Bibliography
Major publications by the team in recent years
-
1C. Castelluccia, E. De Cristofaro, D. Perito.
Private Information Disclosure from Web Searches, in: Proceedings of the 2010 Privacy Enhancing Technologies Symposium (PETS), 2010. -
2C. Castelluccia, A. Francillon, C. Soriente, D. Perito.
On the Difficulty of Software-Based Attestation of Embedded Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009. -
3C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.
Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference (IMC 2009), Chicago, USA, ACM, November 2009. -
4A. Chaabane, G. Acs, M. A. Kaafar.
You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012. -
5M. Cunche, V. Savin, V. Roca.
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel, in: IEEE International Symposium on Information Theory and its Applications (ISITA'10), April 2010.
http://arxiv. org/ abs/ 1004. 5217 -
6A. Krifa, C. Barakat, T. Spyropoulos.
Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, to appear. -
7I. Lassoued, C. Barakat, K. Avrachenkov.
Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011. -
8S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: proceedings of ACM SIGCOM/USENIX IMC'11, Berlin, Germany, November 2011. -
9A. Legout, N. Liogkas, E. Kohler, L. Zhang.
Clustering and Sharing Incentives in BitTorrent Systems, in: SIGMETRICS'07, San Diego, CA, USA, June 2007. -
10T. Li, Q. Ni, D. Malone, D. Leight, Y. Xiao, T. Turletti.
Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking Journal, 2009, vol. 17, no 2. -
11D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.
How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, July 2011. -
12A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.
Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011. -
13K. B. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.
Proximity-based Access Control for Implantable Medical Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009. -
14V. Roca, C. Neumann, D. Furodet.
Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, June 2008, IETF Request for Comments, RFC 5170 (Standards Track/Proposed Standard). -
15K. Sbai, C. Barakat.
Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7, p. 1073-1086. -
16T. Spyropoulos, R. N. Bin Rais, T. Turletti, K. Obraczka, A. Vasilakos.
Routing for Disruption Tolerant Networks: Taxonomy and Design, in: ACM/Springer Wireless Networks (WINET), 2010, vol. 16, no 8. -
17T. Spyropoulos, T. Turletti, K. Obraczka.
Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transactions on Mobile Computing (TMC), 2009, vol. 8, no 8. -
18M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard).
Doctoral Dissertations and Habilitation Theses
-
19R. N. Bin Rais.
Communication Mechanisms for Message Delivery in Heterogeneous Networks Prone to Episodic Connectivity, Université de Nice Sophia-Antipolis, February 2011.
http://hal. inria. fr/ tel-00590626/ en -
20M. Jaber.
Internet Traffic Profiling and Identification, Université de Nice Sophia Antipolis, October 2011. -
21I. Lassoued.
Adaptive Monitoring and Management of Internet Traffic, Université de Nice Sophia Antipolis, December 2011. -
22S. Le Blond.
Is Privacy Dead (in P2P Networks)?, Université de Nice Sophia Antipolis, April 2011. -
23D. Perito.
Exécution sécurisée de code sur systèmes embarqués, Université de Grenoble, October 2011.
http://hal. inria. fr/ tel-00639053/ en
Articles in International Peer-Reviewed Journal
-
24R. N. Bin Rais, T. Turletti, K. Obraczka.
Message Delivery in Heterogeneous Networks prone to Episodic Connectivity, in: ACM/Kluwer Wireless Networks, 2011, vol. 17, no 8, p. 1775-1794. -
25B. Donnet, B. Gueye, M. A. Kaafar.
Path similarity evaluation using bloom filters, in: Computer Networks, 2011.
http://dx. doi. org/ 10. 1016/ j. comnet. 2011. 11. 003 -
26L. A. Grieco, C. Barakat, M. Marzulli.
Spectral Models for Bitrate Measurement from Packet Sampled Traffic, in: IEEE Transactions on Network and Service Management, June 2011, vol. 8, no 2. -
27A. Krifa, C. Barakat, T. Spyropoulos.
Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, to appear. -
28I. Poese, S. Uhlig, M. A. Kaafar, B. Donnet, B. Gueye.
IP Geolocation Databases: Unreliable?, in: ACM SIGCOMM Computer Communication Review, April 2011, vol. 41, no 2. -
29P.-U. Tournoux, E. Lochin, J. Lacan, A. Bouabdallah, V. Roca.
On-the-fly erasure coding for real-time video applications, in: IEEE Transactions on Multimedia, August 2011, vol. 13, no 4.
International Conferences with Proceedings
-
30E. Altman, A. Legout, Y. Xu.
Network Non-Neutrality Debate: An Economic Analysis, in: IFIP Networking 2011, Valencia, Spain, Springer, May 2011, 12 p.
http://hal. inria. fr/ inria-00568922/ en -
31R. N. Bin Rais, M. Abdelmoula, T. Turletti, K. Obraczka.
Naming for Heterogeneous Networks Prone to Episodic Connectivity, in: IEEE WCNC, Cancun, Mexico, March 2011. -
32R. N. Bin Rais, M. Mendonca, T. Turletti, K. Obraczka.
Towards Truly Heterogeneous Internets: Bridging Infrastructure-based and Infrastructure -less Networks, in: The third International Conference on COMmunication Systems and NETworkS (COMSNETS), Bangalore, India, January 2011. -
33E. Bursztein, R. Beauxis, P. Hristo, D. Perito, C. Fabry, J. Mitchell.
The Failure of Noise-Based Non-Continuous Audio Captchas, in: Proceedings of the 37th IEEE Symposium on Security & Privacy, Oakland California, 2011. -
34C. Castelluccia, G. Acs.
