1 – 50 of 56
- show: 50
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2022
-
Mark
KEYLESS SIGNATURE INFRASTRUCTURE BASED VIRTUAL MACHINE INTEGRITY
2022) EP3317875B1(
- Patent › Patent
- 2020
-
Mark
The security implications of quantum cryptography and quantum computing
(
- Contribution to journal › Article
- 2019
-
Mark
Facilitating online trust with Blockchains
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Key technology choices for optimal massive IoT devices
(
- Contribution to specialist publication or newspaper › Specialist publication article
- 2017
-
Mark
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
(
- Contribution to journal › Article
- 2016
-
Mark
Cryptography in an all encrypted world
(
- Contribution to journal › Article
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Relevans av tekniskt skydd för tillit
2014) p.47-51(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Trusted computing for infrastructure
(
- Contribution to specialist publication or newspaper › Specialist publication article
-
Mark
Keyed logic BIST for Trojan detection in SoC
2014) 2014 16th International Symposium on System-on-Chip, SoC 2014 In 2014 International Symposium on System-on-Chip, SoC 2014(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptographic protection of usage restrictions in electronic devices
2012) 8225110(
- Patent › Patent
- 2011
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Efficient data integrity protection
2011) 8036380(
- Patent › Patent
- 2010
-
Mark
Secure implementation and utilization of device-specific security data
2010) 7861097(
- Patent › Patent
- 2009
-
Mark
Loading data onto an electronic device
2009) 7587600(
- Patent › Patent
-
Mark
Loading data into a mobile terminal
2009) 7558953(
- Patent › Patent
- 2001
-
Mark
The qualitative modeling and compression of the request sequences in ARQ protocols
(
- Contribution to conference › Abstract
- 2000
-
Mark
A simple algorithm for fast correlation attacks on stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bluetooth security - An overview
(
- Contribution to journal › Debate/Note/Editorial
-
Mark
Some notes on the context mapping function in lossless data compression
(
- Contribution to conference › Abstract
-
Mark
A technique for prediction and probability assignment (PPA) in lossless data compression
(
- Contribution to conference › Abstract
- 1999
-
Mark
Incremental authentication of tree-structured documents
1999) 2nd International Conference on Information and Communication Security, ICICS 1999 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1726. p.275-283(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
On key and message equivocations in secrecy systems
(
- Contribution to journal › Article
-
Mark
Notes on the P-content algorithm
1998) 1998 IEEE International Symposium on Information Theory, ISIT 1998 In IEEE International Symposium on Information Theory - Proceedings p.46-46(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Non-uniform PPM and context tree models
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Weighting of double exponential distributed data in lossless image compression
1998) Proceedings of the 1998 Data Compression Conference, DCC(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Unconditionally Secure Group Authentication
(
- Contribution to journal › Article
- 1997
-
Mark
A digital signature scheme based on random error-correcting codes
1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast message authentication using efficient polynomial evaluation
1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast authentication codes based on random polynomial residue classes
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Estimation of escape probabilities for PPM based on universal source coding theory
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.65-65(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multialphabet coding with separate alphabet description
1997) Proceedings of the 1997 International Conference on Compression and Complexity of Sequences p.56-65(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards understanding and improving escape probabilities in PPM
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1996
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
(
- Contribution to journal › Article
- 1995
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
Bounds on the probability of deception in multiple authentication
(
- Contribution to journal › Article
-
Mark
A coding theoretic approach to attack certain stream ciphers
1994) 1994 IEEE International Symposium on Information Theory, ISIT 1994 In IEEE International Symposium on Information Theory - Proceedings p.367-367(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of Cartesian authentication codes over symplectic spaces
(
- Contribution to journal › Article
- 1993
-
Mark
On the construction of universal families of hash functions via geometric codes and concatenation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the relation between A-codes and codes correcting independent errors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards combining Shannon's theory on secrecy systems and the theory of authentication in the case of multiple channel use
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1992
-
Mark
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound
(
- Contribution to journal › Article
- 1991
-
Mark
A lower bound on the probability of deception in multiple authentication
1991) 1991 IEEE International Symposium on Information Theory, ISIT 1991 In IEEE International Symposium on Information Theory - Proceedings p.180-180(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On a fast correlation attack on certain streaxn ciphers
1991) Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1991 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 547 LNCS. p.176-185(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1990
-
Mark
On the linear M-algorithm
1990) IEEE International Symposium on Information Theory (ISIT), 1990(
- Contribution to conference › Paper, not in proceeding
- 1989
-
Mark
Windmill pn-sequence generators
(
- Contribution to journal › Article
- 1988
-
Mark
Linear complexity decoding for convolutional codes and intersymbol interference channels
1988) IEEE International Symposium on Information Theory (ISIT), 1988(
- Contribution to conference › Paper, not in proceeding