Publications
International Journals:
- E. Anceaume, G. Guette, P. Lajoie-Mazenc, T. Sirvent, and V. Viet Triem Tong.
Extending Signatures of Reputation.
In IFIP Advances in Information and Communication Technology. 2014.
- B. Radier, G. Guette, M. Salaün and F. Naït-Abdesselam.
A Vehicle Gateway to Manage IMS Autonomous Mobility.
In International Journal of Autonomous and Adaptative Communications Systems. Vol. 3, No.2 pp. 159 - 177, 2010.
-
G. Guette.
Automating Trusted Key Rollover in DNSSEC.
In International Journal of Computer Security. Vol. 17, No 6, pp 839-854, 2009.
- M.S. Bouassida, G. Guette, M. Shawky and B. Ducourthial.
Sybil Nodes Detection based on Received Signal Strength Variations within VANETs.
In International Journal of Network Security. Vol. 9, No 1, pp 22-33, 2009.
- G. Guette.
Key Revocation System for DNSSEC.
In Journal of Networks. Vol. 3, Issue 6, pages 54-61, June 2008.
French Journals:
International Conferences:
- Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse.
Alternatives to Binary Routing Policies Applied to a Military MANET Coalition. In IWCMC, International Wireless Communications and Mobile Computing Conference, Jun 2018.
- Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse.
ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing Protocol. In MILCOM, International Conference for Military Communications, November 2016
- Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse.
Comparing inter-domain routing protocol assessment tools for MANET. In ICC, IEEE International Conference on Communications, May 2016
- Paul Lajoie-Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong
Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings.
In IFIPTM, International Conference on Trust Management, May 2015.
- Christophe Bidan, David Boucart, Morgane Chapon, Patrick Cloitre, Grégory Donias, Gilles Guette, Thierry Plesse, Nicolas Prigent,Sarah Tarrapey.
Preventive and corrective security solutions for routing in military tactical ad hoc networks.
In MCC, Military Communications and Information Systems Conference, October 2013.
- E. Anceaume, G. Guette, P. Lajoie-Mazenc, N. Prigent and V. Viet Triem Tong.
A Privacy-Preserving Distributed Reputation Mechanism.
In IEEE Internation Conference on Computer Communications (ICC), June 2013.
- C. Artigues, Y. Deswarte, J. Guiochet, M-J. Huguet, M-O. Killijian, D. Powell, M. Roy, E. Anceaume, S. Gambs, G. Guette, M. Hurfin, C. Bidan, N. Prigent and F. Schettini.
AMORES: an Architecture for MObiquitous REsilient Systems.
In 1st European Workshop on AppRoaches to MObiquiTous Resilience (ARMOR), August 2012.
- G. Guette, O. Heen.
A TPM-based Architecture for Improved Security and Anonymity in Vehicular Ad hoc Networks..
In International Vehicular Networking Conference (IEEE VNC 2009), October 2009.
- O. Heen, G. Guette and T. Genet.
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.
In International Workshop in Information Security Theory and Practices (WISTP 2009), LNCS Volume 5746 pages 1-11. Springer, September 2009.
- G. Guette, C. Bryce
Using TPMs to Secure Vehicular Ad hoc Networks (VANETs).
In International Workshop in Information Security Theory and Practices (WISTP 2008), LNCS Volume 5019 pages 106-116. Springer, May 2008.
- G. Guette, B. Ducourthial
On the Sybil attack detection in VANET.
In IEEE International Workshop on Mobile Vehicular Networks (IEEE MoveNet 2007), co-located with IEEE MASS, pages 1-6. October 2007.
- G. Guette, B. Cousin, D. Fort.
GDS Resource Record: Generalization ot the Delegation Signer Model.
In IEEE International Conference on Networking (ICN), LNCS volume 3421, pages 844-851. Springer, April 2005.
- G. Guette.
Key Management in DNSSEC.
Poster,
Abstract.
In IEEE Infocom'05 Student Workshop, March 2005.
- G. Guette, B. Cousin, D. Fort.
Algorithm for DNSSEC trusted key rollover.
In International Conference on Information Networking (ICOIN),
LNCS volume 3391, pages 679-688. Springer, January 2005.
- G. Guette, O. Courtay.
KRO: A Key RollOver Algorithm for DNSSEC.
In International Conference on Information and Communication
Technology (ICICT), pages 217-228, November 2003.
French Conferences:
- Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse.
Comparaison d’outils d’évaluation de performance des protocoles de routage inter–MANET. In NOTERE, , July 2016.
- Paul Lajoie–Mazenc, Emmanuelle Anceaume, Gilles Guette, Thomas Sirvent, Valérie Viet Triem Tong.
Mécanisme de réputation distribué préservant la vie privée avec témoignages négatifs. In ALGOTEL, Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, June 2015.
- P. Lajoie-Mazenc, E. Anceaume, G. Guette, T. Sirvent and V. Viet Triem Tong.
Signatures de réputation.
Journées Codage et Cryptographie 2014
- S. Boche,G. Guette, C. Bidan and N. Prigent.
NoName: un protocole de routage ad hoc respectant la vie
privée.
Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, pages 122-134. September 2013.
- E. Anceaume, G. Guette, P. Lajoie-Mazenc, T. Sirvent and V. Viet Triem Tong
Signature de Réputation Anonymes (Poster).
Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information. September 2013.
- Gilles Guette and Olivier Heen.
Utilisation de Trusted Platform Modules pour la sécurité et l'anonymat des réseaux de véhicules.
4ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, pages 263-277. June 2009.
- Tayeb Lemlouma and Gilles Guette.
Agile : une Approche Autonome pour les Architectures de Télécommunication.
CNRIUT'09, 15ème Colloque National de la Recherche en IUT, poster. June 2009
- O. Heen, G. Guette and T. Genet.
Anonymat dans les communautés de confiance.
3ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI), pages 183-195. October 2008.
- G. Guette.
Etude des conséquences de clés compromises dans DNSSEC.
5ème rencontres francophones sur la
Sécurité et Architecture Réseaux (SAR), pages 365-379. June 2006.
- G. Guette, B. Cousin, D. Fort.
Le roulement automatique des clés de confiance dans les résolveurs DNSSEC.
4ème rencontres francophones sur la Sécurité et Architecture Réseaux
(SAR), pages 3-12, June 2005.
- G. Guette, O. Courtay, B. Cousin.
Complémentarité de DNSSEC et d'IPsec.
Journées Réseaux (JRES), pages 259-267, November 2003.
- G. Guette, B. Cousin.
Les Faiblesses du DNS.
2ème rencontre francophone sur la Sécurité et Architecture Réseaux
(SAR), pages 235-244, June 2003.
Research Reports:
- G. Guette, C. Bidan, N. Prigent, G. Donias, P. Cloitre
Specification and Comparison of the Security Solutions for Ad Hoc Routing Protocols in the Context of Tactical Military Networks
Second deliverable of the Exploratory Study Program "Protection and Evaluation (PREVA)", February 2012
- G. Guette, C. Bidan, N. Prigent, G. Donias, P. Cloitre
Spécification et comparaison des solutions de sécurité adaptées aux protocoles réactifs et aux protocoles proactifs
Livrable 2 du Programme d'étude amont : Protection et Evaluation (PREVA), February 2012
- C. Bidan, N. Prigent, G. Guette, G. Donias, P. Cloitre, C. Guillou
Securing ad hoc routing protocols in radio networks
First deliverable of the Exploratory Study Program "Protection and Evaluation (PREVA)", December 2011
- C. Bidan, N. Prigent, G. Guette, G. Donias, P. Cloitre, C. Guillou
Études des différents protocoles de routage ad hoc et des attaques sur ces protocoles
Livrable 1 du Programme d'étude amont : Protection et Evaluation (PREVA), December 2011
- G. Guette, B. Ducourthial
On the Sybil attack detection in VANET (extended version).
Technical report Heudiasyc-Université de Technologie de Compiègne, August 2007.
- G. Guette.
Consequences of compromised zone keys in DNSSEC.
Rapport de recherche INRIA 5854, March 2006.
- G. Guette.
Evaluation du service rendu par DNSSEC lors de son utilisation avec Mobile IPv6.
Delivrable of IDsA project, June 2004.
Ph.D. Thesis:
Standardization:
Contributor of:
-
R. Arends, R. Austein, M. Larson, D. Massey et S. Rose.
DNS Security Introduction and Requirements.
RFC 4033, March 2005.
-
O. Kolkman et R. Gieben.
DNSSEC Operational Practices.
RFC 4641, Septembre 2006.
Author of:
-
G. Guette, O. Courtay.
Requirements for Automated Key Rollover in DNSSEC.
Draft IETF, 2005.
-
G. Guette, D. Fort et B. Cousin.
Generalization of Delegation Signer Resource Record (DS RR) use.
Draft IETF.
-
R. Gieben, G. Guette et O. Courtay.
DNSSEC Resolver Interface to Applications.
Draft IETF.