2023 - Research.com Computer Science in France Leader Award
His scientific interests lie mostly in Cryptography, Computer security, Computer network, Encryption and Stream cipher. His Cryptography study integrates concerns from other disciplines, such as Verifiable secret sharing, Denial-of-service attack and Conjunctive normal form. In his research, Web service, Levenshtein distance and Entropy is intimately related to Identifier, which falls under the overarching field of Computer security.
His Computer network research integrates issues from Scalability and Macro. His study on Encryption is mostly dedicated to connecting different topics, such as Internet privacy. His work deals with themes such as Homomorphic encryption, Pseudorandom function family, Cipher, Wireless sensor network and Cryptographic primitive, which intersect with Stream cipher.
Claude Castelluccia focuses on Computer network, Computer security, Cryptography, Encryption and World Wide Web. His research integrates issues of Scheme and Wireless in his study of Computer network. His Wireless study incorporates themes from Quality of service and The Internet.
His Computer security research incorporates elements of Identifier and Tracing. His study in Information privacy extends to Cryptography with its themes. His work investigates the relationship between World Wide Web and topics such as Internet privacy that intersect with problems in Profiling.
His primary scientific interests are in Computer security, BitTorrent tracker, Differential privacy, Artificial neural network and World Wide Web. His work on Fingerprint is typically connected to Order as part of general Computer security study, connecting several disciplines of science. The study incorporates disciplines such as Inference and Federated learning in addition to Differential privacy.
His Federated learning research incorporates themes from Adversarial system, Backdoor, Computer network, Bandwidth and Mobile device. His studies in World Wide Web integrate themes in fields like Extension and Login. His Identifier study combines topics in areas such as Data breach, Encryption, Privacy preserving and User privacy.
Claude Castelluccia mostly deals with Computer security, World Wide Web, BitTorrent tracker, Identifier and Ad blocking. The Computer security study combines topics in areas such as Tracing and Robustness. The concepts of his World Wide Web study are interwoven with issues in Transparency and Profiling.
Claude Castelluccia integrates many fields, such as BitTorrent tracker, Web tracking, Login, Uniqueness, Anonymity and Extension, in his works. His biological study spans a wide range of topics, including Data breach, Bluetooth, Encryption, Mobile device and Privacy preserving. Claude Castelluccia interconnects Block, Web page, Control, Blocking and Internet privacy in the investigation of issues within Ad blocking.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Differentiation mechanisms for IEEE 802.11
I. Aad;C. Castelluccia.
international conference on computer communications (2001)
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
Claude Castelluccia;Aldar C-F. Chan;Einar Mykletun;Gene Tsudik.
ACM Transactions on Sensor Networks (2009)
Efficient aggregation of encrypted data in wireless sensor networks
C. Castelluccia;E. Mykletun;G. Tsudik.
international conference on mobile and ubiquitous systems: networking and services (2005)
Extending SAT Solvers to Cryptographic Problems
Mate Soos;Karsten Nohl;Claude Castelluccia.
theory and applications of satisfiability testing (2009)
I have a DREAM!: differentially private smart metering
Gergely Ács;Claude Castelluccia.
information hiding (2011)
Code injection attacks on harvard-architecture devices
Aurélien Francillon;Claude Castelluccia.
computer and communications security (2008)
Hierarchical MIPv6 mobility management
Hesham Soliman;Ludovic Bellier;Claude Castelluccia;Karim Malki.
(2000)
Differentially private sequential data publication via variable-length n-grams
Rui Chen;Gergely Acs;Claude Castelluccia.
computer and communications security (2012)
Proximity-based access control for implantable medical devices
Kasper Bonne Rasmussen;Claude Castelluccia;Thomas S. Heydt-Benjamin;Srdjan Capkun.
computer and communications security (2009)
On the difficulty of software-based attestation of embedded devices
Claude Castelluccia;Aurélien Francillon;Daniele Perito;Claudio Soriente.
computer and communications security (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Irvine
Macquarie University
University College London
University of California, Irvine
Karlsruhe Institute of Technology
ETH Zurich
Max Planck Institute for Security and Privacy
University of Alabama at Birmingham
Hewlett-Packard (United States)
University of Florida
University of Michigan–Ann Arbor
University of Manitoba
University of Liverpool
University of British Columbia
International Rice Research Institute
Polish Academy of Sciences
Baylor College of Medicine
Lundquist Institute
European Academy of Bozen
Radboud University Nijmegen
Florida International University
The University of Texas MD Anderson Cancer Center
Kanazawa University
London School of Hygiene & Tropical Medicine
Wageningen University & Research
University of Montreal