Jean-Pierre Hubaux

According to our database1, Jean-Pierre Hubaux authored at least 233 papers between 1994 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2010, "For contributions to security in wireless networks.".

IEEE Fellow

IEEE Fellow 2009, "For contributions to wireless security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
The (Co-)Location Sharing Game.
PoPETs, 2019

2018
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins.
IEEE Trans. Mob. Comput., 2018

Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Are privacy-enhancing technologies for genomic data ready for the clinic? A survey of medical experts of the Swiss HIV Cohort Study.
Journal of Biomedical Informatics, 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Quantifying Interdependent Privacy Risks with Location Data.
IEEE Trans. Mob. Comput., 2017

Quantifying Interdependent Risks in Genomic Privacy.
ACM Trans. Priv. Secur., 2017

PrivateRide: A Privacy-Enhanced Ride-Hailing Service.
PoPETs, 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing.
PoPETs, 2017

Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks.
JAMIA, 2017

Genomic Data Privacy and Security: Where We Stand and Where We Are Heading.
IEEE Security & Privacy, 2017

Efficient and Secure Outsourcing of Genomic Data Storage.
IACR Cryptology ePrint Archive, 2017

SQC: secure quality control for meta-analysis of genome-wide association studies.
Bioinformatics, 2017

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service.
Proceedings of the 26th USENIX Security Symposium, 2017

SmarPer: Context-Aware and Automatic Runtime-Permissions for Mobile Devices.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities.
IEEE Trans. Mob. Comput., 2016

On the Privacy Implications of Location Semantics.
PoPETs, 2016

A machine-learning based approach to privacy-aware information-sharing in mobile social networks.
Pervasive and Mobile Computing, 2016

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
IACR Cryptology ePrint Archive, 2016

Privacy is dead, long live privacy.
Commun. ACM, 2016

PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

The Ultimate Frontier for Privacy and Security: Medicine.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Privacy Challenges in Mobile and Pervasive Networks.
Proceedings of the 19th ACM International Conference on Modeling, 2016

Privacy and Security in the Genomic Era.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
De-anonymizing Genomic Databases Using Phenotypic Traits.
PoPETs, 2015

Privacy in the Genomic Era.
IACR Cryptology ePrint Archive, 2015

Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Privacy in the Genomic Era.
ACM Comput. Surv., 2015

Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
IEEE Computer, 2015

Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Privacy Threats and Practical Solutions for Genetic Risk Tests.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

On Non-cooperative Genomic Privacy.
Proceedings of the Financial Cryptography and Data Security, 2015

Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Threats and Solutions for Genomic Data Privacy.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
A Location-Privacy Threat Stemmingfrom the Use of Shared Public IP Addresses.
IEEE Trans. Mob. Comput., 2014

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices.
IEEE Trans. Information Forensics and Security, 2014

Hiding in the Mobile Crowd: LocationPrivacy through Collaboration.
IEEE Trans. Dependable Sec. Comput., 2014

User-side adaptive protection of location privacy in participatory sensing.
GeoInformatica, 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Reconciling Utility with Privacy in Genomics.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Cyber-secure communication architecture for active power distribution networks.
Proceedings of the Symposium on Applied Computing, 2014

Quantifying the Effect of Co-location Information on Location Privacy.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Secure and private proofs for location-based activity summaries in urban areas.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, UbiComp '14, Seattle, WA, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Formal Analysis of Secure Neighbor Discovery in Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2013

Non-Cooperative Location Privacy.
IEEE Trans. Dependable Sec. Comput., 2013

Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
MONET, 2013

Optimizing mix-zone coverage in pervasive wireless networks.
Journal of Computer Security, 2013

Genomic Privacy (Dagstuhl Seminar 13412).
Dagstuhl Reports, 2013

Game theory meets network security and privacy.
ACM Comput. Surv., 2013

Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Protecting and evaluating genomic privacy in medical tests and personalized medicine.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Privacy-Preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013

