EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1C. Castelluccia, E. De Cristofaro, D. Perito.

    Private Information Disclosure from Web Searches, in: Proceedings of the 2010 Privacy Enhancing Technologies Symposium (PETS), 2010.
  • 2C. Castelluccia, A. Francillon, C. Soriente, D. Perito.

    On the Difficulty of Software-Based Attestation of Embedded Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  • 3C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.

    Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference (IMC 2009), Chicago, USA, ACM, November 2009.
  • 4A. Chaabane, G. Acs, M. A. Kaafar.

    You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012.
  • 5M. Cunche, V. Savin, V. Roca.

    Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel, in: IEEE International Symposium on Information Theory and its Applications (ISITA'10), April 2010.

    http://arxiv.org/abs/1004.5217
  • 6A. Krifa, C. Barakat, T. Spyropoulos.

    Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, to appear.
  • 7I. Lassoued, C. Barakat, K. Avrachenkov.

    Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011.
  • 8S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: proceedings of ACM SIGCOM/USENIX IMC'11, Berlin, Germany, November 2011.
  • 9A. Legout, N. Liogkas, E. Kohler, L. Zhang.

    Clustering and Sharing Incentives in BitTorrent Systems, in: SIGMETRICS'07, San Diego, CA, USA, June 2007.
  • 10T. Li, Q. Ni, D. Malone, D. Leight, Y. Xiao, T. Turletti.

    Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking Journal, 2009, vol. 17, no 2.
  • 11D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.

    How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, July 2011.
  • 12A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.

    Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011.
  • 13K. B. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.

    Proximity-based Access Control for Implantable Medical Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  • 14V. Roca, C. Neumann, D. Furodet.

    Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, June 2008, IETF Request for Comments, RFC 5170 (Standards Track/Proposed Standard).
  • 15K. Sbai, C. Barakat.

    Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7, p. 1073-1086.
  • 16T. Spyropoulos, R. N. Bin Rais, T. Turletti, K. Obraczka, A. Vasilakos.

    Routing for Disruption Tolerant Networks: Taxonomy and Design, in: ACM/Springer Wireless Networks (WINET), 2010, vol. 16, no 8.
  • 17T. Spyropoulos, T. Turletti, K. Obraczka.

    Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transactions on Mobile Computing (TMC), 2009, vol. 8, no 8.
  • 18M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard).
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 19R. N. Bin Rais.

    Communication Mechanisms for Message Delivery in Heterogeneous Networks Prone to Episodic Connectivity, Université de Nice Sophia-Antipolis, February 2011.

    http://hal.inria.fr/tel-00590626/en
  • 20M. Jaber.

    Internet Traffic Profiling and Identification, Université de Nice Sophia Antipolis, October 2011.
  • 21I. Lassoued.

    Adaptive Monitoring and Management of Internet Traffic, Université de Nice Sophia Antipolis, December 2011.
  • 22S. Le Blond.

    Is Privacy Dead (in P2P Networks)?, Université de Nice Sophia Antipolis, April 2011.
  • 23D. Perito.

    Exécution sécurisée de code sur systèmes embarqués, Université de Grenoble, October 2011.

    http://hal.inria.fr/tel-00639053/en

Articles in International Peer-Reviewed Journal

  • 24R. N. Bin Rais, T. Turletti, K. Obraczka.

    Message Delivery in Heterogeneous Networks prone to Episodic Connectivity, in: ACM/Kluwer Wireless Networks, 2011, vol. 17, no 8, p. 1775-1794.
  • 25B. Donnet, B. Gueye, M. A. Kaafar.

    Path similarity evaluation using bloom filters, in: Computer Networks, 2011.

    http://dx.doi.org/10.1016/j.comnet.2011.11.003
  • 26L. A. Grieco, C. Barakat, M. Marzulli.

    Spectral Models for Bitrate Measurement from Packet Sampled Traffic, in: IEEE Transactions on Network and Service Management, June 2011, vol. 8, no 2.
  • 27A. Krifa, C. Barakat, T. Spyropoulos.

    Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, to appear.
  • 28I. Poese, S. Uhlig, M. A. Kaafar, B. Donnet, B. Gueye.

