default search action
Olivier Festor
- > Home > Persons > Olivier Festor
Publications
- 2015
- [c122]Juan Pablo Timpanaro, Thibault Cholez
, Isabelle Chrisment, Olivier Festor
:
Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. ICISSP 2015: 46-55 - 2014
- [c110]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Group-Based Characterization for the I2P Anonymous File-Sharing Environment. NTMS 2014: 1-5 - 2013
- [j29]Thibault Cholez
, Isabelle Chrisment, Olivier Festor
, Guillaume Doyen:
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Netw. Appl. 6(2): 155-174 (2013) - [c101]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Monitoring anonymous P2P file-sharing systems. P2P 2013: 1-2 - 2012
- [c96]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Improving Content Availability in the I2P Anonymous File-Sharing Environment. CSS 2012: 77-92 - [c90]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
A Bird's Eye View on the I2P Anonymous File-Sharing Environment. NSS 2012: 135-148 - [c88]Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
I2P's Usage Characterization. TMA 2012: 48-51 - [i7]Raphaël Fournier, Thibault Cholez, Matthieu Latapy, Clémence Magnien, Isabelle Chrisment, Ivan Daniloff, Olivier Festor:
Comparing paedophile activity in different P2P systems. CoRR abs/1206.4167 (2012) - 2011
- [c78]Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor:
When KAD Meets BitTorrent - Building a Stronger P2P Network. IPDPS Workshops 2011: 1635-1642 - [c77]Juan Pablo Timpanaro, Thibault Cholez
, Isabelle Chrisment, Olivier Festor
:
BitTorrent's Mainline DHT Security Assessment. NTMS 2011: 1-5 - [c76]Guillaume Montassier, Thibault Cholez
, Guillaume Doyen, Rida Khatoun, Isabelle Chrisment, Olivier Festor
:
Content pollution quantification in large P2P networks : A measurement study on KAD. Peer-to-Peer Computing 2011: 30-33 - 2010
- [j26]Frédéric Beck, Isabelle Chrisment, Ralph E. Droms, Olivier Festor
:
Autonomic renumbering in the future iInternet. IEEE Commun. Mag. 48(7): 86-92 (2010) - [c71]Frédéric Beck, Olivier Festor, Isabelle Chrisment, Ralph E. Droms:
Automated and secure IPv6 configuration in enterprise networks. CNSM 2010: 64-71 - [c70]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Monitoring and Controlling Content Access in KAD. ICC 2010: 1-6 - [c68]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
Efficient DHT attack mitigation through peers' ID distribution. IPDPS Workshops 2010: 1-8 - 2009
- [c59]Thibault Cholez
, Isabelle Chrisment, Olivier Festor
:
Evaluation of Sybil Attacks Protection Schemes in KAD. AIMS 2009: 70-82 - 2008
- [j18]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Group Key Management in MANETs. Int. J. Netw. Secur. 6(1): 67-79 (2008) - [c50]Thibault Cholez, Isabelle Chrisment, Olivier Festor:
A Distributed and Adaptive Revocation Mechanism for P2P Networks. ICN 2008: 290-295 - 2007
- [j17]Mohamed Salah Bouassida, Najah Chridi, Isabelle Chrisment, Olivier Festor, Laurent Vigneron:
Automated verification of a key management architecture for hierarchical group protocols. Ann. des Télécommunications 62(11-12): 1365-1387 (2007) - 2006
- [j13]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Mobility-awareness in group key management protocols within MANETs. Ann. des Télécommunications 61(9-10): 1149-1171 (2006) - [c36]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Efficient Group Key Management Protocol in MANETs using the Multipoint Relaying Technique. ICN/ICONS/MCL 2006: 64 - 2005
- [c26]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Efficient Clustering for Multicast Key Distribution in MANETs. NETWORKING 2005: 138-153 - 2004
- [c22]Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. NETWORKING 2004: 725-742 - 2003
- [c19]Radu State, Olivier Festor, Isabelle Chrisment:
Context Driven Access Control to SNMP MIB Objects in Multi-homed Environments. DSOM 2003: 169-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint