2008 |
14 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Prasad Naldurg,
Chit Wei Saw,
Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection.
IWSEC 2008: 100-120 |
13 | EE | Matthew Cary,
Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security.
IWSEC 2008: 279-297 |
2007 |
12 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing.
Digital Rights Management Workshop 2007: 90-94 |
11 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
10 | EE | Nenad Dedic,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection.
Information Hiding 2007: 80-95 |
9 | EE | Mariusz H. Jakubowski,
Prasad Naldurg,
Vijay Patankar,
Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Information Hiding 2007: 96-111 |
8 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
MM&Sec 2007: 129-140 |
2006 |
7 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
6 | EE | Gang Tan,
Yuqun Chen,
Mariusz H. Jakubowski:
Delayed and Controlled Failures in Tamper-Resistant Software.
Information Hiding 2006: 216-231 |
2002 |
5 | EE | Yuqun Chen,
Ramarathnam Venkatesan,
Matthew Cary,
Ruoming Pang,
Saurabh Sinha,
Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Information Hiding 2002: 400-414 |
2000 |
4 | | Ramarathnam Venkatesan,
Mariusz H. Jakubowski:
Image Watermarking with Better Resilience.
ICIP 2000 |
3 | | Ramarathnam Venkatesan,
S.-M. Koon,
Mariusz H. Jakubowski,
Pierre Moulin:
Robust Image Hashing.
ICIP 2000 |
1998 |
2 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
EUROCRYPT 1998: 281-293 |
1995 |
1 | EE | Richard K. Squier,
Kenneth Steiglitz,
Mariusz H. Jakubowski:
Implementation of Parallel Arithmetic in a Cellular Automaton.
ASAP 1995: 238- |