Publications

  • Jagdish Prasad Achara, Unveiling and controlling online tracking, PhD thesis (2016).
  • Sourya Joyee De, Daniel Le Métayer. Privacy Risk Analysis, Morgan & Claypool Publishers, ISBN: 9781627054256 (2016).
  • Konstantinos Chatzikokolakis, Catuscia Palamidessi, Valeria Vignudelli: Up-To Techniques for Generalized Bisimulation Metrics. CONCUR 2016: 35:1-35:14 (2016).
  • Cuong-Quoc To, Benjamin Nguyen, Philippe Pucheral. Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture. In Transactions on Database Systems (TODS) (2016).
  • Daniel Le Métayer. Whom to trust? Using technology to enforce privacy, Chapter 17 of “Enforcing Privacy”, David Wright and Paul De Hert, editors, Springer (2016).
  • Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia. MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences. In The Workshop on the Economics of Information Security (WEIS), (2016).
  • Javier Parra-Arnau, Jagdish Prasad Achara, Claude Castelluccia. MyAdChoices: Bringing Transparency and Control to Online Advertising. Submitted to ACM Transactions on the Web (ACM TWEB), (2016).
  • Sourya Joyee De, Daniel Le Métayer. Privacy Harm Analysis: a Case Study on Smart Grids, in Proc. International Workshop on Privacy Engineering (IWPE 2016), IEEE, 2016.
  • Sourya Joyee De, Daniel Le Métayer. PRIAM : A Privacy Risk Analysis Methodology, in Proc. Data Privacy Management and Security Assurance (DPM 2016), Springer, 2016.
  • Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith: Axioms for Information Leakage. CSF 2016: 77-92.
  • Aguilar-Melchor, C., J. Barrier, L. Fousse, and M. Killijian (2016). XPIR : Private Information Retrieval for Everyone. PoPETs 2016(2), 155–174.
  • Sousa, J., C. Lefebvre, J. Raisaro, Z. Huang, F. Tramer, J.-P. Hubaux, C. Aguilar, and M.-O. Killijian (2016). Outsourcing Genomic Data Using Private Information Retrieval. In: Proc. of the 3rd International Workshop on Genome Privacy and Security (GenoPri’16).
  • M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, “Why MAC Address Randomization is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, New York, NY, USA, 2016, pp. 413–424.
  • P. Pucheral, A. Rallet, C. Zolinsky. ‘La Privacy by design : une fausse bonne solution aux problèmes de protection des données personnelles soulevés par l’Open data et les objets connectés ?’, Revue LÉGICOM No 56 – 2016/1, 2016.
  • T. Gerbet, A. Kumar and C. Lauradoux, « A Privacy Analysis of Google and Yandex Safe Browsing, » 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, 2016, pp. 347-358.
  • Gergely Acs, Jagdish Prasad Achara, Claude Castelluccia. Probabilistic km-anonymity (Efficient Anonymization of Large Set-Valued Datasets).In IEEE Conference on Big Data (IEEE BigData), (2015).
  • Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia. On the Unicity of Smartphone Applications. In The 14th ACM CCS Workshop on Privacy in Electronic Society (ACM WPES), (2015).
  • Celestin Matte, Jagdish Prasad Achara, Mathieu Cunche. Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing. In The 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), (2015).
  • Gergely Acs, Claude Castelluccia, Daniel Le Métayer. Anonymous versus personal data: from a binary view to a rigorous risk-based approach. Contribution to the European Parliament High-level conference co-organised by the LIBE Committee and the STOA Panel, Protecting online privacy by enhancing IT security and strengthening EU IT capabilities (December 2015).
  • Fanny Coudert, Denis Butin, Daniel Le Métayer. Body-worn cameras for police accountability: Opportunities and risks. In Computer Law & Security Review, Volume 31, Issue 6, pages 749-762 (December 2015).
  • Miguel E. Andrés, Catuscia Palamidessi, Geoffrey Smith. Special issue on quantitative information flow. Mathematical Structures in Computer Science 25(2), edited volume, (2015).
  • M. Alvim, M. Andrés, K. Chatzikokolakis, P. Degano, C. Palamidessi. On the information leakage of differentially-private mechanisms. Journal of Computer Security (2015).
  • Thibaud Antignac, Daniel Le Métayer. Trust Driven Strategies for Privacy by Design. In Trust Management IX (IFIP-TM 2015), Hamburg, Springer, (2015).
  • Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer. Privacy by design in practice: reasoning about privacy properties of biometric system architectures. Proc. 20th int. Symposium on Formal Methods, FM 2015, Springer (to appear).
  • Christophe Lazaro, Daniel Le Métayer. The Control over personal data – true remedy or fairytale?, SCRIPTed (to appear).
  • Christophe Lazaro, Daniel Le Métayer. Le consentement au traitement des données personnelles. Perspective comparative sur l’autonomie du sujet. Revue Juridique Thémis de l’université de Montréal RJTUM, (to appear).
  • Antoinette Rouvroy, Bernard Stiegler. Le régime de vérité numérique. Socio – Le tournant numérique,… et après?. Ed. Dana Diminescu, Michel Wieviorka. Paris: Les éditions de la Maison des Sciences de l’Homme, 2015. 113-140 (2015).
  • Kostas Chatzikokolakis, Catuscia Palamidessi, Marco Stronati. Geo-indistinguishability: A Principled Approach to Location Privacy. Proc. of ICDCIT ’15, Springer, LNCS 8956, pp. 49-72 (2015).
  • Nicolas Bordenabe, Kostas Chatzikokolakis, Catuscia Palamidessi. Optimal Geo-Indistinguishable Mechanisms for Location Privacy. Proc. of CCS ’14, ACM, pp. 251-262 (2015).
  • Raghavendran Balu, Teddy Furon, Sébastien Gambs. Challenging Differential Privacy: the Case of Non-interactive Mechanism. In Proc. 19th European Symposium on Research in Computer Security, Springer LNCS 8713, pp. 146-164 (2015).
  • Kostas Chatzikokolakis, Daniel Gebler, Catuscia Palamidessi, Lili Xu. Generalized bisimulation metrics. Proc. of CONCUR ’14, Springer, LNCS 8704, pp. 32-46 (2015).
  • Antoinette Rouvroy, Des données sans personne: le fétichisme de la donnée à caractère personnel à l’épreuve de l’idéologie des Big Data, in « Etude annuelle du Conseil d’Etat. Le numérique et les droits et libertés fondamentaux ». (2014).
  • Thibaud Antignac, Daniel Le Métayer. Privacy Architectures: Reasoning About Data Minimisation and Integrity. In Proc. 10th International Workshop on Security and Trust Management, Springer LNCS 8743, pp. 17-32 (2014).
  • Jagdish Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon. Short Paper: WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission. 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Oxford, United Kingdom (2014).
  • Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8): 1597-1614 (2014).
  • Sébastien Gambs, Marc-Olivier Killijian, Matthieu Roy, Moussa Traore. PROPS: A PRivacy-Preserving Location Proof System. SRDS 2014: 1-10 (2014).
  • Sébastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux, Cristina Onete, Matthieu Roy, Moussa Traoré. VSSDB: A Verifiable Secret-Sharing and Distance-Bounding protocol, International Conference on Cryptography and Information security (BalkanCryptSec’14), Istanbul (2014).
  • Sébastien Gambs, Samuel Ranellucci, Alain Tapp. The Crypto-Democracy and the Trustworthy (Position Paper). DPM/SETOP/QASA 2014: 58-76 (2014).
  • Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan, Equity-preserving Management of Privacy Conflicts in Social Network Systems. In Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), Cambridge, United States, (2014).
  • Ehab ElSalamouni, Kostas Chatzikokolakis and Catuscia Palamidessi. Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms.Horizons of the Mind. A Tribute to Prakash Panangaden, Springer, LNCS 8464, pp. 292-318 (2014).
  • Minh-Dung Tran, Gergely Ács, Claude Castelluccia: Retargeting Without Tracking. CoRR abs/1404.4533 (2014).
  • Lukasz Olejnik, Claude Castelluccia, Artur Janc. On the uniqueness of Web browsing history patterns. Annales des Télécommunications 69(1-2): 63-74 (2014).
  • Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati: A Predictive Differentially-Private Mechanism for Mobility Traces. Proc. Privacy Enhancing Technologies (PETS 2014), LNCS 8555 (2014).
