Ben J. M. Smeets

According to our database1, Ben J. M. Smeets authored at least 36 papers between 1984 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
J. Signal Process. Syst., 2017

2015
Encryption Performance Improvements of the Paillier Cryptosystem.
IACR Cryptol. ePrint Arch., 2015

Remotely Managed Logic Built-In Self-Test for Secure M2M Communications.
IACR Cryptol. ePrint Arch., 2015

Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Keyed logic BIST for Trojan detection in SoC.
Proceedings of the 2014 International Symposium on System-on-Chip, 2014

Using TPM Secure Storage in Trusted High Availability Systems.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2012
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2011
Authentication, From an Information Theoretic Perspective.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Technique for Remote Detection of Certain Virtual Machine Monitors.
Proceedings of the Trusted Systems - Third International Conference, 2011

2005
Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2001
The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols.
Proceedings of the Data Compression Conference, 2001

2000
Bluetooth Security - An Overview.
Inf. Secur. Tech. Rep., 2000

A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Some Notes on the Context Mapping Function in Lossless Data Compression.
Proceedings of the Data Compression Conference, 2000

1999
Incremental Authentication of Tree-Structured Documents.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
Unconditionally Secure Group Authentication.
Des. Codes Cryptogr., 1998

Weighting of Double Exponential Distributed Data in Lossless Image Compression.
Proceedings of the Data Compression Conference, 1998

Non-Uniform PPM and Context Tree Models.
Proceedings of the Data Compression Conference, 1998

1997
Multialphabet coding with separate alphabet description.
Proceedings of the Compression and Complexity of SEQUENCES 1997, 1997

A Digital Signature Scheme Based on Random Error-Correcting Codes.
Proceedings of the Cryptography and Coding, 1997

Fast Message Authentication Using Efficient Polynomial Evaluation.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Towards Understanding and Improving Escape Probabilities in PPM.
Proceedings of the 7th Data Compression Conference (DCC '97), 1997

1996
On the cardinality of systematic authentication codes via error-correcting codes.
IEEE Trans. Inf. Theory, 1996

1994
On the construction of cartesian authentication codes over symplectic spaces.
IEEE Trans. Inf. Theory, 1994

Bounds on the probability of deception in multiple authentication.
IEEE Trans. Inf. Theory, 1994

On A²-Codes Including Arbiter's Attacks.
Proceedings of the Advances in Cryptology, 1994

1993
On the Relation between A-Codes and Codes Correcting Independent Errors.
Proceedings of the Advances in Cryptology, 1993

On Families of Hash Functions via Geometric Codes and Concatenation.
Proceedings of the Advances in Cryptology, 1993

1992
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound.
IEEE Trans. Inf. Theory, 1992

1991
On A Fast Correlation Attack on Certain Stream Ciphers.
Proceedings of the Advances in Cryptology, 1991

1990
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.
Proceedings of the Advances in Cryptology, 1990

1988
Windmill Generators: A Generalization and an Observation of How Many There Are.
Proceedings of the Advances in Cryptology, 1988

1986
Some Properties of Sequences Generated by a Windmill Machine.
EUROCRYPT, 1986

1985
A Note On Sequences Generated by Clock Controlled Shift Registers.
Proceedings of the Advances in Cryptology, 1985

A Comment on Niederreiter's Public Key Cryptosystem.
Proceedings of the Advances in Cryptology, 1985

1984
On the Use of the Binary Multiplying Channel in a Private Communication System.
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984


  Loading...