







|

Journal Publications
[MR03] |
Refik Molva et Yves Roudier.
Sécurité des réseaux et systèmes répartis. traité IC2 - série
Réseaux et télécoms, sous la direction de Yves Deswartes et Ludovic Mé, Hermès Lavoisier, chapitre 2,
pp 67-108, October 2003, ISBN 2-7462-0770-2. |
[MM03b] |
Pietro Michiardi and Refik Molva.
Recent security solutions for mobile
ad hoc networks. Chapter in Book on Ad Hoc Networking, to appear in
2003 at IEEE Press - Wiley Ed. |
[MM03a] |
Pietro Michiardi and Refik Molva.
Ad hoc network security. In ST
Journal of System Research, Volume 4, N°1, March 2003 |
[MM02a] |
Pietro Michiardi and Refik Molva.
Network Security in the Multicast Framework.
Chapter in tutorial book, Networking 2002 Conference, Pisa, Italy,
May 2002 |
[MM02b] |
Pietro Michiardi and Refik Molva.
Preventing denial of service and selfishness
in ad hoc networks. In Report on a Working Session on Security in
Wireless Ad Hoc Networks, Mobile Computing and Communication Review,
Vol. 6, Number 4, 2002. |
[MR01] |
Refik Molva et Yves Roudier.
Protocoles d'authentification.
Revue de l'électricité et de l'électronique (REE), numéro 5, mai
2001, p 41-46. |
[LMP01] |
Sergio Loureiro, Refik Molva, and Alain
Pannetrat.
Secure Data Collection with Updates.
Electronic
Commerce Research Journal, 1/2:119-130, February/March 2001.
Full text |
[MP00] |
Refik Molva and Alain Pannetrat.
Scalable Multicast Security with Dynamic
Recipient Groups. ACM Transactions on Information and System Security,
3, August 2000.
Full text |
[Mol99] |
Refik Molva.
Internet Security Architecture.
Computer
Networks & ISDN Systems Journal, 31, April 1999.
Full text |
[MT98] |
R. Molva and G. Tsudik.
Secret Sets and Applications. Information
Processing Letters, 65, April 1998.
Full text |
[SM97] |
Didier Samfat and Refik Molva.
IDAMN: an Intrusion Detection Architecture
for Mobile Networks. IEEE Journal on Selected Areas in Communications,
September 1997.
Full text |
[BDMS97] |
C. Blum, P. Dubois, R. Molva, and O. Schaller.
A Development and Runtime Platform
for Teleconferencing Applications. IEEE JSAC, Special issue on Multimedia
Communications, April 1997.
Full text |
[BBC+96] |
Françoise Baude, Fabrice Belloncle,
Denis Caromel, Nathalie Furmento, Philippe Mussi, Yves Roudier, and Gunther
Siegel.
Parallel Object-Oriented Programming
for Parallel Simulations, 1996. |
[HJM+95] |
Ralf Hauser, Phil Janson, Refik Molva,
Gene Tsudik, and Els Van Herreweghen.
Robust and Secure Password and Key
Change Method. Special issue of the Journal of Computer Security,
May 1995.
Full text |
[BGH+95] |
R. Bird, I. Gopal, A. Herzberg, P. Janson,
S. Kutten, R. Molva, and M. Yung.
The KryptoKnight Family of Light-Weight
Protocols for Authentication and Key Distribution. ACM Transactions
on Networking, February 1995. |
[MST94] |
R. Molva, D. Samfat, and G. Tsudik.
Authentication of Mobile Users.
IEEE
Network Magazine - Special issue on Mobile Communications, March 1994.
Full text |
[MJ94] |
R. Molva and P. Janson.
Information and Network Security.
Encyclopedia
of Telecommunications, 9, 1994. |
[BGH+93] |
R. Bird, I. Gopal, A. Herzberg, P. Janson,
S. Kutten, R. Molva, and M. Yung.
Systematic Design of a Family of Attack-Resistant
Authentication Protocols. IEEE Journal on Selected Areas in Communications,
special issue on Secure Communications, 11:679-693, August 1993.
