What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mathieu Cunche
Google Scholar
ORCID:
0000-0002-0066-8612
17
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/compsec
RSSI-based attacks for identification of BLE devices.
Guillaume Gagnon
Sébastien Gambs
Mathieu Cunche
2024
conf/wisec
Privacy-Preserving Pseudonyms for LoRaWAN.
Samuel Pélissier
Jan Aalmoes
Abhishek Kumar Mishra
Mathieu Cunche
Vincent Roca
Didier Donsez
2022
conf/wisec
Device Re-identification in LoRaWAN through Messages Linkage.
Samuel Pélissier
Mathieu Cunche
Vincent Roca
Didier Donsez
2021
journals/istr
Privacy protection for Wi-Fi location positioning systems.
Antoine Boutet
Mathieu Cunche
2021
conf/wisec
No need to ask the Android: bluetooth-low-energy scanning without the location permission.
Vincent Toubiana
Mathieu Cunche
2020
journals/popets
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols.
Guillaume Celosia
Mathieu Cunche
2020
conf/wisec
Valkyrie: a generic framework for verifying privacy provisions in wireless networks.
Guillaume Celosia
Mathieu Cunche
2019
conf/ccs
Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile.
Guillaume Celosia
Mathieu Cunche
2019
conf/wisec
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo.
Guillaume Celosia
Mathieu Cunche
2018
journals/popets
Privacy-preserving Wi-Fi Analytics.
Mohammad Alaggan
Mathieu Cunche
Sébastien Gambs
2018
conf/eurosp
Enhancing Transparency and Consent in the IoT.
Claude Castelluccia
Mathieu Cunche
Daniel Le Métayer
Victor Morel
2018
conf/wisec
Detecting smartphone state changes through a Bluetooth based timing attack.
Guillaume Celosia
Mathieu Cunche
2016
conf/ccs
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Mathy Vanhoef
Célestin Matte
Mathieu Cunche
Leonardo S. Cardoso
Frank Piessens
2016
conf/wisec
Defeating MAC Address Randomization Through Timing Attacks.
Célestin Matte
Mathieu Cunche
Franck Rousseau
Mathy Vanhoef
2016
conf/wisec
DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?
Célestin Matte
Mathieu Cunche
2015
conf/wisec
Device-to-identity linking attack using targeted wi-fi geolocation spoofing.
Célestin Matte
Jagdish Prasad Achara
Mathieu Cunche
2014
conf/wisec
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission.
Jagdish Prasad Achara
Mathieu Cunche
Vincent Roca
Aurélien Francillon
Coauthors
Abhishek Kumar Mishra
(1)
Antoine Boutet
(1)
Aurélien Francillon
(1)
Célestin Matte
(4)
Claude Castelluccia
(1)
Daniel Le Métayer
(1)
Didier Donsez
(2)
Franck Rousseau
(1)
Frank Piessens
(1)
Guillaume Celosia
(5)
Guillaume Gagnon
(1)
Jagdish Prasad Achara
(2)
Jan Aalmoes
(1)
Leonardo S. Cardoso
(1)
Mathieu Cunche
(17)
Mathy Vanhoef
(2)
Mohammad Alaggan
(1)
Samuel Pélissier
(2)
Sébastien Gambs
(2)
Victor Morel
(1)
Vincent Roca
(3)
Vincent Toubiana
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to