Ben Smeets
11 – 20 of 56
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2014
-
Mark
Keyed logic BIST for Trojan detection in SoC
2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptographic protection of usage restrictions in electronic devices
2012) 8225110(
- Patent › Patent
- 2011
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Efficient data integrity protection
2011) 8036380(
- Patent › Patent
- 2010
-
Mark
Secure implementation and utilization of device-specific security data
2010) 7861097(
- Patent › Patent
- 2009
-
Mark
Loading data onto an electronic device
2009) 7587600(
- Patent › Patent
-
Mark
Loading data into a mobile terminal
2009) 7558953(
- Patent › Patent
- 2001
-
Mark
The qualitative modeling and compression of the request sequences in ARQ protocols
(
- Contribution to conference › Abstract
- 2000
-
Mark
A simple algorithm for fast correlation attacks on stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding