Olivier Heen

According to our database1, Olivier Heen authored at least 21 papers between 1997 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
On the Privacy Impacts of Publicly Leaked Password Databases.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2015
Taming the Android AppStore: Lightweight Characterization of Android Applications.
CoRR, 2015

Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

C5: Cross-Cores Cache Covert Channel.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
DNStamp: Short-lived trusted timestamping.
Comput. Networks, 2014

Confidentiality Issues on a GPU in a Virtualized Environment.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
Proceedings of the SECRYPT 2013, 2013

2012
Distributed and Private Group Management.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Improving the Resistance to Side-Channel Attacks on Cloud Storage Services.
Proceedings of the 5th International Conference on New Technologies, 2012

An Empirical Study of Passive 802.11 Device Fingerprinting.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Conciliating remote home network access and MAC-address control.
Proceedings of the IEEE International Conference on Consumer Electronics, 2012

User-based authentication for wireless home networks.
Proceedings of the IEEE Second International Conference on Consumer Electronics - Berlin, 2012

2011
Pretty Private Group Management
CoRR, 2011

A comparative privacy analysis of geosocial networks.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

2009
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Recall-a-story, a story-telling graphical password system.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

2004
Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies.
Proceedings of the Security and Protection in Information Processing Systems, 2004

2003
Secure long term communities in ad hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

1997
Linear Speed-Up for Cellular Automata Synchronizers and Applications.
Theor. Comput. Sci., 1997

Efficient Constant Speed-Up for one Dimensional Cellular Automata Calculators.
Parallel Comput., 1997


  Loading...