Team PLANETE

Members
Overall Objectives
Scientific Foundations
Application Domains
Software
New Results
Contracts and Grants with Industry
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

[1]
C. Barakat.
Solutions efficaces pour la métrologie de l'Internet, Université de Nice Sophia Antipolis, 01 2009
http://tel.archives-ouvertes.fr/tel-00408745/en/, Habilitation à Diriger des Recherches.
[2]
D. Dujovne.
Amélioration des expérimentations sur réseaux sans fil, Université de Nice Sophia Antipolis, 05 2009
http://tel.archives-ouvertes.fr/tel-00408682/en/, Ph. D. Thesis.
[3]
A. Francillon.
Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks, INPG, October 2009, PhD thesis.
[4]
M. Soos.
Privacy-preserving Security Protocols for RFIDs, INPG, October 2009, PhD Thesis.

Articles in International Peer-Reviewed Journal

[5]
C. Castelluccia, A. Chan, E. Meykletun, G. Tsudik.
Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks, in: ACM ToSN (Transaction on Sensor Networks), 2009.
[6]
R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, G. Tsudik.
Data Security in Unattended Wireless Sensor Networks, in: Autonomic Network Computing, IEEE Transaction on Computers, 2009.
[7]
B. Donnet, B. Gueye, M. A. Kaafar.
A survey on Network Coordinates Systems, Design and Security, in: IEEE Communications Surveys and Tutorials, 2009.
[8]
B. Donnet, B. Gueye, M. A. Kaafar.
Path Similarity Evaluation Using Bloom Filters, in: Computer Networks, The International Journal of Computer and Telecommunications Networking, 2009.
[9]
T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, T. Turletti.
Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking, April 2009, vol. 17, no 2.
[10]
Mohamed Hossein. Manshaei, M. Lacage, C. Hoffmann, T. Turletti.
On Selecting the Best Transmission Mode for WiFi Devices, in: Wireless Communications and Mobile Computing, July 2009, vol. 9, no 7.
[11]
S. Peter, D. Westhoff, C. Castelluccia.
A Survey on the Encryption of Convergecast-Traffic with In-Network Processing, in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2009.
[12]
K. Sbai, C. Barakat.
Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7.
[13]
T. Spyropoulos, T. Turletti, K. Obraczka.
Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transaction on Mobile Computing, August 2009, vol. 8, no 8.

Articles in Non Peer-Reviewed Journal

[14]
C. Castelluccia, Mohamed Ali. Kaafar.
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet, in: ERCIM News, Special Theme on Future Internet Technology, 2009, vol. 77
http://ercim-news.ercim.org/images/stories/EN77/EN77-web.pdf.

