- Thibaud Antignac, Daniel Le Métayer. Trust Driven Strategies for Privacy by Design. In Trust Management IX (IFIP-TM 2015), Hamburg, Springer, (2015).
-
Julien Bringer, Hervé Chabanne, Daniel Le Métayer, Roch Lescuyer. Privacy by design in practice: reasoning about privacy properties of biometric system architectures. Proc. 20th int. Symposium on Formal Methods, FM 2015, Springer (to appear).
-
Christophe Lazaro, Daniel Le Métayer. The Control over personal data – true remedy or fairytale?, SCRIPTed (to appear).
-
Christophe Lazaro, Daniel Le Métayer. Le consentement au traitement des données personnelles. Perspective comparative sur l’autonomie du sujet. Revue Juridique Thémis de l’université de Montréal RJTUM, (to appear).
- Antoinette Rouvroy, Bernard Stiegler. Le régime de vérité numérique. Socio – Le tournant numérique,… et après?. Ed. Dana Diminescu, Michel Wieviorka. Paris: Les éditions de la Maison des Sciences de l’Homme, 2015. 113-140 (2015).
- Kostas Chatzikokolakis, Catuscia Palamidessi, Marco Stronati. Geo-indistinguishability: A Principled Approach to Location Privacy. Proc. of ICDCIT ’15, Springer, LNCS 8956, pp. 49-72 (2015).
- Nicolas Bordenabe, Kostas Chatzikokolakis, Catuscia Palamidessi. Optimal Geo-Indistinguishable Mechanisms for Location Privacy. Proc. of CCS ’14, ACM, pp. 251-262 (2015).
- Raghavendran Balu, Teddy Furon, Sébastien Gambs. Challenging Differential Privacy: the Case of Non-interactive Mechanism. In Proc. 19th European Symposium on Research in Computer Security, Springer LNCS 8713, pp. 146-164 (2015).
- Kostas Chatzikokolakis, Daniel Gebler, Catuscia Palamidessi, Lili Xu. Generalized bisimulation metrics. Proc. of CONCUR ’14, Springer, LNCS 8704, pp. 32-46 (2015).
- Antoinette Rouvroy, Des données sans personne: le fétichisme de la donnée à caractère personnel à l’épreuve de l’idéologie des Big Data, in « Etude annuelle du Conseil d’Etat. Le numérique et les droits et libertés fondamentaux ». (2014).
- Thibaud Antignac, Daniel Le Métayer. Privacy Architectures: Reasoning About Data Minimisation and Integrity. In Proc. 10th International Workshop on Security and Trust Management, Springer LNCS 8743, pp. 17-32 (2014).
- Jagdish Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon. Short Paper: WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission. 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Oxford, United Kingdom (2014).
- Sébastien Gambs, Marc-Olivier Killijian, Miguel Núñez del Prado Cortez. De-anonymization attack on geolocated data. J. Comput. Syst. Sci. 80(8): 1597-1614 (2014).
- Sébastien Gambs, Marc-Olivier Killijian, Matthieu Roy, Moussa Traore. PROPS: A PRivacy-Preserving Location Proof System. SRDS 2014: 1-10 (2014).
- Sébastien Gambs, Marc-Olivier Killijian, Cédric Lauradoux, Cristina Onete, Matthieu Roy, Moussa Traoré. VSSDB: A Verifiable Secret-Sharing and Distance-Bounding protocol, International Conference on Cryptography and Information security (BalkanCryptSec’14), Istanbul (2014).
- Sébastien Gambs, Samuel Ranellucci, Alain Tapp. The Crypto-Democracy and the Trustworthy (Position Paper). DPM/SETOP/QASA 2014: 58-76 (2014).
- Regina Paiva Melo Marin, Guillaume Piolle, Christophe Bidan, Equity-preserving Management of Privacy Conflicts in Social Network Systems. In Proceedings of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014), Cambridge, United States, (2014).
- Ehab ElSalamouni, Kostas Chatzikokolakis and Catuscia Palamidessi. Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms.Horizons of the Mind. A Tribute to Prakash Panangaden, Springer, LNCS 8464, pp. 292-318 (2014).
- Minh-Dung Tran, Gergely Ács, Claude Castelluccia: Retargeting Without Tracking. CoRR abs/1404.4533 (2014).
- Lukasz Olejnik, Claude Castelluccia, Artur Janc. On the uniqueness of Web browsing history patterns. Annales des Télécommunications 69(1-2): 63-74 (2014).
