The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ben J. M. Smeets: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
    On Families of Hash Functions via Geometric Codes and Concatenation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:331-342 [Conf]
  2. Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets
    Towards Understanding and Improving Escape Probabilities in PPM. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1997, pp:22-31 [Conf]
  3. Jan Åberg, Yuri M. Shtarkov, Ben J. M. Smeets
    Non-Uniform PPM and Context Tree Models. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1998, pp:279-288 [Conf]
  4. Nicklas Ekstrand, Bela Rathonyi, Yuri M. Shtarkov, Ben J. M. Smeets
    The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2001, pp:494- [Conf]
  5. Nicklas Ekstrand, Ben J. M. Smeets
    Some Notes on the Context Mapping Function in Lossless Data Compression. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 2000, pp:553- [Conf]
  6. Nicklas Ekstrand, Ben J. M. Smeets
    Weighting of Double Exponential Distributed Data in Lossless Image Compression. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1998, pp:543- [Conf]
  7. Vladimor V. Chepyzhov, Ben J. M. Smeets
    On A Fast Correlation Attack on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:176-185 [Conf]
  8. Thomas Johansson, Gregory Kabatianskii, Ben J. M. Smeets
    On the Relation between A-Codes and Codes Correcting Independent Errors. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:1-11 [Conf]
  9. Thomas Johansson, Ben J. M. Smeets
    On A²-Codes Including Arbiter's Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:456-460 [Conf]
  10. Ben J. M. Smeets
    On the Use of the Binary Multiplying Channel in a Private Communication System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:339-348 [Conf]
  11. Ben J. M. Smeets, William G. Chambers
    Windmill Generators: A Generalization and an Observation of How Many There Are. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:325-330 [Conf]
  12. Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan
    On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:306-312 [Conf]
  13. Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets
    Fast Message Authentication Using Efficient Polynomial Evaluation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:190-204 [Conf]
  14. Vladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets
    A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:181-195 [Conf]
  15. Patrik Ekdahl, Ben J. M. Smeets
    Incremental Authentication of Tree-Structured Documents. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:275-283 [Conf]
  16. Gregory Kabatianskii, E. Krouk, Ben J. M. Smeets
    A Digital Signature Scheme Based on Random Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:161-167 [Conf]
  17. Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets
    Unconditionally Secure Group Authentication. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1998, v:14, n:3, pp:281-296 [Journal]
  18. Vladimir V. Chepyzhov, Ben J. M. Smeets, Kamil Sh. Zigangirov
    The free distance of fixed convolutional rate 2/4 codes meets the Costello bound. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1360-0 [Journal]
  19. Gregory Kabatianskii, Ben J. M. Smeets, Thomas Johansson
    On the cardinality of systematic authentication codes via error-correcting codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:2, pp:566-578 [Journal]
  20. Ben J. M. Smeets
    Bounds on the probability of deception in multiple authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1586-0 [Journal]
  21. Zhe-xian Wan, Ben J. M. Smeets, Peter Vanroose
    On the construction of cartesian authentication codes over symplectic spaces. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:920-0 [Journal]

Search in 0.023secs, Finished in 0.024secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002