Philippe Oechslin
Philippe Oechslin
Objectif Sécurité / EPFL
Adresse e-mail validée de objectif-securite.ch - Page d'accueil
TitreCitée parAnnée
Making a faster cryptanalytic time-memory trade-off
P Oechslin
Annual International Cryptology Conference, 617-630, 2003
6142003
A scalable and provably secure hash-based RFID protocol
G Avoine, P Oechslin
Third IEEE International Conference on Pervasive Computing and …, 2005
4212005
Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP
J Crowcroft, P Oechslin
ACM SIGCOMM Computer Communication Review 28 (3), 53-69, 1998
3341998
RFID traceability: A multilayer problem
G Avoine, P Oechslin
International Conference on Financial Cryptography and Data Security, 125-140, 2005
2932005
Reducing time complexity in RFID systems
G Avoine, E Dysli, P Oechslin
International workshop on selected areas in cryptography, 291-306, 2005
2862005
Packet network interface
VP Kumar, HD Lin, JH O'neill, P Oechslin, EJ Ouellette III
US Patent 5,898,689, 1999
1151999
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 17, 2008
852008
SMART: A many-to-many multicast protocol for ATM
E Gauthier, JY Le Boudec, P Oechslin
IEEE Journal on Selected areas in Communications 15 (3), 458-472, 1997
741997
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
International Conference on Cryptology in India, 183-196, 2005
622005
Financial Cryptography and Data Security
G Avoine, P Oechslin
RFID traceability: A multilayer problem, Lecture Notes in Computer Science …, 2008
492008
On parallelizing and optimizing the implementation of communication protocols
S Leue, PA Oechslin
IEEE/ACM transactions on networking 4 (1), 55-70, 1996
361996
Evaluating static source code analysis tools
T Hofer
212010
Worst case arrivals of leaky bucket constrained sources: the myth of the on-off source
P Oechslin
Building QoS into Distributed Systems, 67-76, 1997
201997
Cyber-secure communication architecture for active power distribution networks
TT Tesfay, JP Hubaux, JY Le Boudec, P Oechslin
Proceedings of the 29th annual acm symposium on applied computing, 545-552, 2014
162014
Cyber-secure communication architecture for active power distribution networks
TT Tesfay, JP Hubaux, JY Le Boudec, P Oechslin
Proceedings of the 29th annual acm symposium on applied computing, 545-552, 2014
162014
Application REQuested IP over ATM (AREQUIPA)
W Almesberger
161997
VBR over VBR: the homogeneous, loss-free case
S Giordano, JY Le Boundec, P Oechslin, S Robert
Proceedings of INFOCOM'97 1, 168-176, 1997
151997
Optimization techniques for parallel protocol implementation
S Leue, P Oechslin
1993 4th Workshop on Future Trends of Distributed Computing Systems, 387-393, 1993
141993
ALI: A versatile interface chip for ATM systems
P Oechslin, V Kumar, HD Lin, J O'Neill, E Ouellette
[Conference Record] GLOBECOM'92-Communications for Global Users: IEEE, 1282-1287, 1992
121992
On-off sources and worst case arrival patterns of the leaky bucket
P Oechslin
111997
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20