Boris Skoric
Orcid: 0000-0003-1409-4127
According to our database1,
Boris Skoric
authored at least 93 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Quantum Inf. Process., April, 2024
CoRR, 2024
Co-propagation of Classical and Continuous-variable QKD Signals over a Turbulent Optical Channel with a Real-time QKD Receiver.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2024
2023
Quantum Inf. Comput., September, 2023
2022
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
2021
Quantum Alice and Silent Bob: Qubit-Based Quantum Key Recycling With Almost No Classical Communication.
Quantum Inf. Comput., 2021
2020
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees.
CoRR, 2020
CoRR, 2020
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
EURASIP J. Inf. Secur., 2019
Four accuracy bounds and one estimator for frequency estimation under local differential privacy.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Quantum Inf. Process., 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Quantum Inf. Process., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
2016
Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks.
Quantum Inf. Comput., 2016
Int. J. Inf. Sec., 2016
Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought).
IACR Cryptol. ePrint Arch., 2016
EURASIP J. Adv. Signal Process., 2016
2015
IEEE Trans. Inf. Theory, 2015
IEEE Trans. Inf. Forensics Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks.
IACR Cryptol. ePrint Arch., 2013
Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the SECRYPT 2013, 2013
2012
Int. J. Inf. Technol. Decis. Mak., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions.
Inf. Syst. Frontiers, 2009
Flowchart description of security primitives for Controlled Physical Unclonable Functions.
IACR Cryptol. ePrint Arch., 2009
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Des. Codes Cryptogr., 2008
2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the ISSE 2006, 2006
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Proceedings of the Computer Security, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004