|
Search the dblp DataBase
Boris Skoric:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Boris Skoric, Pim Tuyls, W. Ophey
Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:407-422 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Measuring intrusion detection capability: an information-theoretic approach. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:90-101 [Conf]
- Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters
Read-Proof Hardware from Protective Coatings. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:369-383 [Conf]
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:527-546 [Conf]
- Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey
Information-Theoretic Security Analysis of Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:141-155 [Conf]
- Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. [Citation Graph (0, 0)][DBLP] ESAS, 2007, pp:187-202 [Conf]
- Boris Skoric, T. U. Vladimirova, M. Celik, J. C. Talstra
Tardos fingerprinting is better than we thought [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Boris Skoric
The entropy of keys derived from laser speckle [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
Combining Tardos Fingerprinting Codes and Fingercasting. [Citation Graph (, )][DBLP]
Verifiable Rotation of Homomorphic Encryptions. [Citation Graph (, )][DBLP]
Quantum Readout of Physical Unclonable Functions. [Citation Graph (, )][DBLP]
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. [Citation Graph (, )][DBLP]
Physical Unclonable Functions for enhanced security of tokens and tags. [Citation Graph (, )][DBLP]
Steganography from weak cryptography [Citation Graph (, )][DBLP]
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|