  • Tristan Allard, Benjamin Nguyen, Philippe Pucheral.  » METAP : Revisiting Privacy-Preserving Data Publishing using Secure Devices », in Distributed and Parallel Databases (DAPD), 32(2): 191-244 (2014).
  • Levent Demir, Mathieu Cunche, Cédric Lauradoux. Analyzing the privacy policies of Wifi trackers. Workshop on Physical Analytics, ACM (2014).
  • Denis Butin, Daniel Le Métayer. Log analysis for data protection accountability. In Formal Methods – 19th International Symposium, Singapore, LNCS 8442 (2014).
  • Thibaud Antignac, Daniel Le Métayer. Privacy by design: from technologies to architectures (position paper), In Annual Privacy Forum (APF 2014), LNCS 8450, Springer (2014).
  • Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral. ‘Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware’. Proc. of the 17th International Conference on Extending Database Technology (EDBT), Athens, Greece (2014).
  • K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, C. Palamidessi. Broadening the Scope of Differential Privacy Using Metrics. Proceedings of PETS’13: 82-102 (2013).
  • Sébastien Gambs, Marc-Olivier Killijian, Miguel Nunez del Prado, De-anonymization attack on geolocated data (IEEE best student paper award), Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM’13), Melbourne (2013).
  • Sébastien Gambs, Marc-Olivier Killijian, Izabela Moise, Miguel Núñez del Prado Cortez. MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces. IPDPS Workshops, 1937-1946 (2013).
  • Mathieu Cunche.  I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques, Springer (2013).
  • Rémy Chrétien, Véronique Cortier, Stéphanie Delaune.  From security protocols to pushdown automata.  In ICALP’13, LNCS 7966, Springer (2013).
  • Rémy Chrétien, Stéphanie DelauneFormal analysis of privacy for routing protocols in mobile ad hoc networksIn POST’13, LNCS 7796 (2013).
  • Ehab Elsalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi. A differentially private mechanism of optimal utility for a region of priors. Proc. of POST 2013 (2013).
  • Nicolas Anciaux, L.uc Bouganim, Philippe  Pucheral, Yanli Guo, Lionel Le Folgoc, Shaoyi Yin, « MILo-DB: a Personal, Secure and Portable Database Machine », Distributed and Parallel Database Journal (DAPD), Special Issue on Secure and Privacy-aware Data Management (2013).
  • Mathieu Cunche; Cédric Lauradoux; Marine Minier; Roksana Boreli. Private and resilient data aggregation. IEEE Conference on Local Computer Networks – LCN, EEE (2013).
  • Jagdish Prasad Achara, Franck Baudot, Claude Castelluccia, Geoffrey Delcroix, Vincent Roca: Mobilitics: Analyzing Privacy Leaks in Smartphones. ERCIM News 2013(93) (2013).
  • Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Iulian Sandu Popa, Philippe Pucheral. ‘Trusted Cells: A Sea Change for Personal Data Services’.   Proc. of the 6th Biennal International Conference on Innovative Data Systems Research  (CIDR), Asilomar, USA (2013).
  • Denis Butin, Marcos Chicote, Daniel Le Métayer, Strong Accountability: Beyond Vague Promises, in Reloading data protection, edited by Serge Gutwirth, Ronald Leenes and Paul De Hert, Springer (2013).
  • Nicolas Anciaux, Danae Boutara, Benjamin Nguyen, Michalis Vazirgiannis, Limiting Data Exposure in Multi-Label Classification Processes, in Fundamenta Informaticae (2013).
  • Nicolas Anciaux, Walid Bezza, Benjamin Nguyen, Michalis Vazirgiannis, MinExp-Card: Limiting Data Collection Using a SmartCard, in 16th International Conference on Extending Database Technology (EDBT), demonstration session (2013).
  • Denis Butin, Marcos Chicote, Daniel Le Métayer, Log Design for Accountability, in 4th International Workshop on Data Usage Management (DUMA 13), IEEE (2013).
  • Daniel Le Métayer and Julien Le Clainche: Données personnelles, vie privée et non-discrimination : des protections complémentaires, une convergence nécessaire, Revue Lamy Droit de l’Immatériel (RLDI), pp. 80-95 (2013).
  • Daniel Le Métayer: Privacy by design: a formal framework for the analysis of architectural choices, in CODASPY 2013, ACM Conference on Data and Application Security and Privacy, (2013).