Full text |
[JMZ92] |
P. Janson, R. Molva, and S. Zatti.
Architectural Directions for Opening
IBM Networks: The case of OSI. IBM Systems Journal, 31, 1992. |
[JM91] |
P. Janson and R. Molva.
Security in Open Networks and Distributed
Systems: A State-of-the-art Tutorial and Survey. Computer Networks
& ISDN Journal, October 1991. |
Conference Publications
[BRM04] |
Laurent Bussard, Yves Roudier, and Refik
Molva
Untraceable Secret Credentials: trust
establishment with privacy. To appear in the proceedings of the workshop
on Pervasive Computing and Communications Security (PerSec'04) at PerCom
2004, Orlando, Florida, March 14-17, 2004. |
[BM04]
|
Laurent Bussard and Refik Molva
One-time authorization for off-line
interactions. To appear in the proceedings of PerCom 2004, Orlando,
Florida, March 14-17, 2004. |
[WBRR04]
|
T. Walter, L. Bussard, P. Robinson and Y. Roudier
Security and trust issues in ubiquitous environments
- The business-to-employee dimension. To appear in the proceedings of SAINT 2004
conference, Workshop on "Ubiquitous network and services", Tokyo, Japan, January 26-30, 2004. |
[MM03e]
|
Pietro Michiardi and Refik Molva
A Game Theoretical Approach to Evaluate Cooperation
Enforcement Mechanisms in Mobile Ad hoc Networks" (extended abstract). In
proceedings WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless
Networks 2003 |
[BRKC03]
|
Bussard, Laurent;Roudier, Yves;Kilian-Kehr,
Roger;Crosta, Stefano.
Trust and authorization in pervasive
B2E scenarios . In proceedings of ISC'03, 6th Information Security
Conference, October 1st-3rd, 2003, Bristol, UK. |
[Mol03]
|
Refik Molva
Security in Wireless Ad Hoc Networks -
Keynote Speech. 7th IFIP Communications and Multimedia Security Conference, October
2003, Turin, Italy. |
[MM03d]
|
Refik Molva and Pietro Michiardi
Security in Ad hoc Networks . In
proceedings PWC 2003 (Personal Wireless Communications), September
2003, Venice, Italy |
[VRFM03] |
Vannel, Pierre;Roudier, Yves;Fouache,
Olivier;Molva, Refik.
Architecture pour un extranet adaptatif.
In proceedings of SAR'2003, 2nd French-speaking workshop on Security
and network Architecture, June 30th - July 4th, 2003, Nancy, France. |
[BR03a] |
Bussard, Laurent;Roudier, Yves.
Embedding distance bounding protocols
within intuitive interactions . In proceedings of SPC'2003, 1rst
International Conference on Security in Pervasive Computing, March
12-13, 2003, Boppard, Germany. |
[PM03] |
Pannetrat, Alain;Molva, Refik.
Real time multicast authentication.
In proceedings of NDSS'03, Network and Distributed System Security Symposium,
6-7 February 2003 - San Diego, USA. |
[OM02] |
Melek Onen, Refik Molva.
Sécurité des communications
multicast. ECOTEL 2002, December 2002. |
[LBR02] |
S. Loureiro, L. Bussard, Y. Roudier.
Extending Tamper-Proof Hardware Security
to Untrusted Execution Environments. In Proceedings of the Fifth
Smart Card Research and Advanced Application Conference (CARDIS'02),
USENIX - IFIP, San Jose, California, Novembre 2002.
Full text |
[M02b] |
Refik Molva.
