default search action
Ben J. M. Smeets
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j7]Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST. J. Signal Process. Syst. 87(3): 371-381 (2017) - 2015
- [c24]Patrik Lantz, Björn Johansson, Martin Hell, Ben J. M. Smeets:
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. Financial Cryptography Workshops 2015: 261-273 - [i4]Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST. CoRR abs/1511.07792 (2015) - [i3]Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:
Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. IACR Cryptol. ePrint Arch. 2015: 185 (2015) - [i2]Christine Jost, Ha Lam, Alexander Maximov, Ben J. M. Smeets:
Encryption Performance Improvements of the Paillier Cryptosystem. IACR Cryptol. ePrint Arch. 2015: 864 (2015) - 2014
- [c23]Martin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic:
Using TPM Secure Storage in Trusted High Availability Systems. INTRUST 2014: 243-258 - [c22]Elena Dubrova, Mats Näslund, Gunnar Carlsson, Ben J. M. Smeets:
Keyed logic BIST for Trojan detection in SoC. ISSoC 2014: 1-4 - 2012
- [c21]Leonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib, Thomas Johansson, Nahid Shahmehri:
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry. UIC/ATC 2012: 627-632 - 2011
- [c20]Christopher Jämthagen, Martin Hell, Ben J. M. Smeets:
A Technique for Remote Detection of Certain Virtual Machine Monitors. INTRUST 2011: 129-137 - [r2]Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication, From an Information Theoretic Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 63-65
2000 – 2009
- 2005
- [r1]Gregory A. Kabatiansky, Ben J. M. Smeets:
Authentication. Encyclopedia of Cryptography and Security 2005 - 2001
- [c19]Nicklas Ekstrand, Bela Rathonyi, Yuri M. Shtarkov, Ben J. M. Smeets:
The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols. Data Compression Conference 2001: 494 - 2000
- [j6]Joakim Persson, Ben J. M. Smeets:
Bluetooth Security - An Overview. Inf. Secur. Tech. Rep. 5(3): 32-43 (2000) - [c18]Nicklas Ekstrand, Ben J. M. Smeets:
Some Notes on the Context Mapping Function in Lossless Data Compression. Data Compression Conference 2000: 553 - [c17]Vladimir V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets:
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. FSE 2000: 181-195
1990 – 1999
- 1999
- [c16]Patrik Ekdahl, Ben J. M. Smeets:
Incremental Authentication of Tree-Structured Documents. ICICS 1999: 275-283 - 1998
- [j5]Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets:
Unconditionally Secure Group Authentication. Des. Codes Cryptogr. 14(3): 281-296 (1998) - [c15]Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets:
Non-Uniform PPM and Context Tree Models. Data Compression Conference 1998: 279-288 - [c14]Nicklas Ekstrand, Ben J. M. Smeets:
Weighting of Double Exponential Distributed Data in Lossless Image Compression. Data Compression Conference 1998: 543 - 1997
- [c13]Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets:
Towards Understanding and Improving Escape Probabilities in PPM. Data Compression Conference 1997: 22-31 - [c12]Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets:
Fast Message Authentication Using Efficient Polynomial Evaluation. FSE 1997: 190-204 - [c11]Gregory Kabatianskii, E. A. Krouk, Ben J. M. Smeets:
A Digital Signature Scheme Based on Random Error-Correcting Codes. IMACC 1997: 161-167 - [c10]Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets:
Multialphabet coding with separate alphabet description. SEQUENCES 1997: 56-65 - 1996
- [j4]Gregory Kabatianskii, Ben J. M. Smeets, Thomas Johansson:
On the cardinality of systematic authentication codes via error-correcting codes. IEEE Trans. Inf. Theory 42(2): 566-578 (1996) - 1994
- [j3]Zhe-xian Wan, Ben J. M. Smeets, Peter Vanroose:
On the construction of cartesian authentication codes over symplectic spaces. IEEE Trans. Inf. Theory 40(3): 920-929 (1994) - [j2]Ben J. M. Smeets:
Bounds on the probability of deception in multiple authentication. IEEE Trans. Inf. Theory 40(5): 1586-1591 (1994) - [c9]Thomas Johansson, Ben J. M. Smeets:
On A²-Codes Including Arbiter's Attacks. EUROCRYPT 1994: 456-460 - 1993
- [c8]Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On Families of Hash Functions via Geometric Codes and Concatenation. CRYPTO 1993: 331-342 - [c7]Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets:
On the Relation between A-Codes and Codes Correcting Independent Errors. EUROCRYPT 1993: 1-11 - 1992
- [j1]Vladimir V. Chepyzhov, Ben J. M. Smeets, Kamil Sh. Zigangirov:
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound. IEEE Trans. Inf. Theory 38(4): 1360-1366 (1992) - 1991
- [c6]Vladimir V. Chepyzhov, Ben J. M. Smeets:
On A Fast Correlation Attack on Certain Stream Ciphers. EUROCRYPT 1991: 176-185 - 1990
- [c5]Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan:
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. EUROCRYPT 1990: 306-312
1980 – 1989
- 1988
- [c4]Ben J. M. Smeets, William G. Chambers:
Windmill Generators: A Generalization and an Observation of How Many There Are. EUROCRYPT 1988: 325-330 - 1986
- [i1]Bernhard Smeets:
Some Properties of Sequences Generated by a Windmill Machine. EUROCRYPT 1986: 37 - 1985
- [c3]Bernhard Smeets:
A Comment on Niederreiter's Public Key Cryptosystem. EUROCRYPT 1985: 40-42 - [c2]Bernhard Smeets:
A Note On Sequences Generated by Clock Controlled Shift Registers. EUROCRYPT 1985: 142-148 - 1984
- [c1]Ben J. M. Smeets:
On the Use of the Binary Multiplying Channel in a Private Communication System. EUROCRYPT 1984: 339-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint