Bibliography
Major publications by the team in recent years
-
1C. Castelluccia, E. De Cristofaro, D. Perito.
Private Information Disclosure from Web Searches, in: Proceedings of the 2010 Privacy Enhancing Technologies Symposium (PETS), 2010. -
2C. Castelluccia, A. Francillon, C. Soriente, D. Perito.
On the Difficulty of Software-Based Attestation of Embedded Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009. -
3C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.
Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference (IMC 2009), Chicago, USA, ACM, November 2009. -
4A. Chaabane, G. Acs, M. A. Kaafar.
You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012. -
5M. Cunche, V. Savin, V. Roca.
Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel, in: IEEE International Symposium on Information Theory and its Applications (ISITA'10) (http://arxiv.org/abs/1004.5217), April 2010. -
6A. Krifa, C. Barakat, T. Spyropoulos.
Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012. -
7I. Lassoued, C. Barakat, K. Avrachenkov.
Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011. -
8S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: proceedings of ACM SIGCOM/USENIX IMC'11, Berlin, Germany, November 2011. -
9A. Legout, N. Liogkas, E. Kohler, L. Zhang.
Clustering and Sharing Incentives in BitTorrent Systems, in: SIGMETRICS'07, San Diego, CA, USA, June 2007. -
10T. Li, Q. Ni, D. Malone, D. Leight, Y. Xiao, T. Turletti.
Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking Journal, 2009, vol. 17, no 2. -
11T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport, November 2012, IETF Request for Comments, RFC 6726 (Standards Track).
http://hal. inria. fr/ hal-00749951 -
12D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.
How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, July 2011. -
13A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.
Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011. -
14K. B. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.
Proximity-based Access Control for Implantable Medical Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009. -
15V. Roca, C. Neumann, D. Furodet.
Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, June 2008, IETF Request for Comments, RFC 5170 (Standards Track/Proposed Standard). -
16V. Roca.
Simple Authentication Schemes for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, April 2012, IETF Request for Comments, RFC 6584 (Standards Track).
http://hal. inria. fr/ hal-00745908 -
17D. Saucez, L. Iannone, O. Bonaventure, D. Farinacci.
Designing a Deployable Internet: The Locator/Identifier Separation Protocol, in: IEEE Internet Computing, 2012, vol. 16, p. 14-21.
http://doi. ieeecomputersociety. org/ 10. 1109/ MIC. 2012. 98 -
18K. Sbai, C. Barakat.
Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7, p. 1073-1086. -
19T. Spyropoulos, R. N. Bin Rais, T. Turletti, K. Obraczka, A. Vasilakos.
Routing for Disruption Tolerant Networks: Taxonomy and Design, in: ACM/Springer Wireless Networks (WINET), 2010, vol. 16, no 8. -
20T. Spyropoulos, T. Turletti, K. Obraczka.
Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transactions on Mobile Computing (TMC), 2009, vol. 8, no 8. -
21M. Watson, A. Begen, V. Roca.
Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard).
Doctoral Dissertations and Habilitation Theses
-
22S. Ben Hamida.
Embedded System Security, Université de Grenoble, February 2012. -
23A. Krifa.
Towards better content dissemination applications for Disruption Tolerant Networks, Université de Nice Sophia Antipolis, April 2012. -
24E. Mazza.
A formal framework for specifying and analyzing liabilities using log as digital evidence, Université de Grenoble, June 2012. -
25S. Ur-Rehman.
Benchmarking in Wireless Networks, Université de Nice Sophia Antipolis, January 2012.
Articles in International Peer-Reviewed Journals
-
26A. Apavatjrut, W. Znaidi, A. Fraboulet, C. Goursaud, K. Jaffrès-Runser, C. Lauradoux, M. Minier.
Energy Efficient Authentication Strategies for Network Coding, in: Concurrency and Computation: Practice and Experience, July 2012, vol. 24, no 10, p. 1086-1107. [ DOI : 10.1002/cpe.1767 ]
http://hal. inria. fr/ hal-00644484 -
27A. Krifa, C. Barakat, T. Spyropoulos.
Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, vol. 11, no 9. -
28D. Saucez, L. Iannone, O. Bonaventure, D. Farinacci.
Designing a Deployable Internet: The Locator/Identifier Separation Protocol, in: IEEE Internet Computing, 2012, vol. 16, p. 14-21.
http://doi. ieeecomputersociety. org/ 10. 1109/ MIC. 2012. 98
Articles in National Peer-Reviewed Journals
-
29J. Le Clainche, D. Le Métayer.
Vie privée et non discrimination: des protections complémentaires, une convergence nécessaire, in: Revue Lamy Droit de l'Immatériel, 2013, to appear.
Articles in Non Peer-Reviewed Journals
-
30R. Canonico, C. Canali, W. Dabbous.
Experimental evaluation of peer-to-peer applications, in: Peer-to-Peer Networking and Applications, 2012, Editorial paper.
http://link. springer. com/ article/ 10. 1007/ s12083-012-0177-z/ fulltext. html -
31A. Legout, W. Dabbous.
Linking a Social Identity to an IP Address, in: ERCIM News, 2012, no 90.
International Conferences with Proceedings
-
32A. Abidi, S. Gammar, F. Kamoun, W. Dabbous, T. Turletti, A. Legout.
Hybrid approach for experimental networking research, in: 13th International Conference on Distributed Computing and Networking (ICDCN), Hong Kong, China, January 2012.
http://www-sop. inria. fr/ members/ Thierry. Turletti/ icdcn11. pdf -
33G. Acs, C. Castelluccia, R. Chen.
Differentially Private Histogram Publishing through Lossy Compression, in: International Conference Data Mining, Brussels, Belgique, 2012.
http://hal. inria. fr/ hal-00747821 -
34K. Avrachenkov, P. Goncalves, A. Legout, M. Sokol.
Classification of Content and Users in BitTorrent by Semi-Supervised Learning Methods, in: Proc. of IEEE IWCMC'2012, TRAC Workshop, Limassol, Cyprus, IEEE, August 2012. -
35A. Benfarah, B. Miscopein, C. Lauradoux, J.-M. Gorce.
Towards Stronger Jamming Model: Application to TH-UWB Radio, in: IEEE WCNC - Wireless Communications and Networking Conference, Paris, France, April 2012.
http://hal. inria. fr/ hal-00758577 -
36D. Butin, D. Gray, G. Bella.
Towards Verifying Voter Privacy Through Unlinkability, in: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Springer Verlag, 2013, to appear. -
37C. Castelluccia, M. A. Kaafar, M.-D. Tran.
Betrayed by Your Ads!, in: PETS- Privacy Enhancing Tools Symposium, Vigo, Espagne, July 2012.
http://hal. inria. fr/ hal-00747823 -
38C. Castelluccia, D. Perito, D. Markus.
Adaptive Password-Strength Meters from Markov Models, in: 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, États-Unis, ISOC, February 2012.
http://hal. inria. fr/ hal-00747824 -
39A. Chaabane, G. Acs, M. A. Kaafar.
You Are What You Like! Information Leakage Through Users' Interests, in: Proc. Annual Network and Distributed System Security Symposium NDSS, 2012. -
40A. Chaabane, M. A. Kaafar, R. Boreli.
Big friend is watching you: analyzing online social networks tracking capabilities, in: Proceedings of the 2012 ACM SIGCOMM workshop on Workshop on online social networks, ACM, 2012, p. 7–12. -
41R. Chen, G. Acs, C. Castelluccia.
Differentially Private Sequential Data Publication via Variable-Length N-Grams, in: ACM Computer and Communication Security (CCS), Raleigh, États-Unis, ACM, October 2012.
http://hal. inria. fr/ hal-00747830 -
42T. Chen, M. A. Kaafar, A. Friedman, R. Boreli.
Is more always merrier?: a deep dive into online social footprints, in: Proceedings of the 2012 ACM SIGCOMM workshop on Workshop on online social networks, ACM, 2012, p. 67–72. -
43N. Cheng, P. Mohapatra, M. Cunche, M. A. Kaafar, R. Boreli, V. Srikanth.
Inferring User Relationship from Hidden Information in WLANs, in: MILCOM - IEEE Military Communications Conference - 2012, Orlando, États-Unis, 2012.
http://hal. inria. fr/ hal-00747850 -
44F. Coras, D. Saucez, L. Jakab, A. Cabellos-Aparicio, J. Domingo-Pascual.
Implementing a BGP-Free ISP Core with LISP, in: Globecom 2012, 2012. -
45M. Cunche, M. A. Kaafar, R. Boreli.
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, in: World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, IEEE, 2012, p. 1–9. -
46M. Cunche, M. A. Kaafar, T. Chen, R. Boreli, A. Mahanti.