    IP Geolocation Databases: Unreliable?, in: ACM SIGCOMM Computer Communication Review, April 2011, vol. 41, no 2.
  • 29P.-U. Tournoux, E. Lochin, J. Lacan, A. Bouabdallah, V. Roca.

    On-the-fly erasure coding for real-time video applications, in: IEEE Transactions on Multimedia, August 2011, vol. 13, no 4.

International Conferences with Proceedings

  • 30E. Altman, A. Legout, Y. Xu.

    Network Non-Neutrality Debate: An Economic Analysis, in: IFIP Networking 2011, Valencia, Spain, Springer, May 2011, 12 p.

    http://hal.inria.fr/inria-00568922/en
  • 31R. N. Bin Rais, M. Abdelmoula, T. Turletti, K. Obraczka.

    Naming for Heterogeneous Networks Prone to Episodic Connectivity, in: IEEE WCNC, Cancun, Mexico, March 2011.
  • 32R. N. Bin Rais, M. Mendonca, T. Turletti, K. Obraczka.

    Towards Truly Heterogeneous Internets: Bridging Infrastructure-based and Infrastructure -less Networks, in: The third International Conference on COMmunication Systems and NETworkS (COMSNETS), Bangalore, India, January 2011.
  • 33E. Bursztein, R. Beauxis, P. Hristo, D. Perito, C. Fabry, J. Mitchell.

    The Failure of Noise-Based Non-Continuous Audio Captchas, in: Proceedings of the 37th IEEE Symposium on Security & Privacy, Oakland California, 2011.
  • 34C. Castelluccia, G. Acs.

    I have a DREAM! (DiffeRentially privatE smArt Metering), in: Proceedings of the The 13th Information Hiding Conference (IH), 2011.
  • 35C. Castelluccia, G. Acs, W. Lecat.

    Protecting against Physical Resource Monitoring, in: Proceedings of the 10th ACM Workshop on Privacy in the Electronic Society (WPES), 2011.
  • 36C. Castelluccia, E. De Cristofaro, A. Francillon, M. Ali Kaafar.

    EphPub: Toward Robust Ephemeral Publishing, in: proceedings of the 19th IEEE International Conference on Network Protocols (ICNP), Vancouver, October 2011.

    http://ephpub.googlecode.com
  • 37A. Chaabane, G. Acs, M. A. Kaafar.

    You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012.
  • 38M. Jaber, R. Cascella, C. Barakat.

    Boosting statistical application identification by flow correlation, in: proceedings of EuroNF-TCCFI (International Workshop on Traffic and Congestion Control for the Future Internet), Greece, April 2011.
  • 39M. Jaber, R. Cascella, C. Barakat.

    Can we trust the inter-packet time for traffic classification?, in: proceedings of IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011.
  • 40M. Jaber, R. Cascella, C. Barakat.

    Using host profiling to refine statistical application identification, in: proceedings of IEEE INFOCOM Mini-Conference, Orlando, FL, March 2012.
  • 41A. Krifa, C. Barakat, T. Spyropoulos.

    MobiTrade: Trading Content in Disruption Tolerant Networks, in: proceedings of ACM Mobicom Workshop on Challenged Networks (CHANTS), Las Vegas, September 2011.
  • 42A. Labidi, S. Mettali Gammar, F. Kamoun, W. Dabbous, T. Turletti, A. Legout.

    Hybrid approach for experimental networking research, in: 13th International Conference on Distributed Computing and Networking, (ICDCN), Hong Kong, China, January 2012.
  • 43I. Lassoued, C. Barakat, K. Avrachenkov.

    Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011.
  • 44I. Lassoued, C. Barakat.

    A Multi-task Adaptive Monitoring System Combining Different Sampling Primitives, in: proceedings of the 23rd International Teletrafic Congress (ITC), San Francisco, September 2011.
  • 45S. Le Blond, P. Manils, A. Chaabane, M. A. Kaafar, C. Castelluccia, A. Legout, W. Dabbous.

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, in: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11), Boston, United States, USENIX, March 2011.

    http://hal.inria.fr/inria-00574178/en
  • 46S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: Internet Measurement Conference (ACM/USENIX IMC), ACM/USENIX, November 2011.

    http://hal.inria.fr/inria-00632780/en
  • 47D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.

