EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1C. Castelluccia, E. De Cristofaro, D. Perito.

    Private Information Disclosure from Web Searches, in: Proceedings of the 2010 Privacy Enhancing Technologies Symposium (PETS), 2010.
  • 2C. Castelluccia, A. Francillon, C. Soriente, D. Perito.

    On the Difficulty of Software-Based Attestation of Embedded Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  • 3C. Castelluccia, M. A. Kaafar, P. Manils, D. Perito.

    Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers, in: ACM/Usenix Internet Measurement Conference (IMC 2009), Chicago, USA, ACM, November 2009.
  • 4A. Chaabane, G. Acs, M. A. Kaafar.

    You Are What You Like! Information leakage through users' Interests, in: proceedings of the The Network & Distributed System Security Symposium (NDSS), San Diego, February 2012.
  • 5M. Cunche, V. Savin, V. Roca.

    Analysis of Quasi-Cyclic LDPC codes under ML decoding over the erasure channel, in: IEEE International Symposium on Information Theory and its Applications (ISITA'10) (http://arxiv.org/abs/1004.5217), April 2010.
  • 6A. Krifa, C. Barakat, T. Spyropoulos.

    Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012.
  • 7I. Lassoued, C. Barakat, K. Avrachenkov.

    Network-wide monitoring through self-configuring adaptive system, in: proceedings of IEEE INFOCOM, Shanghai, China, April 2011.
  • 8S. Le Blond, C. Zhang, A. Legout, K. Ross, W. Dabbous.

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy, in: proceedings of ACM SIGCOM/USENIX IMC'11, Berlin, Germany, November 2011.
  • 9A. Legout, N. Liogkas, E. Kohler, L. Zhang.

    Clustering and Sharing Incentives in BitTorrent Systems, in: SIGMETRICS'07, San Diego, CA, USA, June 2007.
  • 10T. Li, Q. Ni, D. Malone, D. Leight, Y. Xiao, T. Turletti.

    Aggregation with Fragment Retransmission for Very High-Speed WLANs, in: IEEE/ACM Transactions on Networking Journal, 2009, vol. 17, no 2.
  • 11T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport, November 2012, IETF Request for Comments, RFC 6726 (Standards Track).

    http://hal.inria.fr/hal-00749951
  • 12D. Perito, C. Castelluccia, M. A. Kaafar, P. Manils.

    How Unique and Traceable are Usernames, in: proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS), Waterloo, July 2011.
  • 13A. Rao, Y.-S. Lim, C. Barakat, A. Legout, D. Towsley, W. Dabbous.

    Network Characteristics of Video Streaming Traffic, in: proceedings of ACM CoNEXT'11, Tokyo, Japan, December 2011.
  • 14K. B. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, S. Capkun.

    Proximity-based Access Control for Implantable Medical Devices, in: CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, 2009.
  • 15V. Roca, C. Neumann, D. Furodet.

    Low Density Parity Check (LDPC) Staircase and Triangle Forward Error Correction (FEC) Schemes, June 2008, IETF Request for Comments, RFC 5170 (Standards Track/Proposed Standard).
  • 16V. Roca.

    Simple Authentication Schemes for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, April 2012, IETF Request for Comments, RFC 6584 (Standards Track).

    http://hal.inria.fr/hal-00745908
  • 17D. Saucez, L. Iannone, O. Bonaventure, D. Farinacci.

    Designing a Deployable Internet: The Locator/Identifier Separation Protocol, in: IEEE Internet Computing, 2012, vol. 16, p. 14-21.

    http://doi.ieeecomputersociety.org/10.1109/MIC.2012.98
  • 18K. Sbai, C. Barakat.

    Experiences on enhancing data collection in large networks, in: Computer Networks, May 2009, vol. 53, no 7, p. 1073-1086.
  • 19T. Spyropoulos, R. N. Bin Rais, T. Turletti, K. Obraczka, A. Vasilakos.