Projet RNRT ICare: Services évolués
de signature et de contrôle d'accès basés sur de nouveaux
concepts de certificats. Ateliers
Sécurité RNRT-RNTL-RIAM, Toulouse, October 2002. |
[PM02b] |
A. Pannetrat, R. Molva.
Multiple Layer Encryption For Multicast
Groups. In Proceedings of The 6th IFIP Communications and Multimedia
Security Conference, Portorosz, Slovenia, September 2002. |
[MM02a] |
P. Michiardi, R. Molva.
Core: A Collaborative Reputation Mechanism
To Enforce Node Cooperation In Mobile AD HOC Networks. In Proceedings
of The 6th IFIP Communications and Multimedia Security Conference,
Portorosz, Slovenia, September 2002.
Full text |
[RFVM02b] |
Y. Roudier, O. Fouache, P. Vannel, R.
Molva.
Enabling Adaptive And Secure Extranets.
In Proceedings of The 6th IFIP Communications and Multimedia Security
Conference, Portorosz, Slovenia, September 2002. |
[BR02] |
L. Bussard, Y. Roudier.
Authentication in Ubiquitous Computing.
UBICOMP 2002, Workshop on Security in Ubiquitous Computing, September 2002
.
Full text |
[PM02a] |
Alain Pannetrat, Refik Molva.
Secure Data Collection with Updates.
In 7th IEEE Symposium on Computers and Communications ISCC, Taormina/Giardini
Naxos, Sicily, Italy, July 2002. |
[MOP02] |
Refik Molva, Melek Onen, Alain Pannetrat.
Sécurité des Communications
Multicast. In Atelier sur la Cryptographie pour les applications
spatiales, Centre National d'Etudes Spatiales, Toulouse, July 2002 |
[AR02] |
A.Pannetra and R.Molva.
Authenticating Real Time Packet Streams
and Multicasts. In the The Seventh IEEE Symposium on
Computers and Communications, July 2002.
Full text |
[MR02] |
P. Michiardi and R.Molva.
Simulation-based Analysis of Security
Exposures in Mobile Ad Hoc Networks. In European Wireless
2002 Conference, 2002.
Full
text |
[MR01] |
P. Michiardi and R.Molva.
Inter-Domain authorization and delegation
for business-to-business e-commerce. In Proceedings of eBusiness
& eWork 2001, Venice, Italy, October 2001.
Full
text |
[VR01] |
P. Vannel and Y. Roudier.
SEVA: a framework to dynamically set
up and run secure extranet. In Proceedings of eBusiness & eWork
2001, Venice, Italy, October 2001.
Full text |
[MR00] |
Refik Molva and Yves Roudier.
A Distributed Access Control Model
for Java. In Proceedings of ESORICS 2000 (European Symposium On
Research In Computer Security), Toulouse, France, October 2000.
Full
text |
[LM00] |
Sergio Loureiro and Refik Molva.
Mobile Code Protection with Smartcards.
In 6th ECOOP Workshop on Mobile Object Systems, Cannes, France,
June 2000.
Full text |
[LMR00] |
Sergio Loureiro, Refik Molva, and Yves
Roudier.
Mobile Code Security. In proceedings
of ISYPAR 2000 (4ème Ecole d'Informatique des Systèmes Parallèles
et Répartis), Code Mobile, Toulouse, France, February 2000.
Full text |
[LMP99] |
Sergio Loureiro, Refik Molva, and Alain
Pannetrat.
Secure Data Collection with Updates.
In Yiming Yee and Jiming Liu, editors, Proceedings of the Workshop on
Agents on Electronic Commerce - First Asia Pacific Conference on Inteligent
Agent Technology, Hong-Kong, December 1999.
Full text |
[LM99b] |
Sergio Loureiro and Refik Molva.
Privacy for Mobile Code. In Proceedings
of the Distributed Object Security Workshop - OOPSLA'99, pages 37-42,
Denver, November 1999.
Full text |
[MP99] |
R. Molva and A. Pannetrat.
Scalable Multicast Security in Dynamic
Groups. In Proceedings of the 6th ACM Conference on Computer and
Communications Security, Singapore, November 1999.
Full text |
[LM99a] |
Sergio Loureiro and Refik Molva.
