The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Olivier Pereira: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Olivier Pereira, Jean-Jacques Quisquater
    A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:73-81 [Conf]
  2. Olivier Pereira, Jean-Jacques Quisquater
    Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:16-19 [Conf]
  3. Olivier Pereira, Jean-Jacques Quisquater
    Security Analysis of the Cliques Protocols Suites: First Results. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:151-166 [Conf]
  4. Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala
    Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. [Citation Graph (0, 0)][DBLP]
    DISC, 2006, pp:238-253 [Conf]
  5. Olivier Pereira, Jean-Jacques Quisquater
    Some Attacks Upon Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:4, pp:555-580 [Journal]
  6. Olivier Pereira, Jean-Jacques Quisquater
    On the impossibility of building secure Cliques-type authenticated group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:2, pp:197-246 [Journal]
  7. Olivier Pereira, Laurence A. Wolsey
    On the Wagner-Whitin Lot-Sizing Polyhedron. [Citation Graph (0, 0)][DBLP]
    Math. Oper. Res., 2001, v:26, n:3, pp:591-600 [Journal]

  8. A block cipher based pseudo random number generator secure against side-channel key recovery. [Citation Graph (, )][DBLP]


  9. Modeling Computational Security in Long-Lived Systems. [Citation Graph (, )][DBLP]


  10. Compositional Security for Task-PIOAs. [Citation Graph (, )][DBLP]


  11. Simulation-based analysis of E2E voting systems. [Citation Graph (, )][DBLP]


  12. Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP]


  13. The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP]


  14. Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]


  15. Simulation-Based Analysis of E2E Voting Systems. [Citation Graph (, )][DBLP]


  16. Automatic Verification of Simulatability in Security Protocols. [Citation Graph (, )][DBLP]


  17. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002