-
1
-
-
23444435831
-
Fingerprinting documents and packages
-
0028-0836
-
Buchanan, J.D.R., Cowburn, R.P., and Jausovec, A.-V.: et al. ' Fingerprinting documents and packages ', Nature, 2005, 436, p. 475 0028-0836
-
(2005)
Nature
, vol.436
, pp. 475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.-V.3
-
2
-
-
77957146718
-
-
Ingenia Technology Ltd.
-
Ingenia Technology Ltd.: http://www.ingeniatechnology.com
-
-
-
-
3
-
-
70449640056
-
Fingerprinting blank paper using commodity scanners
-
May
-
Clarkson, W., Weyrich, T., Finkelstein, A., Heninger, N., Alex Halderman, J., and Felten, E.W.: ' Fingerprinting blank paper using commodity scanners ', Porc. IEEE Symp. on Security and Privacy, May, 2009
-
(2009)
Porc. IEEE Symp. on Security and Privacy
-
-
Clarkson, W.1
Weyrich, T.2
Finkelstein, A.3
Heninger, N.4
Alex Halderman, J.5
Felten, E.W.6
-
4
-
-
4344612730
-
Print signatures for document authentication
-
Zhu, B., Wu, J., and Kankanhalli, M.S.: ' Print signatures for document authentication ', Proc. Tenth ACM Conf. on Computer and Communications Security, 2003, p. 145-153
-
(2003)
Proc. Tenth ACM Conf. on Computer and Communications Security
, pp. 145-153
-
-
Zhu, B.1
Wu, J.2
Kankanhalli, M.S.3
-
5
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Tuyls, P., Jan Schrijen, G., Ŝkorić, B., van Geloven, J., Verhaegh, N., and Wolters, R.: ' Read-proof hardware from protective coatings ', Cryptographic Hardware and Embedded Systems - CHES'06, 2006, p. 369-383, (LNCS, 4249)
-
(2006)
Cryptographic Hardware and Embedded Systems - CHES'06
, pp. 369-383
-
-
Tuyls, P.1
Jan Schrijen, G.2
Ŝkorić, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
6
-
-
33747067531
-
Public key cryptography for the financial services industry, the elliptic curve digital signature algorithm (ECDSA)
-
' Public key cryptography for the financial services industry, the elliptic curve digital signature algorithm (ECDSA) ', ANSI, 2005, X9.62, p. 2005
-
(2005)
ANSI
, vol.962
, pp. 2005
-
-
-
7
-
-
77957163418
-
-
Unibar Inc: 'Bar code page'
-
Unibar Inc: 'Bar code page'. http://www.adams1.com/stack.html
-
-
-
-
10
-
-
0037144430
-
Physical one-way functions
-
0036-8075
-
Pappu, R., Recht, B., Taylor, J., and Gershenfeld, N.: ' Physical one-way functions ', Science, 2002, 297, p. 2026-2030 0036-8075
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
11
-
-
84892363436
-
-
(Springer, New York)
-
Tuyls, P., Ŝkorić, B., and Kevenaar, T.: ' Security with noisy data: private biometrics, secure key storage and anti-counterfeiting ', (Springer, New York, 2007)
-
(2007)
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-counterfeiting
-
-
Tuyls, P.1
Ŝkorić, B.2
Kevenaar, T.3
-
12
-
-
77957126809
-
-
Arjo Wiggins Security Division
-
Arjo Wiggins Security Division: http://www.security.arjowiggins.com/
-
-
-
-
13
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
0097-5397
-
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A.: ' Fuzzy extractors: how to generate strong keys from biometrics and other noisy data ', SIAM J. Comput., 2008, 38, (1), p. 97-139 0097-5397
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
15
-
-
84944878354
-
-
(CRC Press)
-
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A.: ' Handbook of applied cryptography ', (CRC Press, 2001)
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
16
-
-
84949220600
-
An accurate evaluation of maurer's universal test
-
Coron, J.-S., and Naccache, D.: ' An accurate evaluation of maurer's universal test ', Selected Areas in Cryptography - SAC'98, 1988, p. 57-71, (LNCS, 1556)
-
(1988)
Selected Areas in Cryptography - SAC'98
, pp. 57-71
-
-
Coron, J.-S.1
Naccache, D.2
-
17
-
-
84956866363
-
On the security of random sources
-
Coron, J.-S.: ' On the security of random sources ', Public Key Cryptography - PKC'99, 1999, p. 29-42, (LNCS, 1560)
-
(1999)
Public Key Cryptography - PKC'99
, pp. 29-42
-
-
Coron, J.-S.1
-
18
-
-
0032022518
-
The context-tree weighting method: Extensions
-
0018-9448
-
Willems, F.: ' The context-tree weighting method: extensions ', IEEE Trans. Inf. Theory, 1994, 44, p. 792-798 0018-9448
-
(1994)
IEEE Trans. Inf. Theory
, vol.44
, pp. 792-798
-
-
Willems, F.1
-
19
-
-
30844441511
-
-
Newsletter of the IEEE Information Theory Society, March 1997
-
Willems, F., Shtarkov, Y., and Tjalkens, T.: ' Reflections on "the context-tree weighting method: basic properties" ', Newsletter of the IEEE Information Theory Society, March 1997
-
Reflections on "the Context-tree Weighting Method: Basic Properties"
-
-
Willems, F.1
Shtarkov, Y.2
Tjalkens, T.3
-
20
-
-
0029307102
-
The context-tree weighting method: Basic properties
-
0018-9448
-
Willems, F., Shtarkov, Y., and Tjalkens, T.: ' The context-tree weighting method: basic properties ', IEEE Trans. Inf. Theory, 1995, 41, p. 653-664 0018-9448
-
(1995)
IEEE Trans. Inf. Theory
, vol.41
, pp. 653-664
-
-
Willems, F.1
Shtarkov, Y.2
Tjalkens, T.3
|