock Skew based Wireless Sensor Node Services. WICON 2010: 1-9 - [i12]Claude Castelluccia, Emiliano De Cristofaro, Daniele Perito:
Private Information Disclosure from Web Searches. (The case of Google Web History). CoRR abs/1003.3242 (2010) - [i11]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. CoRR abs/1004.1267 (2010) - [i10]Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. CoRR abs/1004.1461 (2010)
2000 – 2009
- 2009
- [j15]Claude Castelluccia, Aldar C.-F. Chan
, Einar Mykletun, Gene Tsudik:
Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Networks 5(3): 20:1-20:36 (2009) - [c36]Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente:
On the difficulty of software-based attestation of embedded devices. CCS 2009: 400-409 - [c35]Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun:
Proximity-based access control for implantable medical devices. CCS 2009: 410-419 - [c34]Claude Castelluccia, Mohamed Ali Kâafar
, Pere Manils, Daniele Perito:
Geolocalization of proxied services and its application to fast-flux hidden servers. Internet Measurement Conference 2009: 184-189 - [c33]Sana Tmar Ben Hamida, Jean-Benoît Pierrot, Claude Castelluccia:
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements. NTMS 2009: 1-5 - [c32]Claude Castelluccia, Mohamed Ali Kâafar
:
Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet. SAINT 2009: 169-172 - [c31]Mate Soos, Karsten Nohl, Claude Castelluccia:
Extending SAT Solvers to Cryptographic Problems. SAT 2009: 244-257 - [i9]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CoRR abs/0901.3482 (2009) - [i8]Claude Castelluccia, Mohamed Ali Kâafar:
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet. ERCIM News 2009(77) (2009) - 2008
- [b1]Claude Castelluccia:
De la mobilité à la sécurité des réseaux. Grenoble Institute of Technology, France, 2008 - [c30]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CCS 2008: 15-26 - [c29]Aldar C.-F. Chan
, Claude Castelluccia:
On the (Im)possibility of aggregate message authentication codes. ISIT 2008: 235-239 - [c28]Claude Castelluccia, Claudio Soriente:
ABBA: A Balls and bins approach to secure aggregation in WSNs. WiOpt 2008: 185-191 - [i7]Hesham Soliman, Claude Castelluccia, Karim El-Malki, Ludovic Bellier:
Hierarchical Mobile IPv6 (HMIPv6) Mobility Management. RFC 5380: 1-26 (2008) - 2007
- [j14]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
:
Robust self-keying mobile ad hoc networks. Comput. Networks 51(4): 1169-1182 (2007) - [c27]Aldar C.-F. Chan, Claude Castelluccia:
On the Privacy of Concealed Data Aggregation. ESORICS 2007: 390-405 - [c26]Claude Castelluccia:
Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks. MASS 2007: 1-9 - [c25]Claude Castelluccia, Angelo Spognardi
:
RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks. SecureComm 2007: 351-360 - [c24]Aurélien Francillon, Claude Castelluccia:
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. WiOpt 2007: 1-7 - 2006
- [j13]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c23]Claude Castelluccia, Gildas Avoine:
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags. CARDIS 2006: 289-299 - [c22]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving secure server performance by re-balancing SSL/TLS handshakes. AsiaCCS 2006: 26-34 - [c21]Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux:
Packet Coding for Strong Anonymity in Ad Hoc Networks. SecureComm 2006: 1-10 - [i6]Claude Castelluccia:
Authenticated Interleaved Encryption. IACR Cryptol. ePrint Arch. 2006: 416 (2006) - 2005
- [c20]Pars Mutaf, Claude Castelluccia:
Compact neighbor discovery: a bandwidth defense through bandwidth optimization. INFOCOM 2005: 2711-2719 - [c19]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 - [c18]Claude Castelluccia, Pars Mutaf:
Shake them up!: a movement-based pairing protocol for CPU-constrained devices. MobiSys 2005: 51-64 - [c17]Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Self-configurable Key Pre-distribution in Mobile Ad Hoc Networks. NETWORKING 2005: 1083-1095 - [e1]Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff:
Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3313, Springer 2005, ISBN 3-540-24396-8 [contents] - [i5]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. IACR Cryptol. ePrint Arch. 2005: 37 (2005) - [i4]Hesham Soliman, Claude Castelluccia, Karim El-Malki, Ludovic Bellier:
Hierarchical Mobile IPv6 Mobility Management (HMIPv6). RFC 4140: 1-29 (2005) - 2004
- [j12]Pars Mutaf, Claude Castelluccia:
Hash-Based Paging and Location Update Using Bloom Filters. Mob. Networks Appl. 9(6): 627-631 (2004) - [j11]Gabriel Montenegro, Claude Castelluccia:
Crypto-based identifiers (CBIDs): Concepts and applications. ACM Trans. Inf. Syst. Secur. 7(1): 97-127 (2004) - [j10]Claude Castelluccia:
Cryptographically Generated Addresses for Constrained Devices. Wirel. Pers. Commun. 29(3-4): 221-232 (2004) - [c16]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 - [c15]Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann:
Hindering Eavesdropping via IPv6 Opportunistic Encryption. ESORICS 2004: 309-321 - [c14]Claude Castelluccia, Francis Dupont, Gabriel Montenegro:
A Simple Privacy Extension for Mobile IPV6. MWCN 2004: 239-249 - [c13]Claude Castelluccia, Pars Mutaf:
Hash-Based Dynamic Source Routing. NETWORKING 2004: 1012-1023 - [c12]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 - [c11]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - [i3]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. IACR Cryptol. ePrint Arch. 2004: 133 (2004) - 2003
- [j9]Imad Aad, Claude Castelluccia:
EnhancingIEEE 802.11 performance in congested environments. Ann. des Télécommunications 58(3-4): 397-416 (2003) - [j8]Imad Aad, Claude Castelluccia:
Priorities in WLANs. Comput. Networks 41(4): 505-526 (2003) - [c10]Claude Castelluccia, Gabriel Montenegro:
Securing Group Management in IPv6 with Cryptographically Generated Addresses. ISCC 2003: 588-593 - 2002
- [j7]Claude Castelluccia, Gabriel Montenegro:
Protecting AODV against impersonation attacks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 6(3): 108-109 (2002) - [c9]Gabriel Montenegro, Claude Castelluccia:
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. NDSS 2002 - [i2]Claude Castelluccia:
How to convert any ID-based Signature Schemes. IACR Cryptol. ePrint Arch. 2002: 116 (2002) - 2001
- [j6]Claude Castelluccia, Pars Mutaf:
An adaptive per-host IP paging architecture. Comput. Commun. Rev. 31(5): 48-56 (2001) - [j5]Xinhua Zhao, Claude Castelluccia, Mary Baker:
Flexible Network Support for Mobile Hosts. Mob. Networks Appl. 6(2): 137-149 (2001) - [j4]Claude Castelluccia:
Extending mobile IP with adaptive individual paging: a performance analysis. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(2): 14-26 (2001) - [c8]Imad Aad, Claude Castelluccia:
Differentiation Mechanisms for IEEE 802.11. INFOCOM 2001: 209-218 - [i1]James Kempf, Claude Castelluccia, Pars Mutaf, Nobuyasu Nakajima, Yoshihiro Ohba, Ramachandran Ramjee, Yousuf Saifullah, Behçet Sarikaya, Xiaofeng Xu:
Requirements and Functional Architecture for an IP Host Alerting Protocol. RFC 3154: 1-16 (2001) - 2000
- [j3]Claude Castelluccia:
HMIPv6: A hierarchical mobile IPv6 proposal. ACM SIGMOBILE Mob. Comput. Commun. Rev. 4(1): 48-59 (2000) - [c7]Claude Castelluccia:
Extending Mobile IP with Adaptive Individual Paging: A Performance Analysis. ISCC 2000: 113-118 - [c6]Imad Aad, Claude Castelluccia:
Introducing Service Differentiation into IEEE 802.11. ISCC 2000: 438-443
1990 – 1999
- 1998
- [c5]Claude Castelluccia:
Toward a Hierarchical Mobile IPv6. HPN 1998: 275-290 - [c4]Claude Castelluccia:
A hierarchical mobility management scheme for IPv6. ISCC 1998: 305-309 - [c3]Xinhua Zhao, Claude Castelluccia, Mary Baker:
Flexible Network Support for Mobility. MobiCom 1998: 145-156 - 1997
- [j2]Claude Castelluccia, Walid Dabbous, Sean W. O'Malley:
Generating efficient protocol code from an abstract specification. IEEE/ACM Trans. Netw. 5(4): 514-524 (1997) - 1996
- [c2]Walid Dabbous, Sean W. O'Malley, Claude Castelluccia:
Generating Efficient Protocol Code from an Abstract Specification. SIGCOMM 1996: 60-72 - 1994
- [c1]Claude Castelluccia, Walid Dabbous:
Modular Communication Subsystem Implementation Using A Synchronous Approach. USENIX High-Speed Networking Symposium 1994 - 1993
- [j1]Nurgun Erdol, Claude Castelluccia, Ali Zilouchian:
Recovery of missing speech packets using the short-time energy and zero-crossing measurements. IEEE Trans. Speech Audio Process. 1(3): 295-303 (1993)