BibTeX records: Boris Skoric

download as .bib file

@article{DBLP:journals/jce/Skoric18,
  author    = {Boris Skoric},
  title     = {A trivial debiasing scheme for Helper Data Systems},
  journal   = {J. Cryptographic Engineering},
  volume    = {8},
  number    = {4},
  pages     = {341--349},
  year      = {2018},
  url       = {https://doi.org/10.1007/s13389-018-0183-z},
  doi       = {10.1007/s13389-018-0183-z},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jce/Skoric18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LeermakersS18,
  author    = {Daan Leermakers and
               Boris Skoric},
  title     = {Optimal attacks on qubit-based Quantum Key Recycling},
  journal   = {Quantum Information Processing},
  volume    = {17},
  number    = {3},
  pages     = {57},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11128-018-1819-8},
  doi       = {10.1007/s11128-018-1819-8},
  timestamp = {Tue, 20 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/qip/LeermakersS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LeermakersS18a,
  author    = {Daan Leermakers and
               Boris Skoric},
  title     = {Security proof for round-robin differential phase shift {QKD}},
  journal   = {Quantum Information Processing},
  volume    = {17},
  number    = {10},
  pages     = {250},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11128-018-2027-2},
  doi       = {10.1007/s11128-018-2027-2},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/qip/LeermakersS18a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchallerSSK18,
  author    = {Andr{\'{e}} Schaller and
               Taras Stanko and
               Boris Skoric and
               Stefan Katzenbeisser},
  title     = {Eliminating Leakage in Reverse Fuzzy Extractors},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {4},
  pages     = {954--964},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2774500},
  doi       = {10.1109/TIFS.2017.2774500},
  timestamp = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/SchallerSSK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-01744,
  author    = {Taras Stanko and
               Bin Chen and
               Boris Skoric},
  title     = {Fingerprint template protection using minutia-pair spectral representations},
  journal   = {CoRR},
  volume    = {abs/1804.01744},
  year      = {2018},
  url       = {http://arxiv.org/abs/1804.01744},
  archivePrefix = {arXiv},
  eprint    = {1804.01744},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1804-01744},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS18,
  author    = {Daan Leermakers and
               Boris Skoric},
  title     = {Security proof for Quantum Key Recycling with noise},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {264},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/264},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LeermakersS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SkoricPM17,
  author    = {Boris Skoric and
               Pepijn W. H. Pinkse and
               Allard P. Mosk},
  title     = {Authenticated communication from quantum readout of PUFs},
  journal   = {Quantum Information Processing},
  volume    = {16},
  number    = {8},
  pages     = {200},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11128-017-1649-0},
  doi       = {10.1007/s11128-017-1649-0},
  timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/qip/SkoricPM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/StankoAS17,
  author    = {Taras Stanko and
               Fitria Nur Andini and
               Boris Skoric},
  title     = {Optimized Quantization in Zero Leakage Helper Data Systems},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {12},
  number    = {8},
  pages     = {1957--1966},
  year      = {2017},
  url       = {https://doi.org/10.1109/TIFS.2017.2697840},
  doi       = {10.1109/TIFS.2017.2697840},
  timestamp = {Wed, 28 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/StankoAS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/StankoS17,
  author    = {Taras Stanko and
               Boris Skoric},
  title     = {Minutia-pair spectral representations for fingerprint template protection},
  booktitle = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
               2017, Rennes, France, December 4-7, 2017},
  pages     = {1--6},
  year      = {2017},
  crossref  = {DBLP:conf/wifs/2017},
  url       = {https://doi.org/10.1109/WIFS.2017.8267656},
  doi       = {10.1109/WIFS.2017.8267656},
  timestamp = {Tue, 30 Jan 2018 12:23:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/StankoS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StankoS17,
  author    = {Taras Stanko and
               Boris Skoric},
  title     = {Minutia-pair spectral representations for fingerprint template protection},
  journal   = {CoRR},
  volume    = {abs/1703.06811},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.06811},
  archivePrefix = {arXiv},
  eprint    = {1703.06811},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/StankoS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Skoric17,
  author    = {Boris Skoric},
  title     = {A short note on the security of Round-Robin Differential Phase-Shift
               {QKD}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {52},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/052},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Skoric17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS17,
  author    = {Daan Leermakers and
               Boris Skoric},
  title     = {Optimal attacks on qubit-based Quantum Key Recycling},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {331},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/331},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LeermakersS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS17a,
  author    = {Daan Leermakers and
               Boris Skoric},
  title     = {Security proof for Round Robin Differential Phase Shift {QKD}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {830},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/830},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/LeermakersS17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/GrootSVL16,
  author    = {Joep A. de Groot and
               Boris Skoric and
               Niels de Vreede and
               Jean{-}Paul M. G. Linnartz},
  title     = {Quantization in zero leakage helper data schemes},
  journal   = {{EURASIP} J. Adv. Sig. Proc.},
  volume    = {2016},
  pages     = {54},
  year      = {2016},
  url       = {https://doi.org/10.1186/s13634-016-0353-z},
  doi       = {10.1186/s13634-016-0353-z},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejasp/GrootSVL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SkoricHZ16,
  author    = {Boris Skoric and
               Sebastiaan J. A. de Hoogh and
               Nicola Zannone},
  title     = {Flow-based reputation with uncertainty: evidence-based subjective
               logic},
  journal   = {Int. J. Inf. Sec.},
  volume    = {15},
  number    = {4},
  pages     = {381--402},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10207-015-0298-5},
  doi       = {10.1007/s10207-015-0298-5},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/SkoricHZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/Skoric16,
  author    = {Boris Skoric},
  title     = {Security analysis of Quantum-Readout PUFs in the case of challenge-estimation
               attacks},
  journal   = {Quantum Information {\&} Computation},
  volume    = {16},
  number    = {1{\&}2},
  pages     = {50--60},
  year      = {2016},
  url       = {http://www.rintonpress.com/xxqic16/qic-16-12/0060-0060.pdf},
  timestamp = {Mon, 28 Dec 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/qic/Skoric16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Skoric16,
  author    = {Boris Skoric},
  title     = {A trivial debiasing scheme for Helper Data Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {241},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/241},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Skoric16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StankoAS16,
  author    = {Taras Stanko and
               Fitria Nur Andini and
               Boris Skoric},
  title     = {Optimized quantization in Zero Leakage Helper Data Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {325},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/325},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StankoAS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricPM16,
  author    = {Boris Skoric and
               Pepijn W. H. Pinkse and
               Allard P. Mosk},
  title     = {Authenticated communication from Quantum Readout of PUFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {971},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/971},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricPM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricV16,
  author    = {Boris Skoric and
               Manon de Vries},
  title     = {Quantum Key Recycling with eight-state encoding (The Quantum One Time
               Pad is more interesting than we thought)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1122},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1122},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SkoricO15,
  author    = {Boris Skoric and
               Jan{-}Jaap Oosterwijk},
  title     = {Binary and q-ary Tardos codes, revisited},
  journal   = {Des. Codes Cryptography},
  volume    = {74},
  number    = {1},
  pages     = {75--111},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-013-9842-3},
  doi       = {10.1007/s10623-013-9842-3},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/SkoricO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SimoneS15,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {False Negative probabilities in Tardos codes},
  journal   = {Des. Codes Cryptography},
  volume    = {74},
  number    = {1},
  pages     = {159--182},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-013-9856-x},
  doi       = {10.1007/s10623-013-9856-x},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/SimoneS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SimoneS15a,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {False positive probabilities in q-ary Tardos codes: comparison of
               attacks},
  journal   = {Des. Codes Cryptography},
  volume    = {75},
  number    = {3},
  pages     = {519--542},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9937-5},
  doi       = {10.1007/s10623-014-9937-5},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/SimoneS15a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Skoric15,
  author    = {Boris Skoric},
  title     = {Tally-Based Simple Decoders for Traitor Tracing and Group Testing},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {6},
  pages     = {1221--1233},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2015.2403575},
  doi       = {10.1109/TIFS.2015.2403575},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/Skoric15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/OosterwijkSD15,
  author    = {Jan{-}Jaap Oosterwijk and
               Boris Skoric and
               Jeroen Doumen},
  title     = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing
               Schemes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {61},
  number    = {7},
  pages     = {3882--3900},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIT.2015.2428250},
  doi       = {10.1109/TIT.2015.2428250},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/OosterwijkSD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchallerS015,
  author    = {Andr{\'{e}} Schaller and
               Boris Skoric and
               Stefan Katzenbeisser},
  title     = {On the Systematic Drift of Physically Unclonable Functions Due to
               Aging},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {15--20},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015trusted},
  url       = {https://doi.org/10.1145/2808414.2808417},
  doi       = {10.1145/2808414.2808417},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SchallerS015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricG15,
  author    = {Boris Skoric and
               Wouter de Groot},
