Bibliography
Publications of the year
Doctoral Dissertations and Habilitation Theses
- [1]
- C. Barakat.
Solutions efficaces pour la métrologie de l'Internet, Université de Nice Sophia Antipolis, 01 2009
http://tel.archives-ouvertes.fr/tel-00408745/en/, Habilitation à Diriger des Recherches. - [2]
- D. Dujovne.
Amélioration des expérimentations sur réseaux sans fil, Université de Nice Sophia Antipolis, 05 2009
http://tel.archives-ouvertes.fr/tel-00408682/en/, Ph. D. Thesis. - [3]
- A. Francillon.
Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks, INPG, October 2009, PhD thesis. - [4]
- M. Soos.
Privacy-preserving Security Protocols for RFIDs, INPG, October 2009, PhD Thesis.
Articles in International Peer-Reviewed Journal
- [5]
- C. Castelluccia, A. Chan, E. Meykletun, G. Tsudik.
Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks, in: ACM ToSN (Transaction on Sensor Networks), 2009. - [6]
- R. Di Pietro, L. V. Mancini, C. Soriente, A. Spognardi, G. Tsudik.
Data Security in Unattended Wireless Sensor Networks, in: Autonomic Network Computing, IEEE Transaction on Computers, 2009. - [7]
- B. Donnet, B. Gueye, M. A. Kaafar.
A survey on Network Coordinates Systems, Design and Security, in: IEEE Communications Surveys and Tutorials, 2009. - [8]
- B. Donnet, B. Gueye, M. A. Kaafar.
Path Similarity Evaluation Using Bloom Filters, in: Computer Networks, The International Journal of Computer and Telecommunications Networking, 2009. - [9]
- T. Li, Q. Ni, D. Malone, D. Leith, Y. Xiao, T. Turletti.
Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking, April 2009, vol. 17, no 2. - [10]
- Mohamed Hossein. Manshaei, M. Lacage, C. Hoffmann, T. Turletti.
On Selecting the Best Transmission Mode for WiFi Devices, in: Wireless Communications and Mobile Computing, July 2009, vol. 9, no 7. - [11]
- S. Peter, D. Westhoff, C. Castelluccia.
A Survey on the Encryption of Convergecast-Traffic with In-Network Processing, in: IEEE Transactions on Dependable and Secure Computing (TDSC), 2009. - [12]
- K. Sbai, C. Barakat.
Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7. - [13]
- T. Spyropoulos, T. Turletti, K. Obraczka.
Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transaction on Mobile Computing, August 2009, vol. 8, no 8.
Articles in Non Peer-Reviewed Journal
- [14]
- C. Castelluccia, Mohamed Ali. Kaafar.
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet, in: ERCIM News, Special Theme on Future Internet Technology, 2009, vol. 77
http://ercim-news.ercim.org/images/stories/EN77/EN77-web.pdf.
International Peer-Reviewed Conference/Proceedings
- [15]
- A. Al-Hamra, N. Liogkas, A. Legout, C. Barakat.
Swarming Overlay Construction Strategies, in: Proceedings of ICCCN 2009, San Francisco, CA, USA, 2009
http://hal.inria.fr/inria-00385351/en/. - [16]
- A. Alloum, B. Sayadi, V. Roca.
Reed Solomon Codes On Graph for DVB-SH Streaming Services, in: 22nd Wireless World Research Forum (WWRF'09), Paris, France, 2009
http://hal.inria.fr/inria-00390693/en/. - [17]
- S. BenHamida, J. Pierrot, C. Castelluccia.
An Adaptive Quantization Algorithm for Secret Key Generation using Radio Channel Measurements, in: International Conference on New Technologies, Mobility and Security (NTMS), Dec. 2009. - [18]
- C. Castelluccia, A. Francillon, C. Soriente, D. Perito.
On the Difficulty of Software-Based Attestation of Embedded Devices, in: ACM CCS'09: Proceedings of the 16th ACM conference on Computer and Communications Security, Nov. 2009. - [19]
- C. Castelluccia, Mohamed Ali. Kaafar.
Owner-Centric Networking (OCN): Toward A Data Pollution-Free Internet, in: SAINT Workshop on Trust and Security in the Future Internet, FIST, Seattle, USA, IEEE Communications Society, July 2009. - [20]
- C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.
Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference IMC 2009, Chicago, USA, ACM, November 2009. - [21]
- A. Chaabane, Mohamed Ali. Kaafar.
Revisiting unstructured overlay network security, in: Foundations and Practice Of Security workshop, Grenoble, June 2009. - [22]
- M. Cunche, V. Roca.
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes, in: IEEE Global Communications Conference (GLOBECOM 2009), November 2009. - [23]
- M. Cunche, V. Roca.
