The SCEAS System
Navigation Menu

Search the dblp DataBase


Mariusz H. Jakubowski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard K. Squier, Kenneth Steiglitz, Mariusz H. Jakubowski
    Implementation of Parallel Arithmetic in a Cellular Automaton. [Citation Graph (0, 0)][DBLP]
    ASAP, 1995, pp:238-0 [Conf]
  2. Mariusz H. Jakubowski, Ramarathnam Venkatesan
    The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:281-293 [Conf]
  3. Ramarathnam Venkatesan, Mariusz H. Jakubowski
    Image Watermarking with Better Resilience. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  4. Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jakubowski, Pierre Moulin
    Robust Image Hashing. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  5. Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski
    Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:400-414 [Conf]
  6. Gang Tan, Yuqun Chen, Mariusz H. Jakubowski
    Delayed and Controlled Failures in Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:216-231 [Conf]
  7. Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
    Run-Time Randomization to Mitigate Tampering. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:153-168 [Conf]
  8. Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
    Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:129-140 [Conf]

  9. Proteus: virtualization for diversified tamper-resistance. [Citation Graph (, )][DBLP]

  10. Randomized radon transforms for biometric authentication via fingerprint hashing. [Citation Graph (, )][DBLP]

  11. A Graph Game Model for Software Tamper Protection. [Citation Graph (, )][DBLP]

  12. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. [Citation Graph (, )][DBLP]

  13. Tamper-Tolerant Software: Modeling and Implementation. [Citation Graph (, )][DBLP]

  14. The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]

  15. The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]

  16. Iterated Transformations and Quantitative Metrics for Software Protection. [Citation Graph (, )][DBLP]

  17. Runtime Protection via Dataflow Flattening. [Citation Graph (, )][DBLP]

  18. Constant Bitrate Control for a Distributed Video Coding System. [Citation Graph (, )][DBLP]

  19. An Adaptive Computation-aware Algorithm for Multi-frame Variable Block-size Motion Estimation in H.264/AVC. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002