Ben Smeets

Professor
More filtering options
  1. 2016
  2. Cryptography in an all encrypted world

    Jost, C., Mattsson, J., Näslund, M. & Ben Smeets, 2016, In : Ericsson Review. 93, 1, p. 8-19 12 p.

    Research output: Contribution to journalArticle

  3. 2015
  4. Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality

    Lantz, P., Johansson, B., Martin Hell & Ben Smeets, 2015, Financial Cryptography and Data Security. San Juan, Puerto Rico. Brenner, M., Christin, N., Johnson, B. & Rohloff, K. (eds.). Springer, p. 261-273 13 p. (Lecture Notes in Computer Science; vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  5. 2014
  6. Relevans av tekniskt skydd för tillit

    Ben Smeets, 2014, DigiTrust: Tillit i det digitala. Tvärvetenskapliga perspektiv från ett forskningsprojekt. Larsson, S. & Runeson, P. (eds.). Pufendorfinstitutet, Lunds universitet, p. 47-51

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  7. Using TPM Secure Storage in Trusted High Availability Systems

    Martin Hell, Linus Karlsson, Ben Smeets & Mirosavljevic, J., 2014, Trusted Systems/Lecture Notes in Computer Science. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer, Vol. 9473. p. 243-258 (Lecture Notes in Computer Science; vol. 9473).

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  8. 2012
  9. Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry

    Leonardo A, M., Albin, Z., Ben Smeets, Sheikh M., H., Thomas Johansson & Nahid, S., 2012, [Host publication title missing]. IEEE--Institute of Electrical and Electronics Engineers Inc., 6 p.

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  10. 2011
  11. A Technique for Remote Detection of Certain Virtual Machine Monitors

    Jämthagen, C., Martin Hell & Ben Smeets, 2011, Trusted Systems : Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Springer, Vol. 7222. p. 129-137 (Lecture Notes in Computer Science; vol. 7222).

    Research output: Chapter in Book/Report/Conference proceedingBook chapter

  12. 2000
  13. A simple algorithm for fast correlation attacks on stream ciphers

    Chepyshov, V., Thomas Johansson & Ben Smeets, 2000, Fast Software Encryption / Lecture Notes in Computer Science. Springer, Vol. 1978. p. 181-195

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  14. 1998
  15. On key and message equivocations in secrecy systems

    Y, S., Thomas Johansson & Ben Smeets, 1998, In : Problems of Information Transmission. 34, 2, p. 197-206

    Research output: Contribution to journalArticle

  16. 1996
  17. On the cardinality of systematic authentication codes via error-correcting codes

    Thomas Johansson, Ben Smeets & Grigory, K., 1996, In : IEEE Transactions on Information Theory. 42, 2, p. 566-578

    Research output: Contribution to journalArticle

  18. 1995
  19. On A2-codes including arbiter's attacks

    Thomas Johansson & Ben Smeets, 1995, Advances in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 950. p. 456-461

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  20. 1993
  21. On the construction of universal families of hash functions via geometric codes and concatenation

    Bierbrauer, J., Thomas Johansson, Kabatianskii, G. & Ben Smeets, 1993, Advances in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 773. p. 331-342

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  22. On the relation between A-codes and codes correcting independent errors

    Thomas Johansson, Kabatianskii, G. & Ben Smeets, 1993, Advances in Cryptology / Lecture Notes in Computer Science. Springer, Vol. 765. p. 1-11

    Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceeding

  23. 1990
  24. On the linear M-algorithm

    Osthoff, H., Rolf Johannesson, Ben Smeets & Vinck, H., 1990.

    Research output: Contribution to conferencePaper, not in proceeding

  25. 1988
  26. Linear complexity decoding for convolutional codes and intersymbol interference channels

    Vinck, H., Osthoff, H., Rolf Johannesson, van der Vleuten, R. & Ben Smeets, 1988.

    Research output: Contribution to conferencePaper, not in proceeding