Why are they hiding ? Study of an Anonymous File Sharing System, in: ESTEL-SEC - Security and Privacy Special Track of IEEE-AESS Conference in Europe about Space and Satellite Communications - 2012, Rome, Italie, October 2012.
http://hal. inria. fr/ hal-00747833 -
47M. Dardaillon, C. Lauradoux, T. Risset.
Hardware Implementation of the GPS authentication, in: ReConFig - International Conference on ReConFigurable Computing and FPGAs, Cancun, Mexique, December 2012.
http://hal. inria. fr/ hal-00737003 -
48C. Freire, A. Quereilhac, T. Turletti, W. Dabbous.
Automated deployment and customization of routing overlays on PlanetLab, in: ICSC TridentCom Conference 2012, Thessaloniki, Greece, June 2012.
http://planete. inria. fr/ Simulbed/ Tridentcom12nepi. pdf -
49M. Gabielkov, A. Legout.
The Complete Picture of the Twitter Social Graph, in: Proc. of ACM CoNext 2012, Nice, France, December 2012. -
50S. Hamida Tmar-Ben, P. Jean-Benoit, B. Denis, B. Uguen, C. Castelluccia.
On the security of UWB secret key generation methods against deterministic channel prediction attacks, in: Vehicular Technology Conference (VTC), Quebec, Canada, IEEE, September 2012.
http://hal. inria. fr/ hal-00747839 -
51L. Jacquin, V. Roca, M. A. Kaafar, F. Schuler, J.-L. Roch.
IBTrack: an ICMP black holes tracker, in: Proceedings of IEEE Globecom, IEEE, 2012. -
52D. Le Métayer, J. Le Clainche.
From the protection of data to the protection of individuals: extending the application of non discrimination principles, in: European Data Protection: In Good Health ?, S. Gutwirth, Y. Poullet, P. De Hert (editors), Springer Verlag, 2012, p. 315-330. -
53D. Le Métayer.
Privacy by design: a formal framework for the analysis of architectural choices, in: Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), IEEE, 2013, to appear. -
54Z. Li, J. Lin, M. Akodjenou, G. Xie, M. Kaafar, Y. Jin, G. Peng.
Watching Videos from Everywhere: a Study of the PPTV Mobile VoD System, in: Proceedings of the ACM SIGCOMM conference on Internet measurement conference, ACM, 2012. -
55F. Mattoussi, V. Roca, B. Sayadi.
Complexity Comparison Of The Use Of Vandermonde Versus Hankel Matrices To Build Systematic MDS Reed-Solomon Codes, in: SPAWC 2012 - 13th IEEE Internation Workshop on Signal Processing Advances in Wireless Communications, CESME, Turkey, June 2012.
http://hal. inria. fr/ hal-00719314 -
56F. Mattoussi, V. Roca, B. Sayadi.
Design of Small Rate, Close to Ideal, GLDPC-Staircase AL-FEC Codes for the Erasure Channel, in: IEEE Globecom 2012, Anaheim, United States, Dr. Hossein Eslambolchi (organizing committee general chair), Dec 2012.
http://hal. inria. fr/ hal-00736071 -
57F. Mattoussi, V. Savin, V. Roca, B. Sayadi.
Optimization With Exit Functions Of GLDPC-Staircase Codes For The BEC, in: SPAWC 2012 - 13th IEEE Internation Workshop on Signal Processing Advances in Wireless Communications, CESME, Turkey, June 2012.
http://hal. inria. fr/ hal-00719321 -
58M. Mendonca, K. Obraczka, T. Turletti.
The Case for Software-Defined Networking in Heterogeneous Networked Environments, in: ACM CoNEXT Student Workshop 2012, Nice, France, December 2012, Poster.
http://inrg. cse. ucsc. edu/ community/ Publications?action=AttachFile&do=get&target=hsdn-mini. pdf -
59X. Misseri, J.-L. Rougier, D. Saucez.
Internet routing diversity for stub networks with a Map-and-Encap scheme, in: IEEE ICC 2012, 2012. -
60L. Olejnik, C. Castelluccia, A. Janc.
Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns, in: 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012), Vigo, Espagne, July 2012.
http://hal. inria. fr/ hal-00747841 -
61A. Quereilhac, T. Turletti, W. Dabbous.
A Multi-Platform Event-Driven Controller for Network Experiments, in: ACM CoNEXT Student Workshop 2012, Nice, France, December 2012, Poster.
http://conferences. sigcomm. org/ co-next/ 2012/ eproceedings/ student/ p33. pdf -
62A. Rao, D. Choffnes, J. Sherry, A. Legout, A. Krishnamurthy, W. Dabbous.
Meddle: Middleboxes for Increased Transparency and Control of Mobile Traffic, in: Proc. of ACM CoNext 2012, Nice, France, December 2012. -
63R. Ravaioli, C. Barakat, G. Urvoy-Keller.
Chkdiff: Checking Traffic Differentiation at Internet Access, in: ACM CoNEXT Student Workshop, Nice, France, December 2012. -
64A. Roumy, V. Roca, B. Sayadi.
Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes, in: IEEE International Conference on Communications, Ottawa, Canada, February 2012.
http://hal. inria. fr/ hal-00668826 -
65D. Saucez, B. Donnet.
On the dynamics of locators in LISP, in: Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I, Berlin, Heidelberg, IFIP'12, Springer-Verlag, 2012, p. 385–396.
http://dx. doi. org/ 10. 1007/ 978-3-642-30045-5_29 -
66D. Saucez, W. Haddad.
Network in the Cloud: a Map-and-Encap Approach, in: IEEE CloudNet 2012, November 2012. -
67D. Saucez, J. Kim, L. Iannone, O. Bonaventure, C. Filsfils.
A local approach to fast failure recovery of LISP ingress tunnel routers, in: Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I, Berlin, Heidelberg, IFIP'12, Springer-Verlag, 2012, p. 397–408.
http://dx. doi. org/ 10. 1007/ 978-3-642-30045-5_30 -
68C. Testa, D. Rossi, A. Rao, A. Legout.
Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP swarms, in: Proc. of Traffic Monitoring and Analysis (TMA) Workshop, Vienna, Austria, March 2012. -
69G. Wang, H. Park, G. Xie, S. Moon, M. Kaafar, K. Salamatian.
A Genealogy of Information Spreading on Microblogs: a Galton-Watson-based Explicative Model, in: Proceedings of IEEE Infocom, IEEE, 2013. -
70Y. Wang, G. Xie, M. Kaafar.
FPC: A self-organized greedy routing in scale-free networks, in: Computers and Communications (ISCC), 2012 IEEE Symposium on, IEEE, 2012, p. 000102–000107.
Conferences without Proceedings
-
71D. Camara, F. Urbani, M. Lacage, T. Turletti, W. Dabbous.
Simulation Platform for Content Centric Networks Protocols Development, in: CCNx Workshop 2012, Sophia Antipolis, France, September 2012.
http://planete. inria. fr/ Simulbed/ ns3-ccnxcon12. pdf -
72A. Quereilhac, C. Freire, T. Turletti, W. Dabbous.
Controllable packet prioritization on PlanetLab using NEPI, in: Demo at ICSC TridentCom 2012, Thessaloniki, Greece, June 2012. -
73A. Quereilhac, A. Kalla, T. Turletti, W. Dabbous.
Easy CCNx experimentation on PlanetLab, in: Demo at CCNx Workshop 2012, Sophia Antipolis, France, September 2012.
http://planete. inria. fr/ Simulbed/ nepi-ccnxcon12. pdf -
74A. Quereilhac, T. Turletti, W. Dabbous.
Managing heterogeneous ns-3 experiments with NEPI, in: Poster at WNS3 Workshop 2012, Desenzano, Italy, March 2012.
http://www. nsnam. org/ wp-content/ uploads/ 2011/ 10/ nepiWNS3Poster_1200. pdf -
75D. Saucez, L. A. Grieco, C. Barakat.
AIMD and CCN: past and novel acronyms working together in the Future Internet, in: ACM CoNEXT Capacity Sharing Workshop 2012 (CSWS12), 2012.
Internal Reports
-
76F. De Meneses Neves Ramos Dos Santos, C. Barakat, T. Spyropoulos, T. Turletti.
Content Management in Mobile Wireless Networks, Inria, 2012, 54 p.
http://hal. inria. fr/ hal-00742734 -
77F. Goichon, C. Lauradoux, G. Salagnac, T. Vuillemin.
