Recherche - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu

Filtrer vos résultats

13 résultats
Image document

Clustering in P2P exchanges and consequences on performances.

Stevens Le-Blond , Jean-Loup Guillaume , Matthieu Latapy
4th International Workshop on Peer-To-Peer Systems (IPTPS'05), 2005, Ithaca, NY, United States. pp.193 - 204, ⟨10.1007/11558989_18⟩
Communication dans un congrès hal-00016820v1
Image document

Statistical analysis of a P2P query graph based on degrees and their time-evolution

Jean-Loup Guillaume , Matthieu Latapy , Stevens Le-Blond
6th International Workshop on Distributed Computing (IWDC 04), 2004, Kolkata, India. pp.126-137, ⟨10.1007/b104419⟩
Communication dans un congrès hal-00016859v1
Image document

Pushing BitTorrent Locality to the Limit

Stevens Le Blond , Arnaud Legout , Walid Dabbous
Computer Networks, 2010, ⟨10.1016/j.comnet.2010.09.014⟩
Article dans une revue inria-00534117v1
Image document

Pushing BitTorrent Locality to the Limit

Stevens Le Blond , Arnaud Legout , Walid Dabbous
2009
Pré-publication, Document de travail inria-00343822v2
Image document

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

Stevens Le Blond , Pere Manils , Chaabane Abdelberi , Mohamed Ali Kaafar , Claude Castelluccia , et al.
LETT'11 - 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Mar 2011, Boston, United States
Communication dans un congrès inria-00574178v1
Image document

Compromising Tor Anonymity Exploiting P2P Information Leakage

Pere Manils , Chaabane Abdelberi , Stevens Le Blond , Mohamed Ali Kaafar , Claude Castelluccia , et al.
[Research Report] 2010
Rapport inria-00471556v1
Image document

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

Stevens Le Blond , Chao Zhang , Arnaud Legout , Keith W. Ross , Walid Dabbous
IMC’2011, Nov 2011, Berlin, Germany
Communication dans un congrès inria-00632780v1
Image document

Angling for Big Fish in BitTorrent

Stevens Le Blond , Arnaud Legout , Fabrice Le Fessant , Walid Dabbous
[Research Report] 2010
Rapport inria-00451282v1
Image document

De-anonymizing BitTorrent Users on Tor

Stevens Le Blond , Pere Manils , Abdelberi Chaabane , Mohamed Ali Kaafar , Arnaud Legout , et al.
Poster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), Apr 2010, San Jose, CA, United States
Communication dans un congrès inria-00471177v1
Image document

Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

Stevens Le Blond , Arnaud Legout , Fabrice Le Fessant , Walid Dabbous , Mohamed Ali Kaafar
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), Usenix, Apr 2010, San Jose, CA, United States
Communication dans un congrès inria-00470324v1
Image document

Finding Good Partners in Availability-aware P2P Networks

Stevens Le Blond , Fabrice Le Fessant , Erwan Le Merrer
International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS'09), Nov 2009, Lyon, France
Communication dans un congrès inria-00432741v1
Image document

Choix de partenaires en p2p suivant des critères de disponibilité

Stevens Le Blond , Fabrice Le Fessant , Erwan Le Merrer
conférence francaise sur les systèmes d'exploitation, Sep 2009, Toulouse, France
Communication dans un congrès inria-00432747v1
Image document

Finding Good Partners in Availability-aware P2P Networks

Stevens Le Blond , Fabrice Le Fessant , Erwan Le Merrer
[Research Report] RR-6795, INRIA. 2009, pp.17
Rapport inria-00352529v1