International Peer-Reviewed Conference/Proceedings

[15]
A. Al-Hamra, N. Liogkas, A. Legout, C. Barakat.
Swarming Overlay Construction Strategies, in: Proceedings of ICCCN 2009, San Francisco, CA, USA, 2009
http://hal.inria.fr/inria-00385351/en/.
[16]
A. Alloum, B. Sayadi, V. Roca.
Reed Solomon Codes On Graph for DVB-SH Streaming Services, in: 22nd Wireless World Research Forum (WWRF'09), Paris, France, 2009
http://hal.inria.fr/inria-00390693/en/.
[17]
S. BenHamida, J. Pierrot, C. Castelluccia.
An Adaptive Quantization Algorithm for Secret Key Generation using Radio Channel Measurements, in: International Conference on New Technologies, Mobility and Security (NTMS), Dec. 2009.
[18]
C. Castelluccia, A. Francillon, C. Soriente, D. Perito.
On the Difficulty of Software-Based Attestation of Embedded Devices, in: ACM CCS'09: Proceedings of the 16th ACM conference on Computer and Communications Security, Nov. 2009.
[19]
C. Castelluccia, Mohamed Ali. Kaafar.
Owner-Centric Networking (OCN): Toward A Data Pollution-Free Internet, in: SAINT Workshop on Trust and Security in the Future Internet, FIST, Seattle, USA, IEEE Communications Society, July 2009.
[20]
C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.
Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference IMC 2009, Chicago, USA, ACM, November 2009.
[21]
A. Chaabane, Mohamed Ali. Kaafar.
Revisiting unstructured overlay network security, in: Foundations and Practice Of Security workshop, Grenoble, June 2009.
[22]
M. Cunche, V. Roca.
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes, in: IEEE Global Communications Conference (GLOBECOM 2009), November 2009.
[23]
M. Cunche, V. Roca.
Le RFC 5170 en pratique : conception et évaluation d'un codec AL-FEC LDPC-staircase hautes performances, in: Colloque Francophone sur l'Ingénierie des Protocoles (CFIP), October 2009.
[24]
J. Farooq, T. Turletti.
An IEEE 802.16 WiMAX Module for the NS-3 Simulator, in: ICST Simutools, Roma, Italy, March 2009.
[25]
A. Francillon, D. Perito, C. Castelluccia.
Defending embedded systems against control flow attacks, in: SECUCODE'09: 1st ACM wokshop on secure code execution, Nov. 2009.
[26]
L. A. Grieco, C. Barakat.
An Analysis of Packet Sampling in the Frequency Domain, in: proceedings of the ACM Internet Measurement Conference (IMC), Chicago, November 2009.
[27]
Mohamed Amine. Ismail, T. Turletti, W. Dabbous.
Optimizing the DVB-SH FEC Scheme for Efficient Erasure Recovery, in: Mobile Video Delivery (MOVID) Workshop at Infocom, Rio de Janeiro, Brazil, April 2009.
[28]
M. Jaber, C. Barakat.
Enhancing Application Identification By Means Of Sequential Testing, in: proceedings of IFIP/TC6 Networking Conference, Aachen, Germany, May 2009.
[29]
M. A. Kaafar, F. Cantin, B. Gueye, G. Leduc.
Detecting Triangle Inequality Violations for Internet Coordinate Systems, in: Proceedings of International Workshop on the Network of the Future, June 2009.
[30]
M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, W. Dabbous.
Certified Internet Coordinates, in: proceedings of IEEE ICCCN conference, San Francisco, August 2009.
[31]
A. Krifa, K. Sbai, C. Barakat, T. Turletti.
A standalone content sharing application for spontaneous communities of mobile handhelds, in: demo description in proceedings of the ACM SIGCOMM MobiHeld Workshop, Barcelona, August 2009.
[32]
A. Krifa, K. Sbai, C. Barakat, T. Turletti.
BitHoc: A content sharing application for Wireless Ad hoc Networks, in: demo description in proceedings of the IEEE Percom conference, Galveston, Texas, March 2009.
[33]
S. Le Blond, F. Le Fessant, E. Le Merrer.
Finding Good Partners in Availability-aware P2P Networks, in: International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'09), Lyon, France, 2009
http://hal.inria.fr/inria-00432741/en/.
[34]
Y. Liao, Mohamed Ali. Kaafar, B. Gueye, F. Cantin, P. Geurts, G. Leduc.
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning, in: Proceedings of the IFIP Networking Conference 2009, May 2009.
[35]
K. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.
Proximity-based Access Control for Implantable Medical Devices, in: ACM CCS'09: Proceedings of the 16th ACM conference on Computer and Communications Security, Nov. 2009.
[36]
K. Sbai, C. Barakat.
Revisiting content sharing in wireless ad hoc networks, in: proceedings of the fourth workshop on self-organizing systems (IWSOS), Zurich, December 2009.
[37]
K. Sbai, E. Salhi, C. Barakat.
A membership management protocol for mobile P2P networks, in: proceedings of the ACM Mobility Conference, Nice, September 2009.
[38]
M. Soos, K. Nohl, C. Castelluccia.
Extending SAT solvers to cryptographic problem, in: International Conference on Theory and Applications of Satisfiability Testing (SAT), jul 2009.
[39]
A. Soro, M. Cunche, J. Lacan, V. Roca.
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding, in: IEEE Global Communications Conference (GLOBECOM 2009), November 2009.
[40]
P. Vicat-Blanc Primet, V. Roca, J. Montagnat, Jean-Patrick. Gelas, O. Mornard, L. Giraud, G. Koslovski, T. Truong Huu.
A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet, in: 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'09), Shanghai, China, May 2009.

National Peer-Reviewed Conference/Proceedings

[41]
S. Le Blond, F. Le Fessant, E. Le Merrer.
Choix de partenaires en p2p suivant des critères de disponibilité, in: conférence francaise sur les systèmes d'exploitation, Toulouse, France, 2009
http://hal.inria.fr/inria-00432747/en/.
[42]
E. Salhi, M. K. Sbai, C. Barakat.
Neighborhood selection in mobile P2P networks, in: Algotel, Carry-Le-Rouet, France, A. Chaintreau, C. Magnien (editors), 2009
http://hal.inria.fr/inria-00383344/en/.