How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Inferring social ties in pervasive networks: an on-campus comparative study.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Adaptive information-sharing for privacy-aware mobile social networks.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Personal use of the genomic data: Privacy vs. storage cost.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Nowhere to Hide: Navigating around Privacy in Online Social Networks.
Proceedings of the Computer Security - ESORICS 2013, 2013

Privacy-Preserving Processing of Raw Genomic Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Addressing the concerns of the lacks family: quantification of kin genomic privacy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Ad-Blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
On Secure and Precise IR-UWB Ranging.
IEEE Trans. Wireless Communications, 2012

Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Protecting location privacy: optimal strategy against localization attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Vehicular Communication Systems.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures.
IEEE Trans. Wireless Communications, 2011

On the Performance of Secure Vehicular Communication Systems.
IEEE Trans. Dependable Sec. Comput., 2011

Meetings through the cloud: Privacy-preserving scheduling on mobile devices.
Journal of Systems and Software, 2011

OREN: Optimal revocations in ephemeral networks.
Computer Networks, 2011

Privacy-triggered communications in pervasive social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

The Inconvenient Truth about Web Certificates.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Quantifying Location Privacy.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Quantifying Location Privacy: The Case of Sporadic Location Exposure.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Privacy in Mobile Computing for Location-Sharing-Based Services.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Collaborative Location Privacy.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Collaborative Location Privacy with Rational Users.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Evaluating the Privacy Risk of Location-Based Services.
Proceedings of the Financial Cryptography and Data Security, 2011

Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective.
Proceedings of the Computer Security - ESORICS 2011, 2011

Privacy-preserving activity scheduling on mobile devices.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

One-to-n scrip systems for cooperative privacy-enhancing technologies.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility.
IEEE/ACM Trans. Netw., 2010

Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes.
IEEE Trans. Mob. Comput., 2010

A randomized countermeasure against parasitic adversaries in wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

Unraveling an old cloak: k-anonymity for location privacy.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

On the tradeoff between trust and privacy in wireless ad hoc networks.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Effectiveness of distance-decreasing attacks against impulse radio ranging.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Optimal revocations in ephemeral networks: A game-theoretic framework.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

Security Games in Online Advertising: Can Ads Help Secure the Web?
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Integrity of the Web Content: The Case of Online Advertising.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

On the Age of Pseudonyms in Mobile Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

ISPs and Ad Networks Against Botnet Ad Fraud.
Proceedings of the Decision and Game Theory for Security, 2010

Tracking Games in Mobile Networks.
Proceedings of the Decision and Game Theory for Security, 2010

Security Mechanisms with Selfish Players in Wireless Networks.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

SensorTune: a mobile auditory interface for DIY wireless sensor networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Efficient MAC in cognitive radio systems: A game-theoretic approach.
IEEE Trans. Wireless Communications, 2009

A distortion-based metric for location privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

A practical secure neighbor verification protocol for wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009

Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

On the Optimal Placement of Mix Zones.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Adaptive message authentication for vehicular networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Analysis and Optimization of Cryptographically Generated Addresses.
Proceedings of the Information Security, 12th International Conference, 2009

Evolution and market share of wireless community networks.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Cooperation in underwater sensor networks.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

On non-cooperative location privacy: a game-theoretic analysis.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Impact of denial of service attacks on ad hoc networks.
IEEE/ACM Trans. Netw., 2008

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
IEEE Trans. Dependable Sec. Comput., 2008

TraNS: realistic joint traffic and network simulator for VANETs.
Mobile Computing and Communications Review, 2008

Report on the "secure vehicular communications: results and challenges ahead" workshop.
Mobile Computing and Communications Review, 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: design and architecture.
IEEE Communications Magazine, 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Communications Magazine, 2008

Optimal pricing strategy for wireless social community networks.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Wireless sensor networking for rain-fed farming decision support.
Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, 2008

Certificate revocation list distribution in vehicular communication systems.
Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, 2008

On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

On Wireless Social Community Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Revocation games in ephemeral networks.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Towards provable secure neighbor discovery in wireless networks.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Secure neighbor discovery in wireless networks: formal investigation of possibility.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Wormhole-Based Antijamming Techniques in Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Eviction of Misbehaving and Faulty Nodes in Vehicular Networks.
IEEE Journal on Selected Areas in Communications, 2007

