dblp.uni-trier.dewww.uni-trier.de

Boris Skoric

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
13EESebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas: Verifiable Rotation of Homomorphic Encryptions. Public Key Cryptography 2009: 393-410
2008
12EEBoris Skoric: Steganography from weak cryptography CoRR abs/0804.0659: (2008)
11EEBoris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik: Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptography 46(2): 137-166 (2008)
10EEBoris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra: Tardos Fingerprinting is Better Than We Thought. IEEE Transactions on Information Theory 54(8): 3663-3676 (2008)
2007
9EENeil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls: ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ESAS 2007: 187-202
8EEStefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi: Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310
7EEBoris Skoric: The entropy of keys derived from laser speckle CoRR abs/0710.5002: (2007)
2006
6EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Measuring intrusion detection capability: an information-theoretic approach. ASIACCS 2006: 90-101
5EEPim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters: Read-Proof Hardware from Protective Coatings. CHES 2006: 369-383
4EEGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546
3EEBoris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra: Tardos fingerprinting is better than we thought CoRR abs/cs/0607131: (2006)
2005
2EEBoris Skoric, Pim Tuyls, W. Ophey: Robust Key Extraction from Physical Uncloneable Functions. ACNS 2005: 407-422
1EEPim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey: Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Cryptography 2005: 141-155

Coauthor Index

1Anton H. M. Akkermans [1]
2Neil Bird [9]
3Mehmet Utku Celik [3] [8] [10] [11]
4Claudine Conrado [9]
5David Dagon [4] [6]
6Prahlad Fogla [4] [6]
7Jan van Geloven [5]
8Guofei Gu [4] [6]
9Jorge Guajardo [9]
10Sebastiaan de Hoogh [13]
11Stefan Katzenbeisser [8] [11]
12Wenke Lee [4] [6]
13Stefan Maubach [9]
14W. Ophey [1] [2]
15Ahmad-Reza Sadeghi [8]
16Berry Schoenmakers [13]
17Geert Jan Schrijen [5] [9]
18S. Stallinga [1]
19Joop Talstra [3] [10]
20Peter Thueringer [9]
21Anton M. H. Tombeur [9]
22Pim Tuyls [1] [2] [5] [9]
23Nynke Verhaegh [5]
24José Villegas [13]
25T. U. Vladimirova [3] [10]
26Rob Wolters [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)