Ben Smeets
11 – 20 of 57
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2014
-
Mark
Trusted computing for infrastructure
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Keyed logic BIST for Trojan detection in SoC
(2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
(2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptographic protection of usage restrictions in electronic devices
(2012) 8225110
- Patent › Patent
- 2011
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
(2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Efficient data integrity protection
(2011) 8036380
- Patent › Patent
- 2010
-
Mark
Secure implementation and utilization of device-specific security data
(2010) 7861097
- Patent › Patent
- 2009
-
Mark
Loading data onto an electronic device
(2009) 7587600
- Patent › Patent
-
Mark
Loading data into a mobile terminal
(2009) 7558953
- Patent › Patent
- 2001
-
Mark
The qualitative modeling and compression of the request sequences in ARQ protocols
- Contribution to conference › Abstract
