Team PLANETE

Members
Overall Objectives
Scientific Foundations
Application Domains
Software
New Results
Contracts and Grants with Industry
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
C. Castelluccia.
Sécurité des systèmes sans fil embarqués, Habilitation à Diriger des Recherches, 2008.
[2]
W. Dabbous.
Quelle architecture pour l'Internet du futur?, Habilitation à Diriger des Recherches, 2008.

Articles in International Peer-Reviewed Journal

[3]
T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, T. Turletti.
Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: to appear in IEEE/ACM Transactions on Networking, April 2009.
[4]
M. Malli, C. Barakat, W. Dabbous.
CHESS: An application-aware space for enhanced scalable services in overlay networks, in: Computer Communications Journal, vol. 31, no. 6, pp. 1239-1253, April 2008.
[5]
M. Manshaei, M. Lacage, C. Hoffmann, T. Turletti.
On Selecting the Best Transmission Mode for WiFi Devices, in: to appear on Wireless Communications and Mobile Computing, published online July 2008, 2009.
[6]
T. Spyropoulos, T. Turletti, K. Obraczka.
Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: to appear in IEEE Transaction on Mobile Computing, 2009.

International Peer-Reviewed Conference/Proceedings

[7]
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, G. Tsudik.
Data Security in Unattended Wireless Sensor Networks, in: Autonomic Network Computing, IEEE Transaction on Computers, 2009.
[8]
K. Sbai, C. Barakat, J. Choi, A. A. Hamra, T. Turletti.
Adapting BitTorrent to wireless ad hoc networks, in: in proceedings of the AdHoc-Now Networks and Wireless conference, Sophia Antipolis, September 2008.

National Peer-Reviewed Conference/Proceedings

[9]
C. Castelluccia, A. Francillon.
Proteger les reseaux de capteurs sans fil, in: SSTIC2008, 2008.

Workshops without Proceedings

[10]
C. Castelluccia, C. Soriente.
ABBA: A Balls and bins approach to secure aggregation in WSNs, in: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on, April 2008, p. 185-191.
[11]
C. Castelluccia, A. Spognardi.
A Robust Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks, in: IEEE Securecom'07, 2007.
[12]
A.-F. Chan, C. Castelluccia.
On the (Im)possibility of aggregate message authentication codes, in: Information Theory, 2008. ISIT 2008. IEEE International Symposium on, July 2008, p. 235-239.
[13]
M. Cunche, V. Roca.
Optimizing the Error Recovery Capabilities of LDPC-staircase Codes Featuring a Gaussian Elimination Decoding Scheme, in: 10th IEEE International Workshop on Signal Processing for Space Communications (SPSC'08), Rhodes Island, Greece, October 2008.
[14]
M. Cunche, V. Savin, V. Roca, G. Kraidy, A. Soro, J. Lacan.
Low-rate coding using incremental redundancy for GLDPC codes, in: IEEE International Workshop on Satellite and Space Communications 2008 (IWSSC'08), October 2008.
[15]
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, G. Tsudik.
Catch Me (If You Can): Data Survival in Unattended Sensor Networks, in: IEEE PerCom'08, 2008.
[16]
R. Di Pietro, C. Soriente, A. Spognardi, G. Tsudik.
Intrusion-Resilience via Collaborative Authentication in Unattended WSNs, in: ACM WiSec '09, 2009.
[17]
A. Francillon, C. Castelluccia.
Code injection attacks on harvard-architecture devices, in: CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, New York, NY, USA, ACM, 2008, p. 15–26.
[18]
A. Krifa, C. Barakat, T. Spyropoulos.
An Optimal Joint Scheduling and Drop Policy for Delay Tolerant Networks, in: in proceedings of the WoWMoM Workshop on Autonomic and Opportunistic Communications, Newport Beach (CA), June 2008.
[19]
A. Krifa, C. Barakat, T. Spyropoulos.
Optimal Buffer Management Policies for Delay Tolerant Networks, in: in proceedings of the 5th IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008) - Best Paper, San Francisco, June 2008.
[20]
F. Maguolo, M. Lacage, T. Turletti.
Efficient Collision Detection for Auto Rate Fallback Algorithm, in: 3rd Workshop on multiMedia Applications over Wireless Networks, Marrakech, Morocco, July 2008.
[21]
P. Marciniak, N. Liogkas, A. Legout, E. Kohler.
Small Is Not Always Beautiful, in: In Proc. of IPTPS'2008, Tampa Bay, FL, USA, February 2008.
[22]
R. B. Rais, T. Turletti, K. Obraczka.
Coping with Episodic Connectivity in Heterogeneous Networks, in: ACM MSWiM, Vancouver, Canada, October 2008.
[23]
M. Soos.
Analysing the Molva and Di Pietro Private RFID Authentication Scheme, in: RFIDSec 00, 2008.

Internal Reports

[24]
B. Adamson, V. Roca.
Security and Reliable Multicast Transport Protocols: Discussions and Guidelines, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-sec-discussion-02.txt>, July 2008.
[25]
B. Adamson, V. Roca.
Security and Reliable Multicast Transport Protocols: Discussions and Guidelines, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-sec-discussion-01.txt>, February 2008.
[26]
B. Adamson, V. Roca, H. Asaeda.
Security and Reliable Multicast Transport Protocols: Discussions and Guidelines, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-sec-discussion-03.txt>, November 2008.
[27]
H. Asaeda, K. Mishima, V. Roca.
Requirements for IP Multicast Session Announcement in the Internet, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-mboned-session-announcement-req-00>, October 2008.
[28]
H. Asaeda, K. Mishima, V. Roca.
Requirements for IP Multicast Session Announcement in the Internet, IETF RMT Working Group (individual document), Work in Progress: <draft-asaeda-mboned-session-announcement-req-00>, July 2008.
[29]
C. Barakat, e. al..
TICP: TCP-friendly Information Collection Protocol
http://www.inria.fr/planete/chadi/ticp/.
[30]
S. L. Blond, A. Legout, W. Dabbous.
Pushing BitTorrent Locality to the Limit, Technical report, INRIA, December 2008, no inria-00343822, version 1 - 2 December 2008.
[31]
M. Cunche, V. Roca.
Improving the Decoding of LDPC Codes for the Packet Erasure Channel with a Hybrid Zyablov Iterative Decoding/Gaussian Elimination Scheme, Research Report, INRIA, March 2008
http://hal.inria.fr/inria-00263682/fr/.
[32]
A. Krifa, K. Sbai, C. Barakat, T. Turletti.
BitHoc: An Open-Source Tracker-less BitTorrent for Mobile Ad Hoc Networks, 2008
http://planete.inria.fr/bithoc.
[33]
T. Paila, R. Walsh, M. Luby, R. Lehtonen, V. Roca.
FLUTE - File Delivery over Unidirectional Transport (revised), IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-06.txt>, September 2008.
[34]
V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-03.txt>, September 2008.
[35]
V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-02.txt>, July 2008.
[36]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-07.txt>, December 2008.
[37]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-06.txt>, October 2008.
[38]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-05.txt>, July 2008.
[39]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-04.txt>, February 2008.
[40]
V. Roca, C. Neumann, D. Furodet.
Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-fec-bb-ldpc-08.txt>, January 2008.
[41]
V. Roca, C. Neumann, D. Furodet.
Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, IETF Request for Comments, RFC 5170, June 2008.
[42]
V. Roca.
FCAST: Scalable Object Delivery on top of the ALC Protocol, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-01.txt>, February 2008.
[43]
V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-00.txt>, October 2008.
[44]
K. Sbai, E. Salhi, C. Barakat.
Adaptive overlay for P2P membership management in MANET, Technical Report, INRIA, November 2008, no inria-00342691.

Other Publications

[45]
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, G. Tsudik.
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary, 2008, Cryptology ePrint Archive, Report 2008/293, submitted to the Elsevier journal Ad Hoc Networks.
[46]
D. Dujovne, T. Turletti, W. Dabbous.
"Experimental Methodology For Wireless Networks", October 2008, INRIA Research Report, RR-6667.
[47]
J. Farooq, T. Turletti.
"An IEEE 802.16 WiMAX Module for the NS-3 Simulator", November 2008, Technical Report, inria-00336858.

previous
next