Le RFC 5170 en pratique : conception et évaluation d'un codec AL-FEC LDPC-staircase hautes performances, in: Colloque Francophone sur l'Ingénierie des Protocoles (CFIP), October 2009. - [24]
- J. Farooq, T. Turletti.
An IEEE 802.16 WiMAX Module for the NS-3 Simulator, in: ICST Simutools, Roma, Italy, March 2009. - [25]
- A. Francillon, D. Perito, C. Castelluccia.
Defending embedded systems against control flow attacks, in: SECUCODE'09: 1st ACM wokshop on secure code execution, Nov. 2009. - [26]
- L. A. Grieco, C. Barakat.
An Analysis of Packet Sampling in the Frequency Domain, in: proceedings of the ACM Internet Measurement Conference (IMC), Chicago, November 2009. - [27]
- Mohamed Amine. Ismail, T. Turletti, W. Dabbous.
Optimizing the DVB-SH FEC Scheme for Efficient Erasure Recovery, in: Mobile Video Delivery (MOVID) Workshop at Infocom, Rio de Janeiro, Brazil, April 2009. - [28]
- M. Jaber, C. Barakat.
Enhancing Application Identification By Means Of Sequential Testing, in: proceedings of IFIP/TC6 Networking Conference, Aachen, Germany, May 2009. - [29]
- M. A. Kaafar, F. Cantin, B. Gueye, G. Leduc.
Detecting Triangle Inequality Violations for Internet Coordinate Systems, in: Proceedings of International Workshop on the Network of the Future, June 2009. - [30]
- M. A. Kaafar, L. Mathy, C. Barakat, K. Salamatian, T. Turletti, W. Dabbous.
Certified Internet Coordinates, in: proceedings of IEEE ICCCN conference, San Francisco, August 2009. - [31]
- A. Krifa, K. Sbai, C. Barakat, T. Turletti.
A standalone content sharing application for spontaneous communities of mobile handhelds, in: demo description in proceedings of the ACM SIGCOMM MobiHeld Workshop, Barcelona, August 2009. - [32]
- A. Krifa, K. Sbai, C. Barakat, T. Turletti.
BitHoc: A content sharing application for Wireless Ad hoc Networks, in: demo description in proceedings of the IEEE Percom conference, Galveston, Texas, March 2009. - [33]
- S. Le Blond, F. Le Fessant, E. Le Merrer.
Finding Good Partners in Availability-aware P2P Networks, in: International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'09), Lyon, France, 2009
http://hal.inria.fr/inria-00432741/en/. - [34]
- Y. Liao, Mohamed Ali. Kaafar, B. Gueye, F. Cantin, P. Geurts, G. Leduc.
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning, in: Proceedings of the IFIP Networking Conference 2009, May 2009. - [35]
- K. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.
Proximity-based Access Control for Implantable Medical Devices, in: ACM CCS'09: Proceedings of the 16th ACM conference on Computer and Communications Security, Nov. 2009. - [36]
- K. Sbai, C. Barakat.
Revisiting content sharing in wireless ad hoc networks, in: proceedings of the fourth workshop on self-organizing systems (IWSOS), Zurich, December 2009. - [37]
- K. Sbai, E. Salhi, C. Barakat.
A membership management protocol for mobile P2P networks, in: proceedings of the ACM Mobility Conference, Nice, September 2009. - [38]
- M. Soos, K. Nohl, C. Castelluccia.
Extending SAT solvers to cryptographic problem, in: International Conference on Theory and Applications of Satisfiability Testing (SAT), jul 2009. - [39]
- A. Soro, M. Cunche, J. Lacan, V. Roca.
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding, in: IEEE Global Communications Conference (GLOBECOM 2009), November 2009. - [40]
- P. Vicat-Blanc Primet, V. Roca, J. Montagnat, Jean-Patrick. Gelas, O. Mornard, L. Giraud, G. Koslovski, T. Truong Huu.
A Scalable Security Model for Enabling Dynamic Virtual Private Execution Infrastructures on the Internet, in: 9th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'09), Shanghai, China, May 2009.
National Peer-Reviewed Conference/Proceedings
- [41]
- S. Le Blond, F. Le Fessant, E. Le Merrer.
Choix de partenaires en p2p suivant des critères de disponibilité, in: conférence francaise sur les systèmes d'exploitation, Toulouse, France, 2009
http://hal.inria.fr/inria-00432747/en/. - [42]
- E. Salhi, M. K. Sbai, C. Barakat.
Neighborhood selection in mobile P2P networks, in: Algotel, Carry-Le-Rouet, France, A. Chaintreau, C. Magnien (editors), 2009
http://hal.inria.fr/inria-00383344/en/.
Workshops without Proceedings
- [43]
- B. Ben Romdhanne, D. Dujovne, T. Turletti.
Efficient and Scalable Merging Algorithms for Wireless Traces, in: Proceedings of the 4th ROADS Workshop, Montana, USA, October 2009. - [44]
- M. Lacage, M. Ferrari, M. Hansen, T. Turletti.
NEPI: Using Independent Simulators, Emulators, and Testbeds for Easy Experimentation, in: Proceedings of the 4th ROADS Workshop, Montana, USA, October 2009.
Internal Reports
- [45]
- C. Barakat, K. Sbai, A. Decreme.
TICP: Transport Information collection Protocol, 2009
http://planete.inria.fr/ticp/. - [46]
- B. Ben Romdhanne, D. Dujovne, T. Turletti, W. Dabbous.
Efficient and scalable merging algorithms for wireless traces, INRIA, 2009
http://hal.inria.fr/inria-00397832/en/, RR-6969. - [47]
- M. Cunche, V. Roca.
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes, INRIA, 2009
http://hal.inria.fr/inria-00379155/en/, Technical report. - [48]
- M. Cunche, V. Roca.
Le RFC 5170 en pratique : conception et évaluation d'un codec AL-FEC LDPC-staircase hautes performances, INRIA, 2009
http://hal.inria.fr/inria-00386166/en/, Rapport de recherche. - [49]
- A. Krifa, K. Sbai, C. Barakat, T. Turletti.
BitHoc: BitHoc: Tracker-less BitTorrent for Mobile Ad Hoc Networks, 2009
http://planete.inria.fr/bithoc/. - [50]
- M. Lacage, M. Ferrari, M. Hansen, T. Turletti, W. Dabbous.
NEPI: Using Independent Simulators, Emulators, and Testbeds for Easy Experimentation, INRIA, 2009
http://hal.inria.fr/inria-00397692/en/, RR-6967. - [51]
- J. Lacan, E. Lochin, P.-U. Tournoux, A. Bouabdallah, V. Roca.
On-the-fly coding for time-constrained applications, Computing Research Repository, April 2009
http://www.citebase.org/abstract?id=oai:arXiv.org:0904.4202, Research Report. - [52]
- J. Lacan, V. Roca, J. Peltotalo, S. Peltotalo.
Reed-Solomon Forward Error Correction (FEC) Schemes, April 2009, IETF Request for Comments, RFC 5510 (Standards Track/Proposed Standard). - [53]
- S. Le Blond, F. Le Fessant, E. Le Merrer.
Finding Good Partners in Availability-aware P2P Networks, INRIA, 2009
http://hal.inria.fr/inria-00352529/en/, RR-6795. - [54]
- S. Le Blond, A. Legout, W. Dabbous.
Pushing BitTorrent Locality to the Limit, INRIA, 2009
http://hal.inria.fr/inria-00343822/en/, Technical report. - [55]
- S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castelluccia.
De-anonymizing BitTorrent Users on Tor, INRIA, December 2009, Technical report. - [56]
- J.-C. Maureira, D. Dujovne, O. Dalle.
Network Provisioning for High Speed Vehicles Moving along Predictable Routes - Part 1: Spiderman Handover, INRIA, 2009
http://hal.inria.fr/inria-00369419/en/, RR-6850. - [57]
- A. Rao, A. Legout.
Impact of Network Latencies on the Outcome of BitTorrent Experiments Performed on Testbeds, INRIA, December 2009, Technical report. - [58]
- V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, March 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-04.txt>. - [59]
- V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, July 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-05.txt>. - [60]
- V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2009, IETF RMT Working Group (individual document), Work in Progress: <draft-roca-rmt-newfcast-05.txt>. - [61]
- V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME, July 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-rs-01.txt>. - [62]
- V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Reed-Solomon Forward Error Correction (FEC) Schemes for FECFRAME, March 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-rs-00.txt>. - [63]
- V. Roca, M. Cunche, J. Lacan.
LDPC-Staircase Forward Error Correction (FEC) Schemes for FECFRAME, July 2009, IETF FECFRAME Working Group, Work in Progress: <draft-roca-fecframe-ldpc-00.txt>. - [64]
- V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, September 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-08.txt>. - [65]
- V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, October 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-09.txt>. - [66]
- V. Roca, A. Francillon, S. Faurite.
TESLA source authentication in the ALC and NORM protocols, October 2009, IETF RMT Working Group, Work in Progress: <draft-msec-tesla-for-alc-norm-10.txt>. - [67]
- V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, March 2009, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-01.txt>. - [68]
- M. K. Sbai, C. Barakat.
Revisiting content sharing in wireless ad hoc networks, INRIA, 2009
http://hal.inria.fr/inria-00376521/en/, Rapport de recherche. - [69]
- A. Soro, M. Cunche, J. Lacan, V. Roca.
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding, Computing Research Repository, January 2009
http://www.citebase.org/abstract?id=oai:arXiv.org:0901.3467, Research Report.