Workshops without Proceedings

[43]
B. Ben Romdhanne, D. Dujovne, T. Turletti.
Efficient and Scalable Merging Algorithms for Wireless Traces, in: Proceedings of the 4th ROADS Workshop, Montana, USA, October 2009.
[44]
M. Lacage, M. Ferrari, M. Hansen, T. Turletti.
NEPI: Using Independent Simulators, Emulators, and Testbeds for Easy Experimentation, in: Proceedings of the 4th ROADS Workshop, Montana, USA, October 2009.

Internal Reports

[45]
C. Barakat, K. Sbai, A. Decreme.
TICP: Transport Information collection Protocol, 2009
http://planete.inria.fr/ticp/.
[46]
B. Ben Romdhanne, D. Dujovne, T. Turletti, W. Dabbous.
Efficient and scalable merging algorithms for wireless traces, INRIA, 2009
http://hal.inria.fr/inria-00397832/en/, RR-6969.
[47]
M. Cunche, V. Roca.
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes, INRIA, 2009
http://hal.inria.fr/inria-00379155/en/, Technical report.
[48]
M. Cunche, V. Roca.
Le RFC 5170 en pratique : conception et évaluation d'un codec AL-FEC LDPC-staircase hautes performances, INRIA, 2009
http://hal.inria.fr/inria-00386166/en/, Rapport de recherche.
[49]
A. Krifa, K. Sbai, C. Barakat, T. Turletti.
BitHoc: BitHoc: Tracker-less BitTorrent for Mobile Ad Hoc Networks, 2009
http://planete.inria.fr/bithoc/.
[50]
M. Lacage, M. Ferrari, M. Hansen, T. Turletti, W. Dabbous.
NEPI: Using Independent Simulators, Emulators, and Testbeds for Easy Experimentation, INRIA, 2009
http://hal.inria.fr/inria-00397692/en/, RR-6967.
[51]
J. Lacan, E. Lochin, P.-U. Tournoux, A. Bouabdallah, V. Roca.
On-the-fly coding for time-constrained applications, Computing Research Repository, April 2009
http://www.citebase.org/abstract?id=oai:arXiv.org:0904.4202, Research Report.
[52]
J. Lacan, V. Roca, J. Peltotalo, S. Peltotalo.
Reed-Solomon Forward Error Correction (FEC) Schemes, April 2009, IETF Request for Comments, RFC 5510 (Standards Track/Proposed Standard).
[53]
S. Le Blond, F. Le Fessant, E. Le Merrer.
Finding Good Partners in Availability-aware P2P Networks, INRIA, 2009
http://hal.inria.fr/inria-00352529/en/, RR-6795.
[54]
S. Le Blond, A. Legout, W. Dabbous.
Pushing BitTorrent Locality to the Limit, INRIA, 2009
http://hal.inria.fr/inria-00343822/en/, Technical report.
[55]
S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castelluccia.
De-anonymizing BitTorrent Users on Tor, INRIA, December 2009, Technical report.
[56]
J.-C. Maureira, D. Dujovne, O. Dalle.
Network Provisioning for High Speed Vehicles Moving along Predictable Routes - Part 1: Spiderman Handover, INRIA, 2009
http://hal.inria.fr/inria-00369419/en/, RR-6850.
[57]
A. Rao, A. Legout.
Impact of Network Latencies on the Outcome of BitTorrent Experiments Performed on Testbeds, INRIA, December 2009, Technical report.
[58]
V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, March 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-04.txt>.
[59]
V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, July 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-05.txt>.
[60]
V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-05.txt>.
[61]
V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME, July 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-rs-01.txt>.
[62]
V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME, March 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-rs-00.txt>.
[63]
V. Roca, M. Cunche, J. Lacan.
LDPC-Staircase Forward Error Correction (FEC) Schemes for FECFRAME, July 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-ldpc-00.txt>.
[64]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, September 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-08.txt>.
[65]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, October 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-09.txt>.
[66]
V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, October 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-10.txt>.
[67]
V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, March 2009, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-01.txt>.
[68]
M. K. Sbai, C. Barakat.
Revisiting content sharing in wireless ad hoc networks, INRIA, 2009
http://hal.inria.fr/inria-00376521/en/, Rapport de recherche.
[69]
A. Soro, M. Cunche, J. Lacan, V. Roca.
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding, Computing Research Repository, January 2009
http://www.citebase.org/abstract?id=oai:arXiv.org:0901.3467, Research Report.

previous
next