Function Hiding based on Error Correcting
Codes. In Manuel Blum and C. H. Lee, editors, Proceedings of Cryptec'99
- International Workshop on Cryptographic Techniques and Electronic Commerce,
pages 92-98. City University of Hong-Kong, July 1999.
Full text |
[RI97a] |
Yves Roudier and Yuuji Ichisugi.
Integrating data-parallel and reactive
constructs into Java. In proceedings of the 2nd France-Japan Workshop
on Object-Based Parallel and Distributed Computing (OBPDC'97), Toulouse,
France, October 1997. |
[RI97b] |
Yves Roudier and Yuuji Ichisugi.
Java data-parallel programming using
an extensible preprocessor. In proceedings of SWOPP'97 (Summer united
WOrkshops on Parallel, distributed and cooperative Processing), Kumamoto,
Japan, pages 85-90, June 1997. |
[BM97a] |
C. Blum and R. Molva.
A CORBA-Based Platform for Distributed
Multimedia Applications. In Proceedings of Multimedia Computing
and Networking MMCN'97, San Jose, February 1997. |
[BM97b] |
C. Blum and R. Molva.
A CORBA-Based Platform for Distributed
Multimedia Applications. In Proceedings of Multimedia Computing
and Networking MMCN'97, San Jose, February 1997. |
[IR97] |
Yuuji Ichisugi and Yves Roudier.
The extensible Java Preprocessor Kit
and a Tiny Data-Parallel Java. In Yutaka Ishikawa, Rodney R. Oldehoeft,
John V. W. Reynders, and Marydell Tholburn, editors, proceedings of
ISCOPE'97 (International Scientific Computing in Object-Oriented Parallel
Environments Conference), December 8 - 11, 1997, Marina del Rey, California,
USA., number 1343 in LNCS, pages 153-160. Springer-Verlag, 1997. |
[CBM96] |
D. Loisel C. Blum and R. Molva.
BETEUS: Multipoint Teleteaching over
the European ATM Pilot. In NOC'96, Heidelberg, June 1996. |
[BM96] |
C. Blum and R. Molva.
A Software Platform for Distributed
Multimedia Applications. In Proceedings of the 1st Workshop on Multimedia
Software Development, Berlin, March 1996.
Full text |
[BBB+96] |
Françoise Baude, Fabrice Belloncle,
Jean-Claude Bermond, Denis Caromel, Olivier Dalle, Eric Darrot, Olivier
Delmas, Nathalie Furmento, Bruno Gaujal, Philippe Mussi, Stéphane
Perennes, Yves Roudier, and Günther Siegel.
The SLOOP project: Simulations,
Parallel Object-Oriented Languages, Interconnection Networks.
In 2nd European School of Computer Science, Parallel Programming Environments
for High Performance Computing ESPPE'96, pages 85-88, Alpe d'Huez,
avril 1996. |
[BDMS95] |
C. Blum, P. Dubois, R. Molva, and O. Schaller.
A semi-distributed platform for the
support of CSCW applications. In
International Distributed Conference
on High Performance Networking for Teleteaching, Madeira, November
1995. |
[SMA95] |
D. Samfat, R. Molva, and N. Asokan.
Untraceability in Mobile Networks.
In ACM International Conference on Mobile Computing and Networking,
Berkeley, November 1995.
Full text |
[CR95] |
Denis Caromel and Yves Roudier.
Reactive Programming in Eiffel//.
In Jean-Pierre Briot, Jean-Marc Geib, and Akinori Yonezawa, editors, Object-Based
Parallel and Distributed Computation OBPDC'95, volume 1107 of Lecture
Notes in Computer Science, pages 125-147. Springer-Verlag, June 1995. |
[FRS95] |
Nathalie Furmento, Yves Roudier, and Gunther
Siegel.
