1 – 10 of 13
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
KEYLESS SIGNATURE INFRASTRUCTURE BASED VIRTUAL MACHINE INTEGRITY
2022) EP3317875B1(
- Patent › Patent
- 2017
-
Mark
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
(
- Contribution to journal › Article
- 2014
-
Mark
Keyed logic BIST for Trojan detection in SoC
2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Cryptographic protection of usage restrictions in electronic devices
2012) 8225110(
- Patent › Patent
- 2000
-
Mark
A technique for prediction and probability assignment (PPA) in lossless data compression
(
- Contribution to conference › Abstract
- 1999
-
Mark
Incremental authentication of tree-structured documents
1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
Unconditionally Secure Group Authentication
(
- Contribution to journal › Article
-
Mark
Notes on the P-content algorithm
1998) 1998 IEEE International Symposium on Information Theory, ISIT 1998 In IEEE International Symposium on Information Theory - Proceedings p.46-46(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Fast message authentication using efficient polynomial evaluation
1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
A coding theoretic approach to attack certain stream ciphers
1994) 1994 IEEE International Symposium on Information Theory, ISIT 1994 In IEEE International Symposium on Information Theory - Proceedings p.367-367(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding