Ben Smeets
6 – 10 of 56
- show: 5
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2016
-
Mark
Cryptography in an all encrypted world
(
- Contribution to journal › Article
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Relevans av tekniskt skydd för tillit
2014) p.47-51(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Trusted computing for infrastructure
(
- Contribution to specialist publication or newspaper › Specialist publication article