Follow
Philippe Oechslin
Philippe Oechslin
Objectif Sécurité / EPFL
Verified email at objectif-securite.ch - Homepage
Title
Cited by
Cited by
Year
Making a faster cryptanalytic time-memory trade-off
P Oechslin
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
8132003
A scalable and provably secure hash-based RFID protocol
G Avoine, P Oechslin
Third IEEE International Conference on Pervasive Computing and …, 2005
4742005
Differentiated end-to-end Internet services using a weighted proportional fair sharing TCP
J Crowcroft, P Oechslin
ACM SIGCOMM Computer Communication Review 28 (3), 53-69, 1998
3831998
Reducing time complexity in RFID systems
G Avoine, E Dysli, P Oechslin
Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006
3272006
RFID traceability: A multilayer problem
G Avoine, P Oechslin
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
3182005
Packet network interface
VP Kumar, HD Lin, JH O'neill, P Oechslin, EJ Ouellette III
US Patent 5,898,689, 1999
1151999
Characterization and improvement of time-memory trade-off based on perfect tables
G Avoine, P Junod, P Oechslin
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-22, 2008
1022008
SMART: A many-to-many multicast protocol for ATM
E Gauthier, JY Le Boudec, P Oechslin
IEEE Journal on Selected areas in Communications 15 (3), 458-472, 1997
811997
Time-memory trade-offs: False alarm detection using checkpoints
G Avoine, P Junod, P Oechslin
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
722005
On parallelizing and optimizing the implementation of communication protocols
S Leue, PA Oechslin
IEEE/ACM transactions on networking 4 (1), 55-70, 1996
361996
Cyber-secure communication architecture for active power distribution networks
TT Tesfay, JP Hubaux, JY Le Boudec, P Oechslin
Proceedings of the 29th annual acm symposium on applied computing, 545-552, 2014
272014
Cyber-secure communication architecture for active power distribution networks
TT Tesfay, JP Hubaux, JY Le Boudec, P Oechslin
Proceedings of the 29th annual acm symposium on applied computing, 545-552, 2014
272014
Worst case arrivals of leaky bucket constrained sources: the myth of the on-off source
P Oechslin
Building QoS into Distributed Systems: IFIP TC6 WG6. 1 Fifth International …, 1997
241997
Application REQuested IP over ATM (AREQUIPA)
W Almesberger, J Le Boudec, P Oechslin
161997
VBR over VBR: the homogeneous, loss-free case
S Giordano, JY Le Boundec, P Oechslin, S Robert
Proceedings of INFOCOM'97 1, 168-176, 1997
141997
Optimization techniques for parallel protocol implementation
S Leue, P Oechslin
1993 4th Workshop on Future Trends of Distributed Computing Systems, 387-393, 1993
141993
On-off sources and worst case arrival patterns of the leaky bucket
P Oechslin
Technical report, University College London, 1997
131997
Arequipa: TCP/IP over ATM with QoS::: for the impatient,"
W Almesberger, JY Le Boudec, P Oechslin
Laboratoire de Reseaux de Communication, Swiss Federal Institute of …, 1997
131997
Computer system security: basic concepts and solved exercises
G Avoine, P Junod, P Oechslin
EPFL Press, 2007
122007
ALI: A versatile interface chip for ATM systems
P Oechslin, V Kumar, HD Lin, J O'Neill, E Ouellette
[Conference Record] GLOBECOM'92-Communications for Global Users: IEEE, 1282-1287, 1992
111992
The system can't perform the operation now. Try again later.
Articles 1–20