Parallélisme et Distribution
en C++. In RenPar'7, 7èmes rencontres du Parallélisme,
Mons, pages 196-200, Mai 1995. |
[SM94] |
D. Samfat and R. Molva.
A Method Providing Identity Privacy
to Mobile Users during Authentication. In IEEE Workshop on Mobile
Computing Systems and Applications, Santa Cruz, December 1994. |
[MR94a] |
R. Molva and E. Rütsche.
Application Access Control at Network
Level. In ACM Conference on Computer and Communications Security,
Fairfax, Virginia, November 1994.
Full text |
[HJM+94] |
Ralf Hauser, Phil Janson, Refik Molva,
Gene Tsudik, and Els Van Herreweghen.
Robust and Secure Password and Key
Change Method. In ESORICS'94, Brighton, November 1994. |
[MR94b] |
R. Molva and Erich Rütsche.
Transparent Access Control in LANs.
In INTEROP'94, Paris, October 1994. |
[MEH94] |
Refik Molva, Pierre-Alain Etique, and
Jean-Pierre Hubaux.
Strong Authentication in Intelligent
Networks. In Int. Conf. on Universal Personal Communications,
San Diego, September 1994. |
[BMR94] |
Christian Blum, Refik Molva, and Erich
Rütsche.
A Terminal-based Approach to Multimedia
Service Provision. In Int. Workshop on Community Networking,
San Francisco, July 1994.
Full text |
[MST94] |
R. Molva, D. Samfat, and G. Tsudik.
An Authentication Protocol for Mobile
Users. In IEE Colloquium on
Security and Cryptography to Radio Systems, London, June 1994. |
[CR94] |
Denis Caromel and Yves Roudier.
Programmation Reactive en Eiffel//
(expression de synchronisations selon le modèle Electre). In
Journees
du GDR Programmation - Lille, Septembre 1994. |
[MT93] |
R. Molva and G. Tsudik.
Authentication Method with Impersonal
Token Cards. In Security & Privacy Conference, Oakland,
May 1993.
Full text |
[Mol92] |
R. Molva.
Protocoles d'Authentification dans
le Reseau Intelligent. In Eurecom Report, Contribution to the first
Ernestine II report, August 1992. |
[MTHZ92] |
R. Molva, G. Tsudik, E. Van Herreweghen,
and S. Zatti.
KryptoKnight Authentication and Key
Distribution System. In ESORICS' 92, Toulouse, 1992.
Full
text |
[JM91] |
P. Janson and R. Molva.
Taxonomy and Comparative Analysis of
Authentication, Key Acquisition and Sign-on Protocols in Computer Networks
and Distributed Systems. In Congrès de Nouvelles Architectures
pour les Communications, Paris, October 1991. |
[RGJ+91] |
R.Bird, I. Gopal, P. Janson, S. Kutten,
R. Molva, and M. Yung.
Systematic design of Two-Way Authentication
Protocols. In CRYPTO'91, 1991. |
[JMZ91] |
P. Janson, R. Molva, and S. Zatti.
Architectural Directions for Opening
IBM Networks: The case of OSI. In GLOBECOM'91, 1991. |
[MJJ+86] |
R. Molva, J.M.Novali, G. Juanole, R. Desbiolles,
G. Dulac, and A.Peyrache.
A traffic analysis tool for local area
networks. In IFIP International Symposium on local communication
systems LAN and PBX, November 1986. |
[MNJ86] |
R. Molva, J.M. Novali, and G. Juanole.
Observation models for a multi-layer
architecture of standard protocols. In Congrès de Nouvelles
Architectures pour les Communications, October 1986. |
[ML85] |
R. Molva and C. Lamy.
Observateur de réseau à
base de SM90. In Journées SM90, Paris, October 1985. |
[MDA85] |
R. Molva, M. Diaz, and J.M. Ayache.
Observer: a run-time checking tool
for LANs. In 5th IFIP International Workshop on Protocol Specification,
Testing, and Verification, Moissac, June 1985. |
[RI] |
Yves Roudier and Yuuji Ichisugi.