    Routing for Disruption Tolerant Networks: Taxonomy and Design, in: ACM/Springer Wireless Networks (WINET), 2010, vol. 16, no 8.
  • 20T. Spyropoulos, T. Turletti, K. Obraczka.

    Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations, in: IEEE Transactions on Mobile Computing (TMC), 2009, vol. 8, no 8.
  • 21M. Watson, A. Begen, V. Roca.

    Forward Error Correction (FEC) Framework, June 2011, IETF Request for Comments, RFC 6363 (Standards Track/Proposed Standard).
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 22S. Ben Hamida.

    Embedded System Security, Université de Grenoble, February 2012.
  • 23A. Krifa.

    Towards better content dissemination applications for Disruption Tolerant Networks, Université de Nice Sophia Antipolis, April 2012.
  • 24E. Mazza.

    A formal framework for specifying and analyzing liabilities using log as digital evidence, Université de Grenoble, June 2012.
  • 25S. Ur-Rehman.

    Benchmarking in Wireless Networks, Université de Nice Sophia Antipolis, January 2012.

Articles in International Peer-Reviewed Journals

  • 26A. Apavatjrut, W. Znaidi, A. Fraboulet, C. Goursaud, K. Jaffrès-Runser, C. Lauradoux, M. Minier.

    Energy Efficient Authentication Strategies for Network Coding, in: Concurrency and Computation: Practice and Experience, July 2012, vol. 24, no 10, p. 1086-1107. [ DOI : 10.1002/cpe.1767 ]

    http://hal.inria.fr/hal-00644484
  • 27A. Krifa, C. Barakat, T. Spyropoulos.

    Message Drop and Scheduling in DTNs: Theory and Practice, in: IEEE Transactions on Mobile Computing, 2012, vol. 11, no 9.
  • 28D. Saucez, L. Iannone, O. Bonaventure, D. Farinacci.

    Designing a Deployable Internet: The Locator/Identifier Separation Protocol, in: IEEE Internet Computing, 2012, vol. 16, p. 14-21.

    http://doi.ieeecomputersociety.org/10.1109/MIC.2012.98

Articles in National Peer-Reviewed Journals

  • 29J. Le Clainche, D. Le Métayer.

    Vie privée et non discrimination: des protections complémentaires, une convergence nécessaire, in: Revue Lamy Droit de l'Immatériel, 2013, to appear.

Articles in Non Peer-Reviewed Journals

International Conferences with Proceedings

  • 32A. Abidi, S. Gammar, F. Kamoun, W. Dabbous, T. Turletti, A. Legout.

    Hybrid approach for experimental networking research, in: 13th International Conference on Distributed Computing and Networking (ICDCN), Hong Kong, China, January 2012.

    http://www-sop.inria.fr/members/Thierry.Turletti/icdcn11.pdf
  • 33G. Acs, C. Castelluccia, R. Chen.

    Differentially Private Histogram Publishing through Lossy Compression, in: International Conference Data Mining, Brussels, Belgique, 2012.

    http://hal.inria.fr/hal-00747821
  • 34K. Avrachenkov, P. Goncalves, A. Legout, M. Sokol.

    Classification of Content and Users in BitTorrent by Semi-Supervised Learning Methods, in: Proc. of IEEE IWCMC'2012, TRAC Workshop, Limassol, Cyprus, IEEE, August 2012.
  • 35A. Benfarah, B. Miscopein, C. Lauradoux, J.-M. Gorce.

    Towards Stronger Jamming Model: Application to TH-UWB Radio, in: IEEE WCNC - Wireless Communications and Networking Conference, Paris, France, April 2012.

    http://hal.inria.fr/hal-00758577
  • 36D. Butin, D. Gray, G. Bella.

    Towards Verifying Voter Privacy Through Unlinkability, in: Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Springer Verlag, 2013, to appear.
  • 37C. Castelluccia, M. A. Kaafar, M.-D. Tran.

    Betrayed by Your Ads!, in: PETS- Privacy Enhancing Tools Symposium, Vigo, Espagne, July 2012.

    http://hal.inria.fr/hal-00747823
  • 38C. Castelluccia, D. Perito, D. Markus.

    Adaptive Password-Strength Meters from Markov Models, in: 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, États-Unis, ISOC, February 2012.

    http://hal.inria.fr/hal-00747824
  • 39A. Chaabane, G. Acs, M. A. Kaafar.

    You Are What You Like! Information Leakage Through Users' Interests, in: Proc. Annual Network and Distributed System Security Symposium NDSS, 2012.
  • 40A. Chaabane, M. A. Kaafar, R. Boreli.

    Big friend is watching you: analyzing online social networks tracking capabilities, in: Proceedings of the 2012 ACM SIGCOMM workshop on Workshop on online social networks, ACM, 2012, p. 7–12.
  • 41R. Chen, G. Acs, C. Castelluccia.

    Differentially Private Sequential Data Publication via Variable-Length N-Grams, in: ACM Computer and Communication Security (CCS), Raleigh, États-Unis, ACM, October 2012.

    http://hal.inria.fr/hal-00747830
  • 42T. Chen, M. A. Kaafar, A. Friedman, R. Boreli.

    Is more always merrier?: a deep dive into online social footprints, in: Proceedings of the 2012 ACM SIGCOMM workshop on Workshop on online social networks, ACM, 2012, p. 67–72.
  • 43N. Cheng, P. Mohapatra, M. Cunche, M. A. Kaafar, R. Boreli, V. Srikanth.

    Inferring User Relationship from Hidden Information in WLANs, in: MILCOM - IEEE Military Communications Conference - 2012, Orlando, États-Unis, 2012.

    http://hal.inria.fr/hal-00747850
  • 44F. Coras, D. Saucez, L. Jakab, A. Cabellos-Aparicio, J. Domingo-Pascual.

    Implementing a BGP-Free ISP Core with LISP, in: Globecom 2012, 2012.
  • 45M. Cunche, M. A. Kaafar, R. Boreli.

    I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, in: World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, IEEE, 2012, p. 1–9.
  • 46M. Cunche, M. A. Kaafar, T. Chen, R. Boreli, A. Mahanti.

    Why are they hiding ? Study of an Anonymous File Sharing System, in: ESTEL-SEC - Security and Privacy Special Track of IEEE-AESS Conference in Europe about Space and Satellite Communications - 2012, Rome, Italie, October 2012.

    http://hal.inria.fr/hal-00747833
  • 47M. Dardaillon, C. Lauradoux, T. Risset.

    Hardware Implementation of the GPS authentication, in: ReConFig - International Conference on ReConFigurable Computing and FPGAs, Cancun, Mexique, December 2012.

    http://hal.inria.fr/hal-00737003
  • 48C. Freire, A. Quereilhac, T. Turletti, W. Dabbous.

    Automated deployment and customization of routing overlays on PlanetLab, in: ICSC TridentCom Conference 2012, Thessaloniki, Greece, June 2012.

    http://planete.inria.fr/Simulbed/Tridentcom12nepi.pdf
  • 49M. Gabielkov, A. Legout.

    The Complete Picture of the Twitter Social Graph, in: Proc. of ACM CoNext 2012, Nice, France, December 2012.
  • 50S. Hamida Tmar-Ben, P. Jean-Benoit, B. Denis, B. Uguen, C. Castelluccia.

    On the security of UWB secret key generation methods against deterministic channel prediction attacks, in: Vehicular Technology Conference (VTC), Quebec, Canada, IEEE, September 2012.

    http://hal.inria.fr/hal-00747839
  • 51L. Jacquin, V. Roca, M. A. Kaafar, F. Schuler, J.-L. Roch.

    IBTrack: an ICMP black holes tracker, in: Proceedings of IEEE Globecom, IEEE, 2012.
  • 52D. Le Métayer, J. Le Clainche.

    From the protection of data to the protection of individuals: extending the application of non discrimination principles, in: European Data Protection: In Good Health ?, S. Gutwirth, Y. Poullet, P. De Hert (editors), Springer Verlag, 2012, p. 315-330.
  • 53D. Le Métayer.

