Research Interest:

  1. Web search privacy,
  2. Privacy in the Internet of Things,
  3. Privacy preserving behavioral targeting,
  4. Reverse engineer users search history and profiles,
  5. Deceive search engine profiling,
  6. Analyze search engine privacy policies.



  1. V. Toubiana, V. Verdot, B. Christophe and M. Boussard “Photo-TaPE: User Privacy Preferences in Photo Tagging” Proceedings of the 21st international conference companion on World Wide Web (WWW) 2012, Short Paper
  2. A. Narayanan, S. Barocas, V. Toubiana, H. Nissenbaum, D. Boneh “A Critical Look at Decentralized Personal Data Architectures”, Workshop on Data Usage Management on the Web (DUMW) 2012
  3. V. Toubiana, V. Verdot, B. Christophe “Cookie-based privacy issues on google services”, Proceedings of the second ACM conference on Data and Application Security and Privacy (CODASPY) 2012
  4. V. Toubiana and H. Nissenbaum, “An Analysis of Google Logs Retention Policies,” Journal of Privacy and Confidentiality: Vol. 3: Iss. 1, Article 2. 2011
  5. V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, S. Barocas. “Adnostic: Privacy-Preserving Targeted Advertising”. Network and Distributed System Security Symposium (NDSS) 2010
  6. V. Toubiana, V. Verdot, Gerard Burnside, Eric Joubert, “R2M: A Reputation Model for Mashups”, 7th IEEE Consumer Communications and Networking Conference (CCNC) 2010

Web Of Things

  1. B. Christophe, V. Verdot and V. Toubiana, “Searching the Web of Things” Proceedings of th  Fifth IEEE International Conference on Semantic Computing (ICSC), 2011
  2. B. Christophe, V. Verdot and V. Toubiana “Toward an Adaptative Semantic Search Mechanism for the Web of Things ” – International Journal of Semantic Computing, Volume 5 Issue 4
  3. M. Boussard, O. Le Berre, B. Christophe and V. Toubiana, “Providing user support in Web-of-Things enabled Smart Spaces”, 2nd Workshop on the Web Of Things (WoT) 2011
  4. B. Christophe, M. Boussard, M. Lu, A. Pastor and V. Toubiana, “The web of things vision: Things as a service and interaction patterns” (pages 55–61), Bell Labs Technical Journal, Volume 16, Issue 1

Ad-hoc Network Security

  1. V.Toubiana, H. Labiod, L. Reynaud, Y. Gourhant, “A global security architecture for operated hybrid WLAN mesh networks”, Computer Networks: The International Journal of Computer and Telecommunications Networking , Feb 2010, Volume 54 Issue 2
  2. V. Toubiana, H. Labiod, “A cross layer attack against MANET cooperation enforcement tools”, IEEE International Conference on Networks (ICON) 2008
  3. Y. Beghriche, V. Toubiana, H. Labiod, “A Bayesian Filter to Detect Misbehaving Nodes in MANETs”. 2nd IEEE/IFIP New Technologies, Mobility and Security NTMS 2008: 1-5
  4. V. Toubiana, H. Labiod, “Towards a flexible security management solution for dynamic MANETs”, IEEE/IFIP Network Operations and Management Symposium (NOMS) 2008.
  5. V. Toubiana, H. Labiod, Y. Gourhant and L. Reynaud, “An analysis of ASMA performances against packet dropping attacks in dense networks”, IEEE Symposium on Computers and Communications (ISCC) 2008
  6. V. Toubiana, H. Labiod, Y. Gourhant, and L. Reynaud, “Performance comparison of Multipath Reactive Ad hoc Routing protocols”, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2008, Short Paper
  7. V. Toubiana, H. Labiod, L. Reynaud and Y. Gourhant, “An adaptive security Framework for ad hoc networks ASMA : Towards Secure Adaptive Multipath in MANETs”, 1st IFIP New Technologies, Mobility and Security (NTMS) 2007
  8. V.Toubiana, H. Labiod and B. Fischer, “Event based mobility model for subway scenarios”, 3rd IEEE Wireless and Mobile Computing, Networking and Communication (WiMob) 2007
  9. V. Toubiana, H. Labiod and B. Fischer, “An analysis of ASMA trust evolution in a dense subway environment”, 1st IEEE Global Information Infrastructure Symposium (GIIS) 2007, Short Paper
  10. V. Toubiana, H. Labiod “ASMA: Towards Secure Adaptive Multipath in MANETs”, IFIP/IEEE International Conference on Mobile and Wireless Communications Network (MWCN) 2006