The team
Research projects
Publications
Research projects
Teaching
Open positions
Eurecom

Journal Publications

[MR03] Refik Molva et Yves Roudier. 
Sécurité des réseaux et systèmes répartis. traité IC2 - série Réseaux et télécoms, sous la direction de Yves Deswartes et Ludovic Mé, Hermès Lavoisier, chapitre 2, pp 67-108, October 2003, ISBN 2-7462-0770-2. 
[MM03b] Pietro Michiardi and Refik Molva. 
Recent security solutions for mobile ad hoc networks. Chapter in Book on Ad Hoc Networking, to appear in 2003 at IEEE Press - Wiley Ed. 
[MM03a] Pietro Michiardi and Refik Molva. 
Ad hoc network security. In ST Journal of System Research, Volume 4, N°1, March 2003 
[MM02a] Pietro Michiardi and Refik Molva. 
Network Security in the Multicast Framework. Chapter in tutorial book, Networking 2002 Conference, Pisa, Italy, May 2002
[MM02b] Pietro Michiardi and Refik Molva. 
Preventing denial of service and selfishness in ad hoc networks. In Report on a Working Session on Security in Wireless Ad Hoc Networks, Mobile Computing and Communication Review, Vol. 6, Number 4, 2002.
[MR01] Refik Molva et Yves Roudier. 
Protocoles d'authentification. Revue de l'électricité et de l'électronique (REE), numéro 5, mai 2001, p 41-46.
[LMP01] Sergio Loureiro, Refik Molva, and Alain Pannetrat. 
Secure Data Collection with Updates. Electronic Commerce Research Journal, 1/2:119-130, February/March 2001.
Full text
[MP00] Refik Molva and Alain Pannetrat. 
Scalable Multicast Security with Dynamic Recipient Groups. ACM Transactions on Information and System Security, 3, August 2000.
Full text
[Mol99] Refik Molva. 
Internet Security Architecture. Computer Networks & ISDN Systems Journal, 31, April 1999.
Full text
[MT98] R. Molva and G. Tsudik. 
Secret Sets and Applications. Information Processing Letters, 65, April 1998.
Full text
[SM97] Didier Samfat and Refik Molva. 
IDAMN: an Intrusion Detection Architecture for Mobile Networks. IEEE Journal on Selected Areas in Communications, September 1997.
Full text
[BDMS97] C. Blum, P. Dubois, R. Molva, and O. Schaller. 
A Development and Runtime Platform for Teleconferencing Applications. IEEE JSAC, Special issue on Multimedia Communications, April 1997.
Full text
[BBC+96] Françoise Baude, Fabrice Belloncle, Denis Caromel, Nathalie Furmento, Philippe Mussi, Yves Roudier, and Gunther Siegel. 
Parallel Object-Oriented Programming for Parallel Simulations, 1996.
[HJM+95] Ralf Hauser, Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen. 
Robust and Secure Password and Key Change Method. Special issue of the Journal of Computer Security, May 1995.
Full text
[BGH+95] R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. 
The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution. ACM Transactions on Networking, February 1995.
[MST94] R. Molva, D. Samfat, and G. Tsudik. 
Authentication of Mobile Users. IEEE Network Magazine - Special issue on Mobile Communications, March 1994.
Full text
[MJ94] R. Molva and P. Janson. 
Information and Network Security. Encyclopedia of Telecommunications, 9, 1994.
[BGH+93] R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. 
Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications, special issue on Secure Communications, 11:679-693, August 1993.
Full text
[JMZ92] P. Janson, R. Molva, and S. Zatti. 
Architectural Directions for Opening IBM Networks: The case of OSI. IBM Systems Journal, 31, 1992.
[JM91] P. Janson and R. Molva. 
Security in Open Networks and Distributed Systems: A State-of-the-art Tutorial and Survey. Computer Networks & ISDN Journal, October 1991.

Conference Publications

[BRM04] Laurent Bussard, Yves Roudier, and Refik Molva
Untraceable Secret Credentials: trust establishment with privacy. To appear in the proceedings of the workshop on Pervasive Computing and Communications Security (PerSec'04) at PerCom 2004, Orlando, Florida, March 14-17, 2004.
