Olivier Heen
Olivier Heen
Bestätigte E-Mail-Adresse bei technicolor.com - Startseite
TitelZitiert vonJahr
Reverse engineering Intel last-level cache complex addressing using performance counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015
1232015
Method for the discovery of devices connected to an IP network and device to carry out said method
N Prigent, O Heen, Y Maetz, C Salmon-Legagneur, YM Tang-Talpin
US Patent App. 11/082,562, 2005
902005
An empirical study of passive 802.11 device fingerprinting
C Neumann, O Heen, S Onno
2012 32nd International Conference on Distributed Computing Systems …, 2012
672012
C5: cross-cores cache covert channel
C Maurice, C Neumann, O Heen, A Francillon
International Conference on Detection of Intrusions and Malware, and …, 2015
592015
New tool and technique for remote operating system fingerprinting
F Veysset, O Courtay, O Heen, IR Team
Intranode Software Technologies 4, 2002
592002
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system
N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux
US Patent 7,676,836, 2010
432010
Confidentiality issues on a GPU in a virtualized environment
C Maurice, C Neumann, O Heen, A Francillon
International Conference on Financial Cryptography and Data Security, 119-135, 2014
402014
A security protocol animator tool for AVISPA
Y Glouche, T Genet, O Heen, O Courtay
ARTIST2 workshop on security specification and verification of embedded …, 2006
362006
Secure long term communities in ad hoc networks
N Prigent, C Bidan, JP Andreaux, O Heen
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
332003
Improving the resistance to side-channel attacks on cloud storage services
O Heen, C Neumann, L Montalvo, S Defrance
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
242012
A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks
G Guette, O Heen
2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009
242009
A comparative privacy analysis of geosocial networks
S Gambs, O Heen, C Potin
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011
222011
Taming the Android appstore: Lightweight characterization of Android applications
L Vigneri, J Chandrashekar, I Pefkianakis, O Heen
arXiv preprint arXiv:1504.06093, 2015
182015
Using animation to improve formal specifications of security protocols
Y Boichut, T Genet, Y Glouche, O Heen
2nd Conference on Security in Network Architectures and Information Systems …, 2007
142007
Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting
C Maurice, S Onno, C Neumann, O Heen, A Francillon
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
122013
Methods and devices for 3D object protection using surface subdivision
E Diehl, O Heen, Y Maetz, M Eluard
US Patent 9,202,064, 2015
112015
Thèse : Économie de ressources sur Automates Cellulaires
O Heen
11*1996
Linear speed-up for cellular automata synchronizers and applications
O Heen
Theoretical Computer Science 188 (1-2), 45-57, 1997
101997
On the unobservability of a trust relation in mobile ad hoc networks
O Heen, G Guette, T Genet
IFIP International Workshop on Information Security Theory and Practices, 1-11, 2009
92009
An industrial and academic joint experiment on automated verification of a security protocol
O Heen, T Genet, S Geller, N Prigent
Mobile and Wireless Networks Security, 39-53, 2008
82008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20