Mixin Composition Strategies for the
Modular Coordination of Aspect Weaving. |
[CMP+97] |
Denis Caromel, Alistair McEwan, Jonathan
Poole, Yves Roudier, David Sagnol, and the Europa group.
Draft definition of the EUROPA standard
for parallel C++ (v2.1). In proceedings of the Future directions
for parallel C++ workshop, Burnham Beeches, june 1997. |
[Rou97] |
Yves Roudier.
Future directions for parallel C++.
In proceedings of the Future directions for parallel C++ workshop, Burnham
Beeches, june 1997. |
Technical Reports
[Pou03] |
Pouget, Fabien
Alert correlation: A state of the art. Technical report, December 2003.
Research Report RR-03-093 |
[MM03c] |
P. Michiardi and R.Molva
Game theoretic analysis of cooperation
enforcement in mobile ad hoc networks. Technical report, October 2003.
Research Report RR-03-092 |
[PD03b] |
Pouget, Fabien;Dacier, Marc
Honeypot platform: technical paper. Technical report, September 2003.
Research Report RR-03-088 |
[PD03c] |
Pouget, Fabien;Dacier, Marc
Honeypot platform : experimental report. Technical report, September 2003.
Research Report RR-03-083 |
[PD03a] |
Pouget, Fabien;Dacier, Marc
White paper: honeypot, honeynet: a comparative survey. Technical report, September 2003.
Research Report RR-03-082 |
[PDD03] |
Pouget, Fabien;Dacier, Marc;Debar, Hervé
White paper: honeypot, honeynet, honeytoken: terminological issues. Technical report, September 2003.
Research Report RR-03-081 |
[BR03b] |
Laurent Bussard and Yves Roudier
Background signature for sensor networks.
Technical report, June 2003. Research Report RR-03-076 |
[BM03] |
Laurent Bussard and Refik Molva
One-time authorization for off-line
interactions. Technical report, May 2003. Research Report RR-03-077 |
[MR02] |
P. Michiardi and R.Molva
Prevention of Denial of Service Attacks
and selfishness in Mobile AdHoc Networks. Technical report, January
2002. Research Report RR-02-063.
Full
text |
[MR01] |
P. Michiardi and R.Molva.
Core: A COllaborative REputation mechanism
to enforce node cooperation in Mobile Ad Hoc Networks. Technical report,
December 2001. Research Report RR-02-062.
Full
text |
[Pan98] |
A. Pannetrat.
Scalable multicast key distribution.
Technical Report RR-98-044, June 1998. Master thesis, D.E.A. R.S.D., Université
de Nice Sophia Antipolis. |
[Mol92] |
R. Molva.
Protocoles d'Authentification dans
le Reseau Intelligent. Technical report, August 1992. Contribution
to the first Ernestine II report. |
Patents
[MR01] |
P. Michiardi and R.Molva.
Process for providing Non Repudiation
of Receipt (NRR) in an electronic transaction environment, 2001. European
Patent - EP015. |
[LM99] |
S. Loureiro and R. Molva.
Process for securing the execution
of a mobile code in an untrusted environment, July 1999. European Patent
99480057. |
[Mol97] |
R. Molva.
Procédé de routage secret
de messages, May 1997. Patent 97 - 06515, INPI Paris, May 1997. |
[Mol93] |
R. Molva.
Method and System for Changing an Authorization
Password or Key in a Distributed Communication Network, September 1993.
IBM patent, European Patent Office, La Haye. |
[Mol92a] |
R. Molva.
Authentication Method and System with
a Smartcard, June 1992. IBM patent, US Patent Number 5347580, Sept
1994, European Patent 92810294.6, April 1992. |
[Mol92c] |
R. Molva.
Multi-party secure session / conference,
June 1992. IBM patent, Y0992-885 - US Patent Office. |
[Mol92b] |
R. Molva.
Authentication protocols in communication
networks, April 1992. IBM patent, US Patent Office, La Haye. |
|
|