  title     = {Generalised tally-based decoders for traitor tracing and group testing},
  booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages     = {1--6},
  year      = {2015},
  crossref  = {DBLP:conf/wifs/2015},
  url       = {https://doi.org/10.1109/WIFS.2015.7368586},
  doi       = {10.1109/WIFS.2015.7368586},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/SkoricG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricG15,
  author    = {Boris Skoric and
               Wouter de Groot},
  title     = {Generalised tally-based decoders for traitor tracing and group testing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {617},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/617},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SkoricV14,
  author    = {Boris Skoric and
               Niels de Vreede},
  title     = {The Spammed Code Offset Method},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {9},
  number    = {5},
  pages     = {875--884},
  year      = {2014},
  url       = {https://doi.org/10.1109/TIFS.2014.2312851},
  doi       = {10.1109/TIFS.2014.2312851},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/SkoricV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SkoricHZ14,
  author    = {Boris Skoric and
               Sebastiaan de Hoogh and
               Nicola Zannone},
  title     = {Flow-based reputation with uncertainty: Evidence-Based Subjective
               Logic},
  journal   = {CoRR},
  volume    = {abs/1402.3319},
  year      = {2014},
  url       = {http://arxiv.org/abs/1402.3319},
  archivePrefix = {arXiv},
  eprint    = {1402.3319},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/SkoricHZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchallerSK14,
  author    = {Andr{\'{e}} Schaller and
               Boris Skoric and
               Stefan Katzenbeisser},
  title     = {Eliminating Leakage in Reverse Fuzzy Extractors},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {741},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/741},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SchallerSK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Skoric14,
  author    = {Boris Skoric},
  title     = {Simple-looking joint decoders for traitor tracing and group testing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {781},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/781},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Skoric14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LaarhovenDRSW13,
  author    = {Thijs Laarhoven and
               Jeroen Doumen and
               Peter Roelse and
               Boris Skoric and
               Benne de Weger},
  title     = {Dynamic Tardos Traitor Tracing Schemes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {59},
  number    = {7},
  pages     = {4230--4242},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIT.2013.2251756},
  doi       = {10.1109/TIT.2013.2251756},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/LaarhovenDRSW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BergSL13,
  author    = {Robbert van den Berg and
               Boris Skoric and
               Vincent van der Leest},
  title     = {Bias-based modeling and entropy analysis of PUFs},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {13--20},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013trusted},
  url       = {https://doi.org/10.1145/2517300.2517301},
  doi       = {10.1145/2517300.2517301},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BergSL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/OosterwijkSD13,
  author    = {Jan{-}Jaap Oosterwijk and
               Boris Skoric and
               Jeroen Doumen},
  title     = {Optimal suspicion functions for tardos traitor tracing schemes},
  booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '13, Montpellier, France, June 17-19, 2013},
  pages     = {19--28},
  year      = {2013},
  crossref  = {DBLP:conf/ih/2013},
  url       = {https://doi.org/10.1145/2482513.2482527},
  doi       = {10.1145/2482513.2482527},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ih/OosterwijkSD13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GrootSVL13,
  author    = {Joep A. de Groot and
               Boris Skoric and
               Niels de Vreede and
               Jean{-}Paul M. G. Linnartz},
  title     = {Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {506--511},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/document/7223207/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/GrootSVL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SkoricOD13,
  author    = {Boris Skoric and
               Jan{-}Jaap Oosterwijk and
               Jeroen Doumen},
  title     = {The holey grail {A} special score function for non-binary traitor
               tracing},
  booktitle = {2013 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  pages     = {180--185},
  year      = {2013},
  crossref  = {DBLP:conf/wifs/2013},
  url       = {https://doi.org/10.1109/WIFS.2013.6707815},
  doi       = {10.1109/WIFS.2013.6707815},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/SkoricOD13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricMP13,
  author    = {Boris Skoric and
               Allard P. Mosk and
               Pepijn W. H. Pinkse},
  title     = {Security of Quantum-Readout PUFs against quadrature based challenge
               estimation attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {84},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/084},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricMP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OosterwijkSD13,
  author    = {Jan{-}Jaap Oosterwijk and
               Boris Skoric and
               Jeroen Doumen},
  title     = {Optimal Suspicion Functions for Tardos Traitor Tracing Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {154},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/154},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/OosterwijkSD13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OosterwijkSD13a,
  author    = {Jan{-}Jaap Oosterwijk and
               Boris Skoric and
               Jeroen Doumen},
