dblp.uni-trier.dewww.uni-trier.de

Marten van Dijk

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
40EEVictor Costan, Luis F. G. Sarmenta, Marten van Dijk, Srinivas Devadas: The Trusted Execution Module: Commodity General-Purpose Trusted Computing. CARDIS 2008: 133-148
39EELuis F. G. Sarmenta, Marten van Dijk, Jonathan Rhodes, Srinivas Devadas: Offline count-limited certificates. SAC 2008: 2145-2152
38EEBlaise Gassend, Marten van Dijk, Dwaine E. Clarke, Emina Torlak, Srinivas Devadas, Pim Tuyls: Controlled physical random functions and applications. ACM Trans. Inf. Syst. Secur. 10(4): (2008)
2007
37EEMarten van Dijk, Jonathan Rhodes, Luis F. G. Sarmenta, Srinivas Devadas: Offline untrusted storage with immediate detection of forking and replay attacks. STC 2007: 41-48
2006
36EEBlaise Gassend, Charles W. O'Donnell, William Thies, Andrew Lee, Marten van Dijk, Srinivas Devadas: Predicting Secondary Structure of All-Helical Proteins Using Hidden Markov Support Vector Machines. PRIB 2006: 93-104
35EELuis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. STC 2006: 27-42
34EEMarten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas: A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols CoRR abs/cs/0605097: (2006)
33EEEmina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas: Knowledge Flow Analysis for Security Protocols CoRR abs/cs/0605109: (2006)
32EEMarten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas: Speeding up Exponentiation using an Untrusted Computational Resource. Des. Codes Cryptography 39(2): 253-273 (2006)
31EEMarten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls: Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions. Inf. Process. Lett. 99(4): 154-157 (2006)
2005
30EEMarten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff: Practical Cryptography in High Dimensional Tori. EUROCRYPT 2005: 234-250
29EEDwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas: Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. IEEE Symposium on Security and Privacy 2005: 139-153
28EEDaihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas: Extracting secret keys from integrated circuits. IEEE Trans. VLSI Syst. 13(10): 1200-1205 (2005)
27EEMarten van Dijk, Sebastian Egner, Marcus Greferath, Alfred Wassermann: On two doubly even self-dual binary codes of length 160 and minimum weight 24. IEEE Transactions on Information Theory 51(1): 408-411 (2005)
26EEFrans M. J. Willems, Marten van Dijk: Capacity and codes for embedding information in gray-scale signals. IEEE Transactions on Information Theory 51(3): 1209-1214 (2005)
2004
25EEMarten van Dijk, David P. Woodruff: Asymptotically Optimal Communication for Torus-Based Cryptography. CRYPTO 2004: 157-178
24EEBlaise Gassend, Daihyun Lim, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Identification and authentication of integrated circuits. Concurrency - Practice and Experience 16(11): 1077-1098 (2004)
2003
23EEDwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh: Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. ASIACRYPT 2003: 188-207
22EEBlaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Caches and Hash Trees for Efficient Memory Integrity. HPCA 2003: 295-306
21EEG. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas: AEGIS: architecture for tamper-evident and tamper-resistant processing. ICS 2003: 160-171
20EEG. Edward Suh, Dwaine E. Clarke, Blaise Gassend, Marten van Dijk, Srinivas Devadas: Efficient Memory Integrity Verification and Encryption for Secure Processors. MICRO 2003: 339-350
19 Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Delay-Based Circuit Authentication and Applications. SAC 2003: 294-301
18EEPim Tuyls, Tom A. M. Kevenaar, Geert Jan Schrijen, Toine Staring, Marten van Dijk: Visual Crypto Displays Enabling Secure Communications. SPC 2003: 271-284
17EEShengli Liu, Henk C. A. van Tilborg, Marten van Dijk: A Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptography 30(1): 39-62 (2003)
16 Marten van Dijk, Sebastian Egner, Ravi Motwani, Arie G. C. Koppelaar: Simultaneous zero-tailing of parallel concatenated codes. IEEE Transactions on Information Theory 49(9): 2236-2241 (2003)
2002
15EEBlaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Silicon physical random functions. ACM Conference on Computer and Communications Security 2002: 148-160
14EEBlaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas: Controlled Physical Random Functions. ACSAC 2002: 149-160
13EEDavid P. Woodruff, Marten van Dijk: Cryptography in an Unbounded Computational Model. EUROCRYPT 2002: 149-164
12EEDwaine E. Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, Ronald L. Rivest: The Untrusted Computer Problem and Camera-Based Authentication. Pervasive 2002: 114-124
2001
11EEMargreta Kuijper, Marten van Dijk, Henk D. L. Hollmann, Job Oostveen: A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon Decoding. AAECC 2001: 343-352
1999
10 Marten van Dijk, Ludo M. G. M. Tolhuizen: Efficient encoding for a class of subspace subcodes. IEEE Transactions on Information Theory 45(6): 2142-2146 (1999)
1998
9 Ton Kalker, Jean-Paul M. G. Linnartz, Marten van Dijk: Watermark Estimation through Detector Analysis. ICIP (1) 1998: 425-429
8EEJean-Paul M. G. Linnartz, Marten van Dijk: Analysis of the Sensitivity Attack against Electronic Watermarks in Images. Information Hiding 1998: 258-272
7 Marten van Dijk, Christian Gehrmann, Ben J. M. Smeets: Unconditionally Secure Group Authentication. Des. Codes Cryptography 14(3): 281-296 (1998)
6 Marten van Dijk, Wen-Ai Jackson, Keith M. Martin: A General Decomposition Construction for Incomplete Secret Sharing Schemes. Des. Codes Cryptography 15(3): 301-321 (1998)
1997
5 Marten van Dijk: A Linear Construction of Secret Sharing Schemes. Des. Codes Cryptography 12(2): 161-201 (1997)
4 Marten van Dijk: On a special class of broadcast channels with confidential messages. IEEE Transactions on Information Theory 43(2): 712-714 (1997)
3EEMarten van Dijk: More Information Theoretical Inequalities to be Used in Secret Sharing? Inf. Process. Lett. 63(1): 41-44 (1997)
1995
2 Marten van Dijk: On the Information Rate of Perfect Secret Sharing Schemes. Des. Codes Cryptography 6(2): 143-169 (1995)
1994
1EEMarten van Dijk: A Linear Construction of Perfect Secret Sharing Schemes. EUROCRYPT 1994: 23-34