Guest Editorial Non-Cooperative Behavior in Networking.
IEEE Journal on Selected Areas in Communications, 2007

Guest Editorial Vehicular Networks.
IEEE Journal on Selected Areas in Communications, 2007

Securing vehicular ad hoc networks.
Journal of Computer Security, 2007

Efficient and robust pseudonymous authentication in VANET.
Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, 2007

Border Games in Cellular Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Wireless mesh networking: theories, protocols, and systems.
IEEE Wireless Commun., 2006

Securing wireless mesh networks.
IEEE Wireless Commun., 2006

Securing Vehicular Communications.
IEEE Wireless Commun., 2006

Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots.
IEEE Trans. Mob. Comput., 2006

Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Mobility Helps Peer-to-Peer Security.
IEEE Trans. Mob. Comput., 2006

Wireless operators in a shared spectrum.
Mobile Computing and Communications Review, 2006

Key Agreement in Peer-to-Peer Wireless Networks.
Proceedings of the IEEE, 2006

Secure positioning in wireless networks.
IEEE Journal on Selected Areas in Communications, 2006

Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Packet Coding for Strong Anonymity in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Efficient secure aggregation in VANETs.
Proceedings of the Third International Workshop on Vehicular Ad Hoc Networks, 2006

Non-Interactive Location Surveying for Sensor Networks with Mobility-Differentiated ToA.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Wireless Operators in a Shared Spectrum.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

COMMON-Sense Net: Improved Water Management for Resource-Poor Farmers via Sensor Networks.
Proceedings of the 2006 International Conference on Information and Communication Technologies and Development, 2006

Multi-radio channel allocation in competitive wireless networks.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Security and Cooperation in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

MobiRoute: Routing Towards a Mobile Sink for Improving Lifetime in Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Energy-Efficient Broadcasting in All-Wireless Networks.
Wireless Networks, 2005

DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks.
IEEE Trans. Dependable Sec. Comput., 2005

Reputation-based Wi-Fi deployment.
Mobile Computing and Communications Review, 2005

The security of vehicular networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

The security of vehicular ad hoc networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Cooperative Packet Forwarding in Multi-Domain Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

The security of VANETs.
Proceedings of the Second International Workshop on Vehicular Ad Hoc Networks, 2005

Visions for dynamic network scenarios in ubiquitous environments: applications and research issues.
Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, 2005

Joint mobility and routing for lifetime elongation in wireless sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Secure positioning of wireless devices with application to sensor networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

On selfish behavior in CSMA/CA networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2004

A formal model of rational exchange and its application to the analysis of Syverson's protocol.
Journal of Computer Security, 2004

The Security and Privacy of Smart Vehicles.
IEEE Security & Privacy, 2004

Probabilistic reliable multicast in ad hoc networks.
Ad Hoc Networks, 2004

Reputation-based Wi-Fi deployment protocols and security analysis.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

SOWER: self-organizing wireless network for messaging.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

NASCENT: network layer service for vicinity ad-hoc groups.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Rational behaviors in hotspots and in ad hoc networks.
Proceedings of the 7th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2004

DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots.
Proceedings of the Second International Conference on Mobile Systems, 2004

Denial of service resilience in ad hoc networks.
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, 2004

Joint synchronization, routing and energy saving in CSMA/CA multi-hop hybrid networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

New Research Challenges for the Security of Ad Hoc and Sensor Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

2003
Self-Organized Public-Key Management for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2003

Report on a working session on security in wireless ad hoc networks.
Mobile Computing and Communications Review, 2003

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks.
MONET, 2003

BISS: building secure routing out of an incomplete set of security associations.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

SECTOR: secure tracking of node encounters in multi-hop wireless networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Mobility helps security in ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Proceedings of the Financial Cryptography, 2003

2002
Report on the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002).
Mobile Computing and Communications Review, 2002

Formal methods for communication services: meeting the industry expectations.
Computer Networks, 2002

