The SCEAS System
| |||||||

## Search the dblp DataBase
Ben J. M. Smeets:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
**On Families of Hash Functions via Geometric Codes and Concatenation.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:331-342 [Conf] - Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets
**Towards Understanding and Improving Escape Probabilities in PPM.**[Citation Graph (0, 0)][DBLP] Data Compression Conference, 1997, pp:22-31 [Conf] - Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets
**Non-Uniform PPM and Context Tree Models.**[Citation Graph (0, 0)][DBLP] Data Compression Conference, 1998, pp:279-288 [Conf] - Nicklas Ekstrand, Bela Rathonyi, Yuri M. Shtarkov, Ben J. M. Smeets
**The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols.**[Citation Graph (0, 0)][DBLP] Data Compression Conference, 2001, pp:494- [Conf] - Nicklas Ekstrand, Ben J. M. Smeets
**Some Notes on the Context Mapping Function in Lossless Data Compression.**[Citation Graph (0, 0)][DBLP] Data Compression Conference, 2000, pp:553- [Conf] - Nicklas Ekstrand, Ben J. M. Smeets
**Weighting of Double Exponential Distributed Data in Lossless Image Compression.**[Citation Graph (0, 0)][DBLP] Data Compression Conference, 1998, pp:543- [Conf] - Vladimor V. Chepyzhov, Ben J. M. Smeets
**On A Fast Correlation Attack on Certain Stream Ciphers.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:176-185 [Conf] - Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
**On the Relation between A-Codes and Codes Correcting Independent Errors.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:1-11 [Conf] - Thomas Johansson, Ben J. M. Smeets
**On A²-Codes Including Arbiter's Attacks.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:456-460 [Conf] - Ben J. M. Smeets
**On the Use of the Binary Multiplying Channel in a Private Communication System.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1984, pp:339-348 [Conf] - Ben J. M. Smeets, William G. Chambers
**Windmill Generators: A Generalization and an Observation of How Many There Are.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:325-330 [Conf] - Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan
**On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:306-312 [Conf] - Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets
**Fast Message Authentication Using Efficient Polynomial Evaluation.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1997, pp:190-204 [Conf] - Vladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets
**A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:181-195 [Conf] - Patrik Ekdahl, Ben J. M. Smeets
**Incremental Authentication of Tree-Structured Documents.**[Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:275-283 [Conf] - Gregory Kabatianskii, E. Krouk, Ben J. M. Smeets
**A Digital Signature Scheme Based on Random Error-Correcting Codes.**[Citation Graph (0, 0)][DBLP] IMA Int. Conf., 1997, pp:161-167 [Conf] - Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets
**Unconditionally Secure Group Authentication.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1998, v:14, n:3, pp:281-296 [Journal] - Vladimir V. Chepyzhov, Ben J. M. Smeets, Kamil Sh. Zigangirov
**The free distance of fixed convolutional rate 2/4 codes meets the Costello bound.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1360-0 [Journal] - Gregory Kabatianskii, Ben J. M. Smeets, Thomas Johansson
**On the cardinality of systematic authentication codes via error-correcting codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:2, pp:566-578 [Journal] - Ben J. M. Smeets
**Bounds on the probability of deception in multiple authentication.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1586-0 [Journal] - Zhe-xian Wan, Ben J. M. Smeets, Peter Vanroose
**On the construction of cartesian authentication codes over symplectic spaces.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:920-0 [Journal]
Search in 0.016secs, Finished in 0.017secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |