Ben J. M. Smeets
According to our database1,
Ben J. M. Smeets
authored at least 36 papers
between 1984 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
J. Signal Process. Syst., 2017
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality.
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Proceedings of the 2014 International Symposium on System-on-Chip, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
2012
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
2005
2001
Proceedings of the Data Compression Conference, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Data Compression Conference, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
Proceedings of the Data Compression Conference, 1998
Proceedings of the Data Compression Conference, 1998
1997
Proceedings of the Compression and Complexity of SEQUENCES 1997, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the 7th Data Compression Conference (DCC '97), 1997
1996
IEEE Trans. Inf. Theory, 1996
1994
IEEE Trans. Inf. Theory, 1994
IEEE Trans. Inf. Theory, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
1992
IEEE Trans. Inf. Theory, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.
Proceedings of the Advances in Cryptology, 1990
1988
Proceedings of the Advances in Cryptology, 1988
1986
Some Properties of Sequences Generated by a Windmill Machine.
EUROCRYPT, 1986
1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984