# Ben J. M. Smeets

According to our database

Collaborative distances:

^{1}, Ben J. M. Smeets authored at least 36 papers between 1984 and 2017.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2017

Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.

J. Signal Process. Syst., 2017

2015

IACR Cryptol. ePrint Arch., 2015

IACR Cryptol. ePrint Arch., 2015

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality.

Proceedings of the Financial Cryptography and Data Security, 2015

2014

Proceedings of the 2014 International Symposium on System-on-Chip, 2014

Proceedings of the Trusted Systems - 6th International Conference, 2014

2012

Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.

Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Trusted Systems - Third International Conference, 2011

2005

Proceedings of the Encyclopedia of Cryptography and Security, 2005

2001

The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols.

Proceedings of the Data Compression Conference, 2001

2000

Inf. Secur. Tech. Rep., 2000

Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Proceedings of the Data Compression Conference, 2000

1999

Proceedings of the Information and Communication Security, Second International Conference, 1999

1998

Des. Codes Cryptogr., 1998

Proceedings of the Data Compression Conference, 1998

Proceedings of the Data Compression Conference, 1998

1997

Proceedings of the Compression and Complexity of SEQUENCES 1997, 1997

Proceedings of the Cryptography and Coding, 1997

Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Proceedings of the 7th Data Compression Conference (DCC '97), 1997

1996

IEEE Trans. Inf. Theory, 1996

1994

IEEE Trans. Inf. Theory, 1994

IEEE Trans. Inf. Theory, 1994

Proceedings of the Advances in Cryptology, 1994

1993

Proceedings of the Advances in Cryptology, 1993

Proceedings of the Advances in Cryptology, 1993

1992

IEEE Trans. Inf. Theory, 1992

1991

Proceedings of the Advances in Cryptology, 1991

1990

On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.

Proceedings of the Advances in Cryptology, 1990

1988

Proceedings of the Advances in Cryptology, 1988

1986

Some Properties of Sequences Generated by a Windmill Machine.

EUROCRYPT, 1986

1985

Proceedings of the Advances in Cryptology, 1985

Proceedings of the Advances in Cryptology, 1985

1984

Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984