[BM04]
Laurent Bussard and Refik Molva
One-time authorization for off-line interactions. To appear in the proceedings of PerCom 2004, Orlando, Florida, March 14-17, 2004.
[WBRR04]
T. Walter, L. Bussard, P. Robinson and Y. Roudier
Security and trust issues in ubiquitous environments - The business-to-employee dimension. To appear in the proceedings of SAINT 2004 conference, Workshop on "Ubiquitous network and services", Tokyo, Japan, January 26-30, 2004.
[MM03e]
Pietro Michiardi and Refik Molva
A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks" (extended abstract). In proceedings WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks 2003 
[BRKC03]
Bussard, Laurent;Roudier, Yves;Kilian-Kehr, Roger;Crosta, Stefano. 
Trust and authorization in pervasive B2E scenarios . In proceedings of ISC'03, 6th Information Security Conference, October 1st-3rd, 2003, Bristol, UK.
[Mol03]
Refik Molva
Security in Wireless Ad Hoc Networks - Keynote Speech. 7th IFIP Communications and Multimedia Security Conference, October 2003, Turin, Italy. 
[MM03d]
Refik Molva and Pietro Michiardi
Security in Ad hoc Networks . In proceedings PWC 2003 (Personal Wireless Communications), September 2003, Venice, Italy 
[VRFM03] Vannel, Pierre;Roudier, Yves;Fouache, Olivier;Molva, Refik. 
Architecture pour un extranet adaptatif. In proceedings of SAR'2003, 2nd French-speaking workshop on Security and network Architecture, June 30th - July 4th, 2003, Nancy, France.
[BR03a] Bussard, Laurent;Roudier, Yves. 
Embedding distance bounding protocols within intuitive interactions . In proceedings of SPC'2003, 1rst International Conference on Security in Pervasive Computing, March 12-13, 2003, Boppard, Germany.
[PM03] Pannetrat, Alain;Molva, Refik. 
Real time multicast authentication. In proceedings of NDSS'03, Network and Distributed System Security Symposium, 6-7 February 2003 - San Diego, USA. 
[OM02] Melek Onen, Refik Molva. 
Sécurité des communications multicast. ECOTEL 2002, December 2002.
[LBR02] S. Loureiro, L. Bussard, Y. Roudier. 
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. In Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS'02), USENIX - IFIP, San Jose, California, Novembre 2002.
Full text
[M02b] Refik Molva. 
Projet RNRT ICare: Services évolués de signature et de contrôle d'accès basés sur de nouveaux concepts de certificats. Ateliers Sécurité RNRT-RNTL-RIAM, Toulouse, October 2002.
[PM02b] A. Pannetrat, R. Molva. 
Multiple Layer Encryption For Multicast Groups. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, September 2002.
[MM02a] P. Michiardi, R. Molva. 
Core: A Collaborative Reputation Mechanism To Enforce Node Cooperation In Mobile AD HOC Networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, September 2002.
Full text
[RFVM02b] Y. Roudier, O. Fouache, P. Vannel, R. Molva. 
Enabling Adaptive And Secure Extranets. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, September 2002.
[BR02] L. Bussard, Y. Roudier. 
Authentication in Ubiquitous Computing. UBICOMP 2002, Workshop on Security in Ubiquitous Computing, September 2002 .
Full text
[PM02a] Alain Pannetrat, Refik Molva. 
Secure Data Collection with Updates. In 7th IEEE Symposium on Computers and Communications ISCC, Taormina/Giardini Naxos, Sicily, Italy, July 2002.
[MOP02] Refik Molva, Melek Onen, Alain Pannetrat. 
Sécurité des Communications Multicast. In Atelier sur la Cryptographie pour les applications spatiales, Centre National d'Etudes Spatiales, Toulouse, July 2002
[AR02] A.Pannetra and R.Molva. 
Authenticating Real Time Packet Streams and Multicasts. In the The Seventh IEEE Symposium on Computers and Communications, July 2002.
Full text
[MR02] P. Michiardi and R.Molva. 
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In European Wireless 2002 Conference, 2002.
Full text
[MR01] P. Michiardi and R.Molva. 
Inter-Domain authorization and delegation for business-to-business e-commerce. In Proceedings of eBusiness & eWork 2001, Venice, Italy, October 2001.
Full text
[VR01] P. Vannel and Y. Roudier. 
SEVA: a framework to dynamically set up and run secure extranet. In Proceedings of eBusiness & eWork 2001, Venice, Italy, October 2001.
Full text
[MR00] Refik Molva and Yves Roudier. 
A Distributed Access Control Model for Java. In Proceedings of ESORICS 2000 (European Symposium On Research In Computer Security), Toulouse, France, October 2000.
Full text
[LM00] Sergio Loureiro and Refik Molva. 
Mobile Code Protection with Smartcards. In 6th ECOOP Workshop on Mobile Object Systems, Cannes, France, June 2000.
Full text
[LMR00] Sergio Loureiro, Refik Molva, and Yves Roudier. 
Mobile Code Security. In proceedings of ISYPAR 2000 (4ème Ecole d'Informatique des Systèmes Parallèles et Répartis), Code Mobile, Toulouse, France, February 2000.
Full text
[LMP99] Sergio Loureiro, Refik Molva, and Alain Pannetrat. 
Secure Data Collection with Updates. In Yiming Yee and Jiming Liu, editors, Proceedings of the Workshop on Agents on Electronic Commerce - First Asia Pacific Conference on Inteligent Agent Technology, Hong-Kong, December 1999.
Full text
[LM99b] Sergio Loureiro and Refik Molva. 
Privacy for Mobile Code. In Proceedings of the Distributed Object Security Workshop - OOPSLA'99, pages 37-42, Denver, November 1999.
Full text
[MP99] R. Molva and A. Pannetrat. 
Scalable Multicast Security in Dynamic Groups. In Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1999.
Full text
[LM99a] Sergio Loureiro and Refik Molva. 
Function Hiding based on Error Correcting Codes. In Manuel Blum and C. H. Lee, editors, Proceedings of Cryptec'99 - International Workshop on Cryptographic Techniques and Electronic Commerce, pages 92-98. City University of Hong-Kong, July 1999.
Full text
[RI97a] Yves Roudier and Yuuji Ichisugi. 
Integrating data-parallel and reactive constructs into Java. In proceedings of the 2nd France-Japan Workshop on Object-Based Parallel and Distributed Computing (OBPDC'97), Toulouse, France, October 1997.
[RI97b] Yves Roudier and Yuuji Ichisugi. 
Java data-parallel programming using an extensible preprocessor. In proceedings of SWOPP'97 (Summer united WOrkshops on Parallel, distributed and cooperative Processing), Kumamoto, Japan, pages 85-90, June 1997.
[BM97a] C. Blum and R. Molva. 
A CORBA-Based Platform for Distributed Multimedia Applications. In Proceedings of Multimedia Computing and Networking MMCN'97, San Jose, February 1997.
[BM97b] C. Blum and R. Molva. 
A CORBA-Based Platform for Distributed Multimedia Applications. In Proceedings of Multimedia Computing and Networking MMCN'97, San Jose, February 1997.
[IR97] Yuuji Ichisugi and Yves Roudier. 
The extensible Java Preprocessor Kit and a Tiny Data-Parallel Java. In Yutaka Ishikawa, Rodney R. Oldehoeft, John V. W. Reynders, and Marydell Tholburn, editors, proceedings of ISCOPE'97 (International Scientific Computing in Object-Oriented Parallel Environments Conference), December 8 - 11, 1997, Marina del Rey, California, USA., number 1343 in LNCS, pages 153-160. Springer-Verlag, 1997.
[CBM96] D. Loisel C. Blum and R. Molva. 
BETEUS: Multipoint Teleteaching over the European ATM Pilot. In NOC'96, Heidelberg, June 1996.
[BM96] C. Blum and R. Molva. 
A Software Platform for Distributed Multimedia Applications. In Proceedings of the 1st Workshop on Multimedia Software Development, Berlin, March 1996.
Full text
[BBB+96] Françoise Baude, Fabrice Belloncle, Jean-Claude Bermond, Denis Caromel, Olivier Dalle, Eric Darrot, Olivier Delmas, Nathalie Furmento, Bruno Gaujal, Philippe Mussi, Stéphane Perennes, Yves Roudier, and Günther Siegel. 
