| 2008 |
| 14 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Prasad Naldurg,
Chit Wei Saw,
Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection.
IWSEC 2008: 100-120 |
| 13 | EE | Matthew Cary,
Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security.
IWSEC 2008: 279-297 |
| 2007 |
| 12 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing.
Digital Rights Management Workshop 2007: 90-94 |
| 11 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
| 10 | EE | Nenad Dedic,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection.
Information Hiding 2007: 80-95 |
| 9 | EE | Mariusz H. Jakubowski,
Prasad Naldurg,
Vijay Patankar,
Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Information Hiding 2007: 96-111 |
| 8 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
MM&Sec 2007: 129-140 |
| 2006 |
| 7 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
| 6 | EE | Gang Tan,
Yuqun Chen,
Mariusz H. Jakubowski:
Delayed and Controlled Failures in Tamper-Resistant Software.
Information Hiding 2006: 216-231 |
| 2002 |
| 5 | EE | Yuqun Chen,
Ramarathnam Venkatesan,
Matthew Cary,
Ruoming Pang,
Saurabh Sinha,
Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Information Hiding 2002: 400-414 |
| 2000 |
| 4 | | Ramarathnam Venkatesan,
Mariusz H. Jakubowski:
Image Watermarking with Better Resilience.
ICIP 2000 |
| 3 | | Ramarathnam Venkatesan,
S.-M. Koon,
Mariusz H. Jakubowski,
Pierre Moulin:
Robust Image Hashing.
ICIP 2000 |
| 1998 |
| 2 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
EUROCRYPT 1998: 281-293 |
| 1995 |
| 1 | EE | Richard K. Squier,
Kenneth Steiglitz,
Mariusz H. Jakubowski:
Implementation of Parallel Arithmetic in a Cellular Automaton.
ASAP 1995: 238- |