GPS-free Positioning in Mobile Ad Hoc Networks.
Cluster Computing, 2002

Small worlds in security systems: an analysis of the PGP certificate graph.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

Minimum-energy broadcast in all-wireless networks: : NP-completeness and distribution issues.
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, 2002

A Formal Analysis of Syverson?s Rational Exchange Protocol.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Modeling and testing object-oriented distributed systems with linear-time temporal logic.
Concurrency and Computation: Practice and Experience, 2001

Rational Exchange - A Formal Model Based on Game Theory.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

The quest for security in mobile ad hoc networks.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

GPS-Free Positioning in Mobile ad-hoc Networks.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
Towards mobile ad-hoc WANs: terminodes.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Enforcing service availability in mobile ad-hoc WANs.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

Issues of Mobile Ad-Hoc WANs.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Clock synchronization of MPEG-2 services over packet networks.
Telecommunication Systems, 1999

Integration of Internet and telecommunications: an architecture for hybrid services.
IEEE Journal on Selected Areas in Communications, 1999

A Survey of Distributed Enterprise Network and Systems Management Paradigms.
J. Network Syst. Manage., 1999

The Impact of the Internet on Telecommunication Architectures.
Computer Networks, 1999

Opportunities for electronic commerce in networking.
IEEE Communications Magazine, 1999

On applying formal techniques to the development of hybrid services: challenges and directions.
IEEE Communications Magazine, 1999

Provision of communication services over hybrid networks [Guest Editorial].
IEEE Communications Magazine, 1999

Voice service interworking for PSTN and IP networks.
IEEE Communications Magazine, 1999

A programmable architecture for the provision of hybrid services.
IEEE Communications Magazine, 1999

Accountable Anonymous Access to Services in Mobile Communication Systems.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Circuit Emulation Over IP Networks.
Proceedings of the Protocols for High Speed Networks VI, 1999

JAMAP: A Web-based Management Platform for IP Networks.
Proceedings of the Active Technologies for Network and Service Management, 1999

1998
Multimedia Resources: An Information Model and Its Application to an MPEG2 Video Codec.
J. Network Syst. Manage., 1998

Testing Temporal Logic Properties in Distributed Systems.
Proceedings of the Testing of Communicating Systems, IFIP TC6 11th International Workshop on Testing Communicating Systems (IWTCS), August 31, 1998

1997
A Generic Component Model for the design of future.
Proceedings of the Management of Multimedia Networks and Services, 1997

A new flexible and modular QoS mapping framework based on psychophysics.
Proceedings of the Management of Multimedia Networks and Services, 1997

Improving Clock Synchronization for MPEG-2 Services over ATMM Networks.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1997

Telecommunications Services Engineering: Principles, Architectures and Tools.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997

Workshop 1: Object-Oriented Technology for Telecommunications Services Engineering (Introduction).
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997

1996
A General Architecture for VPN Configuration Management.
J. Network Syst. Manage., 1996

Evaluating Performance from Formal Specification.
Proceedings of the MASCOTS '96, 1996

Multimedia Multipoint Teleteaching over the European ATM Pilot.
Proceedings of the Broadband Communications, 1996

Perceptual bit allocation for MPEG-2 CBR video coding.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

A New System Engineering Methodology Coupling Formal Specification and Performance Evaluation.
Proceedings of the FME '96: Industrial Benefit and Advances in Formal Methods, 1996

Perceptual Video Quality and Activity Metrics: Optimization of Video Services Based on MPEG-2 Encoding.
Proceedings of the Multimedia Telecommunications and Applications, 1996

New Network and ATM Adaptation Layers for Real-Time Multimedia Applications: A Performance Study Based on Psychophysics.
Proceedings of the Multimedia Telecommunications and Applications, 1996

1995
Object-oriented design of a VPN bandwidth management system.
Proceedings of the Integrated Network Management IV, 1995

1994
Multimedia Teletutoring over a Trans-European ATM Network.
Proceedings of the Multimedia: Advanced Teleservices and High-Speed Communication Architectures, 1994


  Loading...