Author image not provided
 Mathias Humbert

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.75
Citation Count30
Publication count8
Publication years2010-2017
Available for download5
Average downloads per article248.40
Downloads (cumulative)1,242
Downloads (12 Months)666
Downloads (6 Weeks)63
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 14,   Downloads (12 Months): 94,   Downloads (Overall): 94

Full text available: PDFPDF
The development of positioning technologies has resulted in an increasing amount of mobility data being available. While bringing a lot of convenience to people's life, such availability also raises serious concerns about privacy. In this paper, we concentrate on one of the most sensitive information that can be inferred from ...
Keywords: link prediction, location sharing, social relationship privacy

March 2017 IEEE Transactions on Mobile Computing: Volume 16 Issue 3, March 2017
Publisher: IEEE Educational Activities Department
Citation Count: 0

Co-location information about users is increasingly available online. For instance, mobile users more and more frequently report their co-locations with other users in the messages and in the pictures they post on social networking websites by tagging the names of the friends they are with. The users’ IP addresses also ...

3 published by ACM
February 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 1, February 2017
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 16,   Downloads (12 Months): 179,   Downloads (Overall): 179

Full text available: PDFPDF
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. These data is notoriously very sensitive and stable in time, and highly correlated among relatives. In this article, we study the implications of these familial correlations on kin genomic privacy. We formalize the problem and ...
Keywords: kinship, metrics, Genomic privacy, inference

4 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Citation Count: 1
Downloads (6 Weeks): 8,   Downloads (12 Months): 250,   Downloads (Overall): 377

Full text available: PDFPDF
The continuous decrease in cost of molecular profiling tests is revolutionizing medical research and practice, but it also raises new privacy concerns. One of the first attacks against privacy of biological data, proposed by Homer et al. in 2008, showed that, by knowing parts of the genome of a given ...
Keywords: membership privacy, health privacy, differential privacy

5 published by ACM
November 2014 WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
Publisher: ACM
Citation Count: 5
Downloads (6 Weeks): 4,   Downloads (12 Months): 35,   Downloads (Overall): 118

Full text available: PDFPDF
Direct-to-consumer genetic testing makes it possible for everyone to learn their genome sequences. In order to contribute to medical research, a growing number of people publish their genomic data on the Web, sometimes under their real identities. However, this is at odds not only with their own privacy but also ...
Keywords: genomic privacy, obfuscation, optimization

6 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Citation Count: 12
Downloads (6 Weeks): 21,   Downloads (12 Months): 108,   Downloads (Overall): 474

Full text available: PDFPDF
The rapid progress in human-genome sequencing is leading to a high availability of genomic data. This data is notoriously very sensitive and stable in time. It is also highly correlated among relatives. A growing number of genomes are becoming accessible online (e.g., because of leakage, or after their posting on ...
Keywords: kinship, metrics, genomic privacy, inference algorithms

November 2011 GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security
Publisher: Springer-Verlag
Citation Count: 2

Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a customer's location ...

November 2010 GameSec'10: Proceedings of the First international conference on Decision and game theory for security
Publisher: Springer-Verlag
Citation Count: 7

Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must be deployed carefully in the network to reduce the cost they induce on mobile users and to provide high location privacy. ...
Keywords: location privacy, mobile networks, mix zone, game theory

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us