The SLOOP project: Simulations, Parallel Object-Oriented Languages, Interconnection Networks. In 2nd European School of Computer Science, Parallel Programming Environments for High Performance Computing ESPPE'96, pages 85-88, Alpe d'Huez, avril 1996.
[BDMS95] C. Blum, P. Dubois, R. Molva, and O. Schaller. 
A semi-distributed platform for the support of CSCW applications. In International Distributed Conference on High Performance Networking for Teleteaching, Madeira, November 1995.
[SMA95] D. Samfat, R. Molva, and N. Asokan. 
Untraceability in Mobile Networks. In ACM International Conference on Mobile Computing and Networking, Berkeley, November 1995.
Full text
[CR95] Denis Caromel and Yves Roudier. 
Reactive Programming in Eiffel//. In Jean-Pierre Briot, Jean-Marc Geib, and Akinori Yonezawa, editors, Object-Based Parallel and Distributed Computation OBPDC'95, volume 1107 of Lecture Notes in Computer Science, pages 125-147. Springer-Verlag, June 1995.
[FRS95] Nathalie Furmento, Yves Roudier, and Gunther Siegel. 
Parallélisme et Distribution en C++. In RenPar'7, 7èmes rencontres du Parallélisme, Mons, pages 196-200, Mai 1995.
[SM94] D. Samfat and R. Molva. 
A Method Providing Identity Privacy to Mobile Users during Authentication. In IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, December 1994.
[MR94a] R. Molva and E. Rütsche. 
Application Access Control at Network Level. In ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1994.
Full text
[HJM+94] Ralf Hauser, Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen. 
Robust and Secure Password and Key Change Method. In ESORICS'94, Brighton, November 1994.
[MR94b] R. Molva and Erich Rütsche. 
Transparent Access Control in LANs. In INTEROP'94, Paris, October 1994.
[MEH94] Refik Molva, Pierre-Alain Etique, and Jean-Pierre Hubaux. 
Strong Authentication in Intelligent Networks. In Int. Conf. on Universal Personal Communications, San Diego, September 1994.
[BMR94] Christian Blum, Refik Molva, and Erich Rütsche. 
A Terminal-based Approach to Multimedia Service Provision. In Int. Workshop on Community Networking, San Francisco, July 1994.
Full text
[MST94] R. Molva, D. Samfat, and G. Tsudik. 
An Authentication Protocol for Mobile Users. In IEE Colloquium on Security and Cryptography to Radio Systems, London, June 1994.
[CR94] Denis Caromel and Yves Roudier. 
Programmation Reactive en Eiffel// (expression de synchronisations selon le modèle Electre). In Journees du GDR Programmation - Lille, Septembre 1994.
[MT93] R. Molva and G. Tsudik. 
Authentication Method with Impersonal Token Cards. In Security & Privacy Conference, Oakland, May 1993.
Full text
[Mol92] R. Molva. 
Protocoles d'Authentification dans le Reseau Intelligent. In Eurecom Report, Contribution to the first Ernestine II report, August 1992.
[MTHZ92] R. Molva, G. Tsudik, E. Van Herreweghen, and S. Zatti. 
KryptoKnight Authentication and Key Distribution System. In ESORICS' 92, Toulouse, 1992.
Full text
[JM91] P. Janson and R. Molva. 
Taxonomy and Comparative Analysis of Authentication, Key Acquisition and Sign-on Protocols in Computer Networks and Distributed Systems. In Congrès de Nouvelles Architectures pour les Communications, Paris, October 1991.
[RGJ+91] R.Bird, I. Gopal, P. Janson, S. Kutten, R. Molva, and M. Yung. 
Systematic design of Two-Way Authentication Protocols. In CRYPTO'91, 1991.
[JMZ91] P. Janson, R. Molva, and S. Zatti. 
Architectural Directions for Opening IBM Networks: The case of OSI. In GLOBECOM'91, 1991.
[MJJ+86] R. Molva, J.M.Novali, G. Juanole, R. Desbiolles, G. Dulac, and A.Peyrache. 
A traffic analysis tool for local area networks. In IFIP International Symposium on local communication systems LAN and PBX, November 1986.
[MNJ86] R. Molva, J.M. Novali, and G. Juanole. 