    Privacy by design: a formal framework for the analysis of architectural choices, in: Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY 2013), IEEE, 2013, to appear.
  • 54Z. Li, J. Lin, M. Akodjenou, G. Xie, M. Kaafar, Y. Jin, G. Peng.

    Watching Videos from Everywhere: a Study of the PPTV Mobile VoD System, in: Proceedings of the ACM SIGCOMM conference on Internet measurement conference, ACM, 2012.
  • 55F. Mattoussi, V. Roca, B. Sayadi.

    Complexity Comparison Of The Use Of Vandermonde Versus Hankel Matrices To Build Systematic MDS Reed-Solomon Codes, in: SPAWC 2012 - 13th IEEE Internation Workshop on Signal Processing Advances in Wireless Communications, CESME, Turkey, June 2012.

    http://hal.inria.fr/hal-00719314
  • 56F. Mattoussi, V. Roca, B. Sayadi.

    Design of Small Rate, Close to Ideal, GLDPC-Staircase AL-FEC Codes for the Erasure Channel, in: IEEE Globecom 2012, Anaheim, United States, Dr. Hossein Eslambolchi (organizing committee general chair), Dec 2012.

    http://hal.inria.fr/hal-00736071
  • 57F. Mattoussi, V. Savin, V. Roca, B. Sayadi.

    Optimization With Exit Functions Of GLDPC-Staircase Codes For The BEC, in: SPAWC 2012 - 13th IEEE Internation Workshop on Signal Processing Advances in Wireless Communications, CESME, Turkey, June 2012.

    http://hal.inria.fr/hal-00719321
  • 58M. Mendonca, K. Obraczka, T. Turletti.

    The Case for Software-Defined Networking in Heterogeneous Networked Environments, in: ACM CoNEXT Student Workshop 2012, Nice, France, December 2012, Poster.

    http://inrg.cse.ucsc.edu/community/Publications?action=AttachFile&do=get&target=hsdn-mini.pdf
  • 59X. Misseri, J.-L. Rougier, D. Saucez.

    Internet routing diversity for stub networks with a Map-and-Encap scheme, in: IEEE ICC 2012, 2012.
  • 60L. Olejnik, C. Castelluccia, A. Janc.

    Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns, in: 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2012), Vigo, Espagne, July 2012.

    http://hal.inria.fr/hal-00747841
  • 61A. Quereilhac, T. Turletti, W. Dabbous.

    A Multi-Platform Event-Driven Controller for Network Experiments, in: ACM CoNEXT Student Workshop 2012, Nice, France, December 2012, Poster.

    http://conferences.sigcomm.org/co-next/2012/eproceedings/student/p33.pdf
  • 62A. Rao, D. Choffnes, J. Sherry, A. Legout, A. Krishnamurthy, W. Dabbous.

    Meddle: Middleboxes for Increased Transparency and Control of Mobile Traffic, in: Proc. of ACM CoNext 2012, Nice, France, December 2012.
  • 63R. Ravaioli, C. Barakat, G. Urvoy-Keller.

    Chkdiff: Checking Traffic Differentiation at Internet Access, in: ACM CoNEXT Student Workshop, Nice, France, December 2012.
  • 64A. Roumy, V. Roca, B. Sayadi.

    Memory Consumption Analysis for the GOE and PET Unequal Erasure Protection Schemes, in: IEEE International Conference on Communications, Ottawa, Canada, February 2012.

    http://hal.inria.fr/hal-00668826
  • 65D. Saucez, B. Donnet.

    On the dynamics of locators in LISP, in: Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I, Berlin, Heidelberg, IFIP'12, Springer-Verlag, 2012, p. 385–396.

    http://dx.doi.org/10.1007/978-3-642-30045-5_29
  • 66D. Saucez, W. Haddad.

    Network in the Cloud: a Map-and-Encap Approach, in: IEEE CloudNet 2012, November 2012.
  • 67D. Saucez, J. Kim, L. Iannone, O. Bonaventure, C. Filsfils.

