Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality
Lantz, Patrik, Johansson, Bjorn, Hell, Martin, Smeets, Ben
Published in 1st Workshop on Wearable Security and Privacy, Financial Crypto,San Juan, Puerto Rico,2015-01-30 (2015)
Published in 1st Workshop on Wearable Security and Privacy, Financial Crypto,San Juan, Puerto Rico,2015-01-30 (2015)
Get full text
Book Chapter
Conference Proceeding
The free distance of fixed convolutional rate 2/4 codes meets the Costello bound
Chepyzhov, V.V., Smeets, B.J.M., Zigangirov, K.S.
Published in IEEE transactions on information theory (01.07.1992)
Published in IEEE transactions on information theory (01.07.1992)
Get full text
Journal Article
Using TPM Secure Storage in Trusted High Availability Systems
Hell, Martin, Karlsson, Linus, Smeets, Ben, Mirosavljevic, Jelena
Published in INTRUST 2014,Beijing, China,2014-12-16 - 2014-12-17 (2016)
Published in INTRUST 2014,Beijing, China,2014-12-16 - 2014-12-17 (2016)
Get full text
Book Chapter
Conference Proceeding
Keyed logic BIST for Trojan detection in SoC
Dubrova, Elena, Naslund, Mats, Carlsson, Gunnar, Smeets, Ben
Published in 2014 International Symposium on System-on-Chip (SoC) (01.10.2014)
Published in 2014 International Symposium on System-on-Chip (SoC) (01.10.2014)
Get full text
Conference Proceeding
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST
Dubrova, Elena, Näslund, Mats, Carlsson, Gunnar, Fornehed, John, Smeets, Ben
Year of Publication 24.11.2015
Year of Publication 24.11.2015
Get full text
Journal Article