- Konstantinos Chatzikokolakis, Catuscia Palamidessi, Marco Stronati: A Predictive Differentially-Private Mechanism for Mobility Traces. Proc. Privacy Enhancing Technologies (PETS 2014), LNCS 8555 (2014).
- Tristan Allard, Benjamin Nguyen, Philippe Pucheral. » METAP : Revisiting Privacy-Preserving Data Publishing using Secure Devices », in Distributed and Parallel Databases (DAPD), 32(2): 191-244 (2014).
- Levent Demir, Mathieu Cunche, Cédric Lauradoux. Analyzing the privacy policies of Wifi trackers. Workshop on Physical Analytics, ACM (2014).
- Denis Butin, Daniel Le Métayer. Log analysis for data protection accountability. In Formal Methods – 19th International Symposium, Singapore, LNCS 8442 (2014).
- Thibaud Antignac, Daniel Le Métayer. Privacy by design: from technologies to architectures (position paper), In Annual Privacy Forum (APF 2014), LNCS 8450, Springer (2014).
- Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral. ‘Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware’. Proc. of the 17th International Conference on Extending Database Technology (EDBT), Athens, Greece (2014).
- K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, C. Palamidessi. Broadening the Scope of Differential Privacy Using Metrics. Proceedings of PETS’13: 82-102 (2013).
- Sébastien Gambs, Marc-Olivier Killijian, Miguel Nunez del Prado, De-anonymization attack on geolocated data (IEEE best student paper award), Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM’13), Melbourne (2013).
- Sébastien Gambs, Marc-Olivier Killijian, Izabela Moise, Miguel Núñez del Prado Cortez. MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces. IPDPS Workshops, 1937-1946 (2013).
- Mathieu Cunche. I know your MAC address: targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques, Springer (2013).
- Rémy Chrétien, Véronique Cortier, Stéphanie Delaune. From security protocols to pushdown automata. In ICALP’13, LNCS 7966, Springer (2013).
- Rémy Chrétien, Stéphanie Delaune. Formal analysis of privacy for routing protocols in mobile ad hoc networks. In POST’13, LNCS 7796 (2013).
- Ehab Elsalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi. A differentially private mechanism of optimal utility for a region of priors. Proc. of POST 2013 (2013).
- Nicolas Anciaux, L.uc Bouganim, Philippe Pucheral, Yanli Guo, Lionel Le Folgoc, Shaoyi Yin, « MILo-DB: a Personal, Secure and Portable Database Machine », Distributed and Parallel Database Journal (DAPD), Special Issue on Secure and Privacy-aware Data Management (2013).
- Mathieu Cunche; Cédric Lauradoux; Marine Minier; Roksana Boreli. Private and resilient data aggregation. IEEE Conference on Local Computer Networks – LCN, EEE (2013).
- Jagdish Prasad Achara, Franck Baudot, Claude Castelluccia, Geoffrey Delcroix, Vincent Roca: Mobilitics: Analyzing Privacy Leaks in Smartphones. ERCIM News 2013(93) (2013).
- Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Iulian Sandu Popa, Philippe Pucheral. ‘Trusted Cells: A Sea Change for Personal Data Services’. Proc. of the 6th Biennal International Conference on Innovative Data Systems Research (CIDR), Asilomar, USA (2013).
- Denis Butin, Marcos Chicote, Daniel Le Métayer, Strong Accountability: Beyond Vague Promises, in Reloading data protection, edited by Serge Gutwirth, Ronald Leenes and Paul De Hert, Springer (2013).
- Nicolas Anciaux, Danae Boutara, Benjamin Nguyen, Michalis Vazirgiannis, Limiting Data Exposure in Multi-Label Classification Processes, in Fundamenta Informaticae (2013).
- Nicolas Anciaux, Walid Bezza, Benjamin Nguyen, Michalis Vazirgiannis, MinExp-Card: Limiting Data Collection Using a SmartCard, in 16th International Conference on Extending Database Technology (EDBT), demonstration session (2013).
- Denis Butin, Marcos Chicote, Daniel Le Métayer, Log Design for Accountability, in 4th International Workshop on Data Usage Management (DUMA 13), IEEE (2013).
- Daniel Le Métayer and Julien Le Clainche: Données personnelles, vie privée et non-discrimination : des protections complémentaires, une convergence nécessaire, Revue Lamy Droit de l’Immatériel (RLDI), pp. 80-95 (2013).
- Daniel Le Métayer: Privacy by design: a formal framework for the analysis of architectural choices, in CODASPY 2013, ACM Conference on Data and Application Security and Privacy, (2013).