    A local approach to fast failure recovery of LISP ingress tunnel routers, in: Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part I, Berlin, Heidelberg, IFIP'12, Springer-Verlag, 2012, p. 397–408.

    http://dx.doi.org/10.1007/978-3-642-30045-5_30
  • 68C. Testa, D. Rossi, A. Rao, A. Legout.

    Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP swarms, in: Proc. of Traffic Monitoring and Analysis (TMA) Workshop, Vienna, Austria, March 2012.
  • 69G. Wang, H. Park, G. Xie, S. Moon, M. Kaafar, K. Salamatian.

    A Genealogy of Information Spreading on Microblogs: a Galton-Watson-based Explicative Model, in: Proceedings of IEEE Infocom, IEEE, 2013.
  • 70Y. Wang, G. Xie, M. Kaafar.

    FPC: A self-organized greedy routing in scale-free networks, in: Computers and Communications (ISCC), 2012 IEEE Symposium on, IEEE, 2012, p. 000102–000107.

Conferences without Proceedings

  • 71D. Camara, F. Urbani, M. Lacage, T. Turletti, W. Dabbous.

    Simulation Platform for Content Centric Networks Protocols Development, in: CCNx Workshop 2012, Sophia Antipolis, France, September 2012.

    http://planete.inria.fr/Simulbed/ns3-ccnxcon12.pdf
  • 72A. Quereilhac, C. Freire, T. Turletti, W. Dabbous.

    Controllable packet prioritization on PlanetLab using NEPI, in: Demo at ICSC TridentCom 2012, Thessaloniki, Greece, June 2012.
  • 73A. Quereilhac, A. Kalla, T. Turletti, W. Dabbous.

    Easy CCNx experimentation on PlanetLab, in: Demo at CCNx Workshop 2012, Sophia Antipolis, France, September 2012.

    http://planete.inria.fr/Simulbed/nepi-ccnxcon12.pdf
  • 74A. Quereilhac, T. Turletti, W. Dabbous.

    Managing heterogeneous ns-3 experiments with NEPI, in: Poster at WNS3 Workshop 2012, Desenzano, Italy, March 2012.

    http://www.nsnam.org/wp-content/uploads/2011/10/nepiWNS3Poster_1200.pdf
  • 75D. Saucez, L. A. Grieco, C. Barakat.

    AIMD and CCN: past and novel acronyms working together in the Future Internet, in: ACM CoNEXT Capacity Sharing Workshop 2012 (CSWS12), 2012.

Internal Reports

  • 76F. De Meneses Neves Ramos Dos Santos, C. Barakat, T. Spyropoulos, T. Turletti.

    Content Management in Mobile Wireless Networks, Inria, 2012, 54 p.

    http://hal.inria.fr/hal-00742734
  • 77F. Goichon, C. Lauradoux, G. Salagnac, T. Vuillemin.

    Entropy transfers in the Linux Random Number Generator, Inria, September 2012, no RR-8060, 26 p.

    http://hal.inria.fr/hal-00738638
  • 78T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport (revised), June 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-16.txt>.
  • 79T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport (revised), June 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-15.txt>.
  • 80T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport (revised), March 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-14.txt>.
  • 81T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport (revised), January 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-flute-revised-13.txt>.
  • 82V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, November 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-newfcast-07.txt>.
  • 83V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-newfcast-06.txt>.
  • 84V. Roca, B. Adamson.

    FCAST: Scalable Object Delivery for the ALC and NORM Protocols, October 2012, IETF RMT Working Group, Work in Progress: <draft-ietf-rmt-newfcast-05.txt>.
  • 85V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, November 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-05>.
  • 86V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-04>.
  • 87V. Roca, M. Cunche, J. Lacan, A. Bouabdallah, K. Matsuzono.

    Simple Reed-Solomon Forward Error Correction (FEC) Scheme for FECFRAME, March 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-simple-rs-03>.
  • 88V. Roca, M. Cunche, J. Lacan.

    Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-ldpc-04.txt>.
  • 89V. Roca, M. Cunche, J. Lacan.

    Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, October 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-ldpc-03.txt>.
  • 90V. Roca, M. Cunche, J. Lacan.

    Simple LDPC-Staircase Forward Error Correction (FEC) Scheme for FECFRAME, March 2012, IETF FECFRAME Working Group, Work in Progress: <draft-ietf-fecframe-ldpc-02.txt>.
  • 91V. Roca, A. Roumy, B. Sayadi.

    The Generalized Object Encoding (GOE) Approach for the Forward Erasure Correction (FEC) Protection of Objects and its Application to Reed- Solomon Codes over GF(2x), March 2012, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-fec-01.txt>.
  • 92V. Roca, A. Roumy, B. Sayadi.

    The Generalized Object Encoding (GOE) LDPC-Staircase FEC Scheme, July 2012, IETF RMT Working Group, Work in Progress: <draft-roca-rmt-goe-ldpc-01.txt>.
  • 93V. Roca, A. Roumy, B. Sayadi.

    The Need for Extended Forward Erasure Correction (FEC) schemes: Problem Position, Inria, July 2012.

    http://hal.inria.fr/hal-00752510

Other Publications

  • 94X.-N. Nguyen.

    Software Defined Networking in Wireless Mesh Network, Université de Nice Sophia Antipolis, France, August 2012, UBINET MSc Thesis.

    http://inrg.cse.ucsc.edu/community/Publications?action=AttachFile&do=get&target=nam-ms.pdf
  • 95T. Paila, R. Walsh, M. Luby, V. Roca, R. Lehtonen.

    FLUTE - File Delivery over Unidirectional Transport, November 2012, IETF Request for Comments, RFC 6726 (Standards Track).

    http://hal.inria.fr/hal-00749951
  • 96T. Parmentelat, J. Augé, S. Avakian, L. Baron, M. Larabi, N. Turro.

    Federation : implementation report, October 2012, ANR F-LAB project deliverable D1.2.

    http://git.f-lab.fr/?p=d12.git;a=blob;f=d12.pdf;h=7ec59cfbc214e4a6a143d0f286d7c64671fc01e4;hb=HEAD
  • 97T. Parmentelat, A. Willner, C. Tranoris, T. Rakotoarivelo, J. Augé.

    Control plane extension, September 2012, FP7 OpenLab project deliverable D1.1.

    https://git.ict-openlab.eu/?p=deliverable1.1.git;a=blob_plain;f=d11.pdf;hb=HEAD
  • 98V. Roca.

    Simple Authentication Schemes for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, April 2012, IETF Request for Comments, RFC 6584 (Standards Track).

    http://hal.inria.fr/hal-00745908
  • 99D. Saucez, C. Barakat, T. Turletti.

    Leveraging Information Centric Networking in Over-The-Top Services, February 2012, Under submission Journal of Network and Systems Management.

    http://hal.inria.fr/hal-00684458
  • 100D. Saucez, A. Kalla, C. Barakat, T. Turletti.

    Minimizing Bandwidth on Peering Links with Deflection in Named Data Networking, March 2012, unpublished note.

    http://hal.inria.fr/hal-00684453
  • 101C. Thiennot, C. Seyrat, V. Roca, J. Detchart.

    Proposal for a Candidate for EMM-EFEC Work Item, May 2012, Document S4-120731, 3GPP TSG-SA4 meeting 69, Erlangen, Germany.
  • 102C. Thiennot, C. Seyrat, V. Roca, J. Detchart.

    RS+LDPC EMM-EFEC contribution, August 2012, Document S4-121024, 3GPP TSG-SA4 meeting 70, Chicago, USA.
  • 103C. Thiennot, C. Seyrat, V. Roca, J. Lacan, J. Detchart.

    RS+LDPC EMM-EFEC contribution - update, November 2012, Document S4-121471, 3GPP TSG-SA4 meeting 71, Bratislava, SLOVAKIA.