Coauthor Index

1Matthew Burnside (Matt Burnside) [12]
2Dwaine E. Clarke [12] [14] [15] [19] [20] [21] [22] [23] [24] [29] [32] [38]
3Victor Costan [40]
4Srinivas Devadas [12] [14] [15] [19] [20] [21] [22] [23] [24] [28] [29] [32] [33] [34] [35] [36] [37] [38] [39] [40]
5Sebastian Egner [16] [27]
6Blaise Gassend [12] [14] [15] [19] [20] [21] [22] [23] [24] [28] [29] [32] [33] [34] [36] [38]
7Christian Gehrmann [7]
8Robert Granger [30]
9Marcus Greferath [27]
10Henk D. L. Hollmann [11]
11Daniel Jackson [33]
12Wen-Ai Jackson [6]
13Ton Kalker [9]
14Tom A. M. Kevenaar [18] [31]
15Arie G. C. Koppelaar [16]
16Thomas Kotwal [12]
17Margreta Kuijper [11]
18Andrew Lee [36]
19Jae W. Lee [28]
20Daihyun Lim [24] [28]
21Jean-Paul M. G. Linnartz [8] [9]
22Shengli Liu [17]
23Keith M. Martin [6]
24Ravi Motwani [16]
25Charles W. O'Donnell [35] [36]
26Job Oostveen [11]
27Dan Page [30]
28Jonathan Rhodes [35] [37] [39]
29Ronald L. Rivest [12]
30Karl Rubin [30]
31Luis F. G. Sarmenta [35] [37] [39] [40]
32Geert Jan Schrijen [18] [31]
33Alice Silverberg [30]
34Ben J. M. Smeets (Bernhard Smeets) [7]
35Martijn Stam [30]
36Toine Staring [18]
37Ajay Sudan [29]
38G. Edward Suh [20] [21] [22] [23] [28] [29] [32]
39William Thies [36]
40Henk C. A. van Tilborg [17]
41Ludo M. G. M. Tolhuizen [10]
42Emina Torlak [33] [34] [38]
43Pim Tuyls [18] [31] [38]
44Alfred Wassermann [27]
45Frans M. J. Willems [26]
46David P. Woodruff [13] [25] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)