I have a DREAM! (DiffeRentially privatE smArt Metering), in: Proceedings of the The 13th Information Hiding Conference (IH), 2011. -
35C. Castelluccia, G. Acs, W. Lecat.
Protecting against Physical Resource Monitoring, in: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society (WPES), 2011. -
36C. Castelluccia, E. De Cristofaro, A. Francillon, M. Ali Kaafar.
EphPub: Toward Robust Ephemeral Publishing, in: proceedings of the 19th IEEE International Conference on Network Protocols (ICNP), Vancouver, October 2011.
http://ephpub. googlecode. com -
37A. Chaabane, G. Acs, M. A. Kaafar.
You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012. -
38M. Jaber, R. Cascella, C. Barakat.
Boosting statistical application identification by flow correlation, in: proceedings of EuroNF-TCCFI (International Workshop on Traffic and Congestion Control for the Future Internet), Greece, April 2011. -
39M. Jaber, R. Cascella, C. Barakat.
Can we trust the inter-packet time for traffic classification?, in: proceedings of IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011. -
40M. Jaber, R. Cascella, C. Barakat.
Using host profiling to refine statistical application identification, in: proceedings of IEEE INFOCOM Mini-Conference, Orlando, FL, March 2012. -
41A. Krifa, C. Barakat, T. Spyropoulos.
MobiTrade: Trading Content in Disruption Tolerant Networks, in: proceedings of ACM Mobicom Workshop on Challenged Networks (CHANTS), Las Vegas, September 2011. -
42A. Labidi, S. Mettali Gammar, F. Kamoun, W. Dabbous, T. Turletti, A. Legout.
Hybrid approach for experimental networking research, in: 13th International Conference on Distributed Computing and Networking, (ICDCN), Hong Kong, China, January 2012. -
43I. Lassoued, C. Barakat, K. Avrachenkov.
Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011. -
44I. Lassoued, C. Barakat.
A Multi-task Adaptive Monitoring System Combining Different Sampling Primitives, in: proceedings of the 23rd International Teletrafic Congress (ITC), San Francisco, September 2011. -
45S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, C. Castelluccia, A. Legout, W. Dabbous.
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, in: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, United States, USENIX, March 2011.
http://hal. inria. fr/ inria-00574178/ en -
46S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: Internet Measurement Conference (ACM/USENIX IMC), ACM/USENIX, November 2011.
http://hal. inria. fr/ inria-00632780/ en -
47D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.
How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium(PETS), Waterloo, July 2011. -
48A. Quereilhac, M. Lacage, C. Freire, T. Turletti, W. Dabbous.
NEPI: An Integration Framework for Network Experimentation, in: 19th International Conference on Software Telecommunications and Computer Networks (SoftCOM), Dubrovnik, Croatia, September 2011. -
49A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.
Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011. -
50C. Tala, L. Ahumada, D. Dujovne, S. Ur-Rehman, T. Turletti, W. Dabbous.
Guidelines for the accurate design of empirical studies in wireless networks, in: 7th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), Shangai, China, April 2011. -
51S. Ur-Rehman, T. Turletti, W. Dabbous.
Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference, in: IEEE Workshop on multiMedia Applications over Wireless Networks (MediaWiN), Corfu, Greece, June 2011. -
52R. Vilardi, L. A. Grieco, G. Boggia, C. Barakat.
Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems, in: proceedings of the 2nd International Workshop on TRaffic Analysis and Classification (TRAC), Istanbul, July 2011.
Internal Reports
-
53A. Krifa, C. Barakat, T. Spyropoulos.
MobiTrade: Interest driven content dissemination architecture for Disruption Tolerant Networks, INRIA, February 2011.
http://hal. inria. fr/ inria-00568235/ en -
54T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport (revised), February 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-12.txt>. -
55S. Rehman, T. Turletti, W. Dabbous.
A Roadmap for Benchmarking in Wireless Networks, INRIA, August 2011, no RR-7707.
http://hal. inria. fr/ inria-00614167/ en -
56V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-05.txt>. -
57V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, July 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-04.txt>. -
58V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, February 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-03.txt>. -
59V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, November 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-02>. -
60V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, September 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-01>. -
61V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, February 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-01>. -
62V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, December 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-06.txt>. -
63V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, September 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-05.txt>. -
64V. Roca.
Simple Authentication Schemes for the ALC and NORM Protocols, July 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-04.txt>. -
65V. Roca, A. Roumy, B. Sayadi.
The Generalized Object Encoding (GOE) Approach for the Forward Erasure Correction (FEC) Protection of Objects and its Application to Reed- Solomon Codes over GF(2x), July 2011, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-fec-00.txt>. -
66V. Roca, A. Roumy, B. Sayadi.
The Generalized Object Encoding (GOE) LDPC-Staircase FEC Scheme, October 2011, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-ldpc-00.txt>. -
67A. Roumy, V. Roca, B. Sayadi, R. Imad.
Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach, INRIA, July 2011, no RR-7699, submitted to Infocom 2012.
http://hal. inria. fr/ inria-00612583/ en -
68M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard). -
69M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, June 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-15.txt>. -
70M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, March 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-14.txt>. -
71M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, February 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-13.txt>. -
72M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, January 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-12.txt>.
Other Publications
-
73S. Bouckaert, V. Van Gerwen, M. Ingrid, S. C. Phillips, J. Wilander, S. Ur-Rehman, T. Turletti, W. Dabbous.
"Benchmarking computers and computer networks", September 2011, Whitepaper, IST Fire projects. -
74A. Krifa, M. Mendonca, R. N. B. Rais, C. Barakat, T. Turletti, K. Obraczka.
"Efficient Content Dissemination in Heterogeneous Networks Prone to Episodic Connectivity", August 2011, Demo at ACM Sigcomm.