Observation models for a multi-layer architecture of standard protocols. In Congrès de Nouvelles Architectures pour les Communications, October 1986.
[ML85] R. Molva and C. Lamy. 
Observateur de réseau à base de SM90. In Journées SM90, Paris, October 1985.
[MDA85] R. Molva, M. Diaz, and J.M. Ayache. 
Observer: a run-time checking tool for LANs. In 5th IFIP International Workshop on Protocol Specification, Testing, and Verification, Moissac, June 1985.
[RI] Yves Roudier and Yuuji Ichisugi. 
Mixin Composition Strategies for the Modular Coordination of Aspect Weaving.
[CMP+97] Denis Caromel, Alistair McEwan, Jonathan Poole, Yves Roudier, David Sagnol, and the Europa group. 
Draft definition of the EUROPA standard for parallel C++ (v2.1). In proceedings of the Future directions for parallel C++ workshop, Burnham Beeches, june 1997.
[Rou97] Yves Roudier. 
Future directions for parallel C++. In proceedings of the Future directions for parallel C++ workshop, Burnham Beeches, june 1997.

Technical Reports

[Pou03] Pouget, Fabien
Alert correlation: A state of the art. Technical report, December 2003. Research Report RR-03-093
[MM03c] P. Michiardi and R.Molva
Game theoretic analysis of cooperation enforcement in mobile ad hoc networks. Technical report, October 2003. Research Report RR-03-092
[PD03b] Pouget, Fabien;Dacier, Marc
Honeypot platform: technical paper. Technical report, September 2003. Research Report RR-03-088
[PD03c] Pouget, Fabien;Dacier, Marc
Honeypot platform : experimental report. Technical report, September 2003. Research Report RR-03-083
[PD03a] Pouget, Fabien;Dacier, Marc
White paper: honeypot, honeynet: a comparative survey. Technical report, September 2003. Research Report RR-03-082
[PDD03] Pouget, Fabien;Dacier, Marc;Debar, Hervé
White paper: honeypot, honeynet, honeytoken: terminological issues. Technical report, September 2003. Research Report RR-03-081
[BR03b] Laurent Bussard and Yves Roudier 
Background signature for sensor networks. Technical report, June 2003. Research Report RR-03-076
[BM03] Laurent Bussard and Refik Molva 
One-time authorization for off-line interactions. Technical report, May 2003. Research Report RR-03-077
[MR02] P. Michiardi and R.Molva
Prevention of Denial of Service Attacks and selfishness in Mobile AdHoc Networks. Technical report, January 2002. Research Report RR-02-063.
Full text
[MR01] P. Michiardi and R.Molva. 
Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Technical report, December 2001. Research Report RR-02-062.
Full text
[Pan98] A. Pannetrat. 
Scalable multicast key distribution. Technical Report RR-98-044, June 1998. Master thesis, D.E.A. R.S.D., Université de Nice Sophia Antipolis.
[Mol92] R. Molva. 
Protocoles d'Authentification dans le Reseau Intelligent. Technical report, August 1992. Contribution to the first Ernestine II report.

Patents

[MR01] P. Michiardi and R.Molva. 
Process for providing Non Repudiation of Receipt (NRR) in an electronic transaction environment, 2001. European Patent - EP015.
[LM99] S. Loureiro and R. Molva. 
Process for securing the execution of a mobile code in an untrusted environment, July 1999. European Patent 99480057.
[Mol97] R. Molva. 
Procédé de routage secret de messages, May 1997. Patent 97 - 06515, INPI Paris, May 1997.
[Mol93] R. Molva. 
Method and System for Changing an Authorization Password or Key in a Distributed Communication Network, September 1993. IBM patent, European Patent Office, La Haye.
[Mol92a] R. Molva. 
Authentication Method and System with a Smartcard, June 1992. IBM patent, US Patent Number 5347580, Sept 1994, European Patent 92810294.6, April 1992.
[Mol92c] R. Molva. 
Multi-party secure session / conference, June 1992. IBM patent, Y0992-885 - US Patent Office.
[Mol92b] R. Molva. 
Authentication protocols in communication networks, April 1992. IBM patent, US Patent Office, La Haye.
[Webmaster] - [NSTeam] - Eurecom - 09/11/98