Mariusz H. Jakubowski

According to our database1, Mariusz H. Jakubowski authored at least 29 papers between 1995 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Optimization of the Adaptive Computationally-Scalable Motion Estimation and Compensation for the Hardware H.264/AVC Encoder.
J. Signal Process. Syst., 2016

2013
Adaptive Computationally Scalable Motion Estimation for the Hardware H.264/AVC Encoder.
IEEE Trans. Circuits Syst. Video Technol., 2013

deDacota: toward preventing server-side XSS via automatic code and data separation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Hardware implementation of adaptive motion estimation and compensation for H.264/AVC.
Proceedings of the 2012 Picture Coding Symposium, 2012

2011
Guest Editors' Introduction: Software Protection.
IEEE Softw., 2011

2010
Quantifying Trust.
IACR Cryptol. ePrint Arch., 2010

Data Reuse in Two-level Hierarchical Motion Estimation for High Resolution Video Coding.
Proceedings of the SIGMAP 2010, 2010

2009
An Adaptive Computation-aware Algorithm for Multi-frame Variable Block-size Motion Estimation in H.264/AVC.
Proceedings of the SIGMAP 2009, 2009

Runtime Protection via Dataflow Flattening.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Iterated Transformations and Quantitative Metrics for Software Protection.
Proceedings of the SECRYPT 2009, 2009

Tamper-Tolerant Software: Modeling and Implementation.
Proceedings of the Advances in Information and Computer Security, 2009

2008
Constant Bitrate Control for a Distributed Video Coding System.
Proceedings of the SIGMAP 2008, 2008

The Superdiversifier: Peephole Individualization for Software Protection.
Proceedings of the Advances in Information and Computer Security, 2008

The Long-Short-Key Primitive and Its Applications to Key Security.
Proceedings of the Advances in Information and Computer Security, 2008

2007
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Run-Time Randomization to Mitigate Tampering.
Proceedings of the Advances in Information and Computer Security, 2007

Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A Graph Game Model for Software Tamper Protection.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Randomized radon transforms for biometric authentication via fingerprint hashing.
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007

2006
Delayed and Controlled Failures in Tamper-Resistant Software.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Proteus: virtualization for diversified tamper-resistance.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Randomized Detection For Spread-Spectrum Watermarking: Defending Against Sensitivity and Other Attacks.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2002
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Computing with Solitons: A Review and Prospectus.
Proceedings of the Collision-Based Computing, 2002

2000
Robust Image Hashing.
Proceedings of the 2000 International Conference on Image Processing, 2000

Image Watermarking with Better Resilience.
Proceedings of the 2000 International Conference on Image Processing, 2000

1998
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1996
When Can Solitons Compute?
Complex Syst., 1996

1995
Implementation of Parallel Arithmetic in a Cellular Automaton.
Proceedings of the International Conference on Application Specific Array Processors (ASAP'95), 1995


  Loading...