|
Search the dblp DataBase
Olivier Pereira:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Olivier Pereira, Jean-Jacques Quisquater
A Security Analysis of the Cliques Protocols Suites. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:73-81 [Conf]
- Olivier Pereira, Jean-Jacques Quisquater
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2004, pp:16-19 [Conf]
- Olivier Pereira, Jean-Jacques Quisquater
Security Analysis of the Cliques Protocols Suites: First Results. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:151-166 [Conf]
- Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Moses Liskov, Nancy A. Lynch, Olivier Pereira, Roberto Segala
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols. [Citation Graph (0, 0)][DBLP] DISC, 2006, pp:238-253 [Conf]
- Olivier Pereira, Jean-Jacques Quisquater
Some Attacks Upon Authenticated Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:4, pp:555-580 [Journal]
- Olivier Pereira, Jean-Jacques Quisquater
On the impossibility of building secure Cliques-type authenticated group key agreement protocols. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2006, v:14, n:2, pp:197-246 [Journal]
- Olivier Pereira, Laurence A. Wolsey
On the Wagner-Whitin Lot-Sizing Polyhedron. [Citation Graph (0, 0)][DBLP] Math. Oper. Res., 2001, v:26, n:3, pp:591-600 [Journal]
A block cipher based pseudo random number generator secure against side-channel key recovery. [Citation Graph (, )][DBLP]
Modeling Computational Security in Long-Lived Systems. [Citation Graph (, )][DBLP]
Compositional Security for Task-PIOAs. [Citation Graph (, )][DBLP]
Simulation-based analysis of E2E voting systems. [Citation Graph (, )][DBLP]
Simulation based security in the applied pi calculus. [Citation Graph (, )][DBLP]
The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP]
Universally Composable Security Analysis of TLS. [Citation Graph (, )][DBLP]
Simulation-Based Analysis of E2E Voting Systems. [Citation Graph (, )][DBLP]
Automatic Verification of Simulatability in Security Protocols. [Citation Graph (, )][DBLP]
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|