The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Boris Skoric: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Boris Skoric, Pim Tuyls, W. Ophey
    Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:407-422 [Conf]
  2. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:90-101 [Conf]
  3. Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters
    Read-Proof Hardware from Protective Coatings. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:369-383 [Conf]
  4. Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:527-546 [Conf]
  5. Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey
    Information-Theoretic Security Analysis of Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:141-155 [Conf]
  6. Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
    ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:187-202 [Conf]
  7. Boris Skoric, T. U. Vladimirova, M. Celik, J. C. Talstra
    Tardos fingerprinting is better than we thought [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  8. Boris Skoric
    The entropy of keys derived from laser speckle [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  9. Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]


  10. Verifiable Rotation of Homomorphic Encryptions. [Citation Graph (, )][DBLP]


  11. Quantum Readout of Physical Unclonable Functions. [Citation Graph (, )][DBLP]


  12. Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]


  13. Physical Unclonable Functions for enhanced security of tokens and tags. [Citation Graph (, )][DBLP]


  14. Steganography from weak cryptography [Citation Graph (, )][DBLP]


  15. Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002