Ben Smeets
21 – 30 of 56
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2000
-
Mark
Bluetooth security - An overview
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Some notes on the context mapping function in lossless data compression
(
- Contribution to conference › Abstract
-
Mark
A technique for prediction and probability assignment (PPA) in lossless data compression
(
- Contribution to conference › Abstract
- 1999
-
Mark
Incremental authentication of tree-structured documents
1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
On key and message equivocations in secrecy systems
(
- Contribution to journal › Article
-
Mark
Non-uniform PPM and context tree models
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Weighting of double exponential distributed data in lossless image compression
1998) Proceedings of the 1998 Data Compression Conference, DCC(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Unconditionally Secure Group Authentication
(
- Contribution to journal › Article
-
Mark
Notes on the P-content algorithm
1998) 1998 IEEE International Symposium on Information Theory, ISIT 1998 In IEEE International Symposium on Information Theory - Proceedings p.46-46(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Multialphabet coding with separate alphabet description
1997) Proceedings of the 1997 International Conference on Compression and Complexity of Sequences p.56-65(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding