29 results on '"Olivier Heen"'
Search Results
2. C5: Cross-Cores Cache Covert Channel.
3. Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
4. Confidentiality Issues on a GPU in a Virtualized Environment.
5. Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
6. An Empirical Study of Passive 802.11 Device Fingerprinting.
7. Distributed and Private Group Management.
8. Improving the Resistance to Side-Channel Attacks on Cloud Storage Services.
9. A comparative privacy analysis of geosocial networks.
10. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.
11. A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks.
12. Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies.
13. DNStamp: Short-lived trusted timestamping.
14. Secure long term communities in ad hoc networks.
15. User-based authentication for wireless home networks.
16. Taming the Android AppStore: Lightweight Characterization of Android Applications.
17. Recall-a-story, a story-telling graphical password system.
18. An empirical study of passive 802.11 Device Fingerprinting.
19. Linear Speed-Up for Cellular Automata Synchronizers and Applications.
20. Efficient Constant Speed-Up for one Dimensional Cellular Automata Calculators.
21. Conciliating remote home network access and MAC-address control.
22. DNStamp: Short-lived Trusted Timestamping.
23. Pretty Private Group Management
24. An empirical study of passive 802.11 Device Fingerprinting
25. DNStamp: Short-lived Trusted Timestamping
26. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
27. AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL
28. Privacy implications of geosocial proximity
29. Improvement of 802.11 fingerprint diversity
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.