Entropy transfers in the Linux Random Number Generator, Inria, September 2012, no RR-8060, 26 p.
http://hal. inria. fr/ hal-00738638 -
78T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport (revised), June 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-flute-revised-16.txt . -
79T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport (revised), June 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-flute-revised-15.txt . -
80T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport (revised), March 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-flute-revised-14.txt . -
81T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport (revised), January 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-flute-revised-13.txt . -
82V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, November 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-newfcast-07.txt . -
83V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-newfcast-06.txt . -
84V. Roca, B. Adamson.
FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2012, IETF RMT Working Group, Work in Progress: draft-ietf-rmt-newfcast-05.txt . -
85V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, November 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-simple-rs-05 . -
86V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-simple-rs-04 . -
87V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.
Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, March 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-simple-rs-03 . -
88V. Roca, M. Cunche, J. Lacan.
Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-ldpc-04.txt . -
89V. Roca, M. Cunche, J. Lacan.
Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-ldpc-03.txt . -
90V. Roca, M. Cunche, J. Lacan.
Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, March 2012, IETF FECFRAME Working Group, Work in Progress: draft-ietf-fecframe-ldpc-02.txt . -
91V. Roca, A. Roumy, B. Sayadi.
The Generalized Object Encoding (GOE) Approach for the Forward Erasure Correction (FEC) Protection of Objects and its Application to Reed- Solomon Codes over GF(2x), March 2012, IETF RMT Working Group, Work in Progress: draft-roca-rmt-goe-fec-01.txt . -
92V. Roca, A. Roumy, B. Sayadi.
The Generalized Object Encoding (GOE) LDPC-Staircase FEC Scheme, July 2012, IETF RMT Working Group, Work in Progress: draft-roca-rmt-goe-ldpc-01.txt . -
93V. Roca, A. Roumy, B. Sayadi.
The Need for Extended Forward Erasure Correction (FEC) schemes: Problem Position, Inria, July 2012.
http://hal. inria. fr/ hal-00752510
Other Publications
-
94X.-N. Nguyen.
Software Defined Networking in Wireless Mesh Network, Université de Nice Sophia Antipolis, France, August 2012, UBINET MSc Thesis.
http://inrg. cse. ucsc. edu/ community/ Publications?action=AttachFile&do=get&target=nam-ms. pdf -
95T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.
FLUTE - File Delivery over Unidirectional Transport, November 2012, IETF Request for Comments, RFC 6726 (Standards Track).
http://hal. inria. fr/ hal-00749951 -
96T. Parmentelat, J. Augé, S. Avakian, L. Baron, M. Larabi, N. Turro.
Federation : implementation report, October 2012, ANR F-LAB project deliverable D1.2.
http://git. f-lab. fr/ ?p=d12. git;a=blob;f=d12. pdf;h=7ec59cfbc214e4a6a143d0f286d7c64671fc01e4;hb=HEAD -
97T. Parmentelat, A. Willner, C. Tranoris, T. Rakotoarivelo, J. Augé.
Control plane extension, September 2012, FP7 OpenLab project deliverable D1.1.
https://git. ict-openlab. eu/ ?p=deliverable1. 1. git;a=blob_plain;f=d11. pdf;hb=HEAD -
98V. Roca.
Simple Authentication Schemes for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, April 2012, IETF Request for Comments, RFC 6584 (Standards Track).
http://hal. inria. fr/ hal-00745908 -
99D. Saucez, C. Barakat, T. Turletti.
Leveraging Information Centric Networking in Over-The-Top Services, February 2012, Under submission Journal of Network and Systems Management.
http://hal. inria. fr/ hal-00684458 -
100D. Saucez, A. Kalla, C. Barakat, T. Turletti.
Minimizing Bandwidth on Peering Links with Deflection in Named Data Networking, March 2012, unpublished note.
http://hal. inria. fr/ hal-00684453 -
101C. Thiennot, C. Seyrat, V. Roca, J. Detchart.
Proposal for a Candidate for EMM-EFEC Work Item, May 2012, Document S4-120731, 3GPP TSG-SA4 meeting 69, Erlangen, Germany. -
102C. Thiennot, C. Seyrat, V. Roca, J. Detchart.
RS+LDPC EMM-EFEC contribution, August 2012, Document S4-121024, 3GPP TSG-SA4 meeting 70, Chicago, USA. -
103C. Thiennot, C. Seyrat, V. Roca, J. Lacan, J. Detchart.
RS+LDPC EMM-EFEC contribution - update, November 2012, Document S4-121471, 3GPP TSG-SA4 meeting 71, Bratislava, SLOVAKIA.