|
Search the dblp DataBase
Mariusz H. Jakubowski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Richard K. Squier, Kenneth Steiglitz, Mariusz H. Jakubowski
Implementation of Parallel Arithmetic in a Cellular Automaton. [Citation Graph (0, 0)][DBLP] ASAP, 1995, pp:238-0 [Conf]
- Mariusz H. Jakubowski, Ramarathnam Venkatesan
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:281-293 [Conf]
- Ramarathnam Venkatesan, Mariusz H. Jakubowski
Image Watermarking with Better Resilience. [Citation Graph (0, 0)][DBLP] ICIP, 2000, pp:- [Conf]
- Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jakubowski, Pierre Moulin
Robust Image Hashing. [Citation Graph (0, 0)][DBLP] ICIP, 2000, pp:- [Conf]
- Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, Mariusz H. Jakubowski
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:400-414 [Conf]
- Gang Tan, Yuqun Chen, Mariusz H. Jakubowski
Delayed and Controlled Failures in Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:216-231 [Conf]
- Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
Run-Time Randomization to Mitigate Tampering. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:153-168 [Conf]
- Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. [Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:129-140 [Conf]
Proteus: virtualization for diversified tamper-resistance. [Citation Graph (, )][DBLP]
Randomized radon transforms for biometric authentication via fingerprint hashing. [Citation Graph (, )][DBLP]
A Graph Game Model for Software Tamper Protection. [Citation Graph (, )][DBLP]
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. [Citation Graph (, )][DBLP]
Tamper-Tolerant Software: Modeling and Implementation. [Citation Graph (, )][DBLP]
The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]
The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]
Iterated Transformations and Quantitative Metrics for Software Protection. [Citation Graph (, )][DBLP]
Runtime Protection via Dataflow Flattening. [Citation Graph (, )][DBLP]
Constant Bitrate Control for a Distributed Video Coding System. [Citation Graph (, )][DBLP]
An Adaptive Computation-aware Algorithm for Multi-frame Variable Block-size Motion Estimation in H.264/AVC. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|