    How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium(PETS), Waterloo, July 2011.
  • 48A. Quereilhac, M. Lacage, C. Freire, T. Turletti, W. Dabbous.

    NEPI: An Integration Framework for Network Experimentation, in: 19th International Conference on Software Telecommunications and Computer Networks (SoftCOM), Dubrovnik, Croatia, September 2011.
  • 49A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.

    Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011.
  • 50C. Tala, L. Ahumada, D. Dujovne, S. Ur-Rehman, T. Turletti, W. Dabbous.

    Guidelines for the accurate design of empirical studies in wireless networks, in: 7th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), Shangai, China, April 2011.
  • 51S. Ur-Rehman, T. Turletti, W. Dabbous.

    Multicast Video Streaming over WiFi Networks: Impact of Multipath Fading and Interference, in: IEEE Workshop on multiMedia Applications over Wireless Networks (MediaWiN), Corfu, Greece, June 2011.
  • 52R. Vilardi, L. A. Grieco, G. Boggia, C. Barakat.

    Adaptation of Real-time Temporal Resolution for Bitrate Estimates in IPFIX Systems, in: proceedings of the 2nd International Workshop on TRaffic Analysis and Classification (TRAC), Istanbul, July 2011.

Internal Reports

  • 53A. Krifa, C. Barakat, T. Spyropoulos.

    MobiTrade: Interest driven content dissemination architecture for Disruption Tolerant Networks, INRIA, February 2011.

    http://hal.inria.fr/inria-00568235/en
  • 54T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport (revised), February 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-12.txt>.
  • 55S. Rehman, T. Turletti, W. Dabbous.

    A Roadmap for Benchmarking in Wireless Networks, INRIA, August 2011, no RR-7707.

    http://hal.inria.fr/inria-00614167/en
  • 56V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-05.txt>.
  • 57V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, July 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-04.txt>.
  • 58V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, February 2011, IETF RMT Working Group (individual document), Work in Progress: <draft-ietf-rmt-newfcast-03.txt>.
  • 59V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, November 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-02>.
  • 60V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, September 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-01>.
  • 61V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, February 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-01>.
  • 62V. Roca.

    Simple Authentication Schemes for the ALC and NORM Protocols, December 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-06.txt>.
  • 63V. Roca.

    Simple Authentication Schemes for the ALC and NORM Protocols, September 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-05.txt>.
  • 64V. Roca.

    Simple Authentication Schemes for the ALC and NORM Protocols, July 2011, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-simple-auth-for-alc-norm-04.txt>.
  • 65V. Roca, A. Roumy, B. Sayadi.

    The Generalized Object Encoding (GOE) Approach for the Forward Erasure Correction (FEC) Protection of Objects and its Application to Reed- Solomon Codes over GF(2x), July 2011, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-fec-00.txt>.
  • 66V. Roca, A. Roumy, B. Sayadi.

    The Generalized Object Encoding (GOE) LDPC-Staircase FEC Scheme, October 2011, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-ldpc-00.txt>.
  • 67A. Roumy, V. Roca, B. Sayadi, R. Imad.

    Unequal Erasure Protection and Object Bundle Protection with the Generalized Object Encoding Approach, INRIA, July 2011, no RR-7699, submitted to Infocom 2012.

    http://hal.inria.fr/inria-00612583/en
  • 68M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard).
  • 69M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, June 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-15.txt>.
  • 70M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, March 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-14.txt>.
  • 71M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, February 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-13.txt>.
  • 72M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, January 2011, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-framework-12.txt>.

Other Publications

  • 73S. Bouckaert, V. Van Gerwen, M. Ingrid, S. C. Phillips, J. Wilander, S. Ur-Rehman, T. Turletti, W. Dabbous.

    "Benchmarking computers and computer networks", September 2011, Whitepaper, IST Fire projects.
  • 74A. Krifa, M. Mendonca, R. N. B. Rais, C. Barakat, T. Turletti, K. Obraczka.

    "Efficient Content Dissemination in Heterogeneous Networks Prone to Episodic Connectivity", August 2011, Demo at ACM Sigcomm.