  title     = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing
               Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {389},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/389},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/OosterwijkSD13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricOD13,
  author    = {Boris Skoric and
               Jan{-}Jaap Oosterwijk and
               Jeroen Doumen},
  title     = {The Holey Grail: {A} special score function for non-binary traitor
               tracing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {420},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/420},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricOD13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Skoric13,
  author    = {Boris Skoric},
  title     = {Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation
               attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {479},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/479},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Skoric13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricV13,
  author    = {Boris Skoric and
               Niels de Vreede},
  title     = {The Spammed Code Offset Method},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {527},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/527},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergSL13,
  author    = {Robbert van den Berg and
               Boris Skoric and
               Vincent van der Leest},
  title     = {Bias-based modeling and entropy analysis of PUFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {656},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/656},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BergSL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IbrahimiSO13,
  author    = {Sarah Ibrahimi and
               Boris Skoric and
               Jan{-}Jaap Oosterwijk},
  title     = {Riding the Saddle Point: asymptotics of the capacity-achieving simple
               decoder for bias-based traitor tracing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {809},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/809},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/IbrahimiSO13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SimoneS12,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {Accusation probabilities in Tardos codes: beyond the Gaussian approximation},
  journal   = {Des. Codes Cryptography},
  volume    = {63},
  number    = {3},
  pages     = {379--412},
  year      = {2012},
  url       = {https://doi.org/10.1007/s10623-011-9563-4},
  doi       = {10.1007/s10623-011-9563-4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/SimoneS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/SimoneSZ12,
  author    = {Antonino Simone and
               Boris Skoric and
               Nicola Zannone},
  title     = {Flow-Based Reputation: More than Just Ranking},
  journal   = {International Journal of Information Technology and Decision Making},
  volume    = {11},
  number    = {3},
  pages     = {551--578},
  year      = {2012},
  url       = {https://doi.org/10.1142/S0219622012500113},
  doi       = {10.1142/S0219622012500113},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijitdm/SimoneSZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RanganathanTSSC12,
  author    = {Aanjhan Ranganathan and
               Nils Ole Tippenhauer and
               Boris Skoric and
               Dave Singel{\'{e}}e and
               Srdjan Capkun},
  title     = {Design and Implementation of a Terrorist Fraud Resilient Distance
               Bounding System},
  booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  pages     = {415--432},
  year      = {2012},
  crossref  = {DBLP:conf/esorics/2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1\_24},
  doi       = {10.1007/978-3-642-33167-1\_24},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/RanganathanTSSC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BoestenS12,
  author    = {Dion Boesten and
               Boris Skoric},
  title     = {Asymptotic Fingerprinting Capacity in the Combined Digit Model},
  booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
               CA, USA, May 15-18, 2012, Revised Selected Papers},
  pages     = {255--268},
  year      = {2012},
  crossref  = {DBLP:conf/ih/2012},
  url       = {https://doi.org/10.1007/978-3-642-36373-3\_17},
  doi       = {10.1007/978-3-642-36373-3\_17},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/BoestenS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-1820,
  author    = {Antonino Simone and
               Boris Skoric and
               Nicola Zannone},
  title     = {Flow-based reputation: more than just ranking},
  journal   = {CoRR},
  volume    = {abs/1203.1820},
  year      = {2012},
  url       = {http://arxiv.org/abs/1203.1820},
  archivePrefix = {arXiv},
  eprint    = {1203.1820},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1203-1820},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoestenS12,
  author    = {Dion Boesten and
               Boris Skoric},
  title     = {Asymptotic fingerprinting capacity in the Combined Digit Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {184},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/184},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoestenS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricO12,
  author    = {Boris Skoric and
               Jan{-}Jaap Oosterwijk},
  title     = {Binary and q-ary Tardos codes, revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {249},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/249},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS12,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {False Positive probabilities in q-ary Tardos codes: comparison of
               attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {522},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/522},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SimoneS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrootSVL12,
  author    = {Joep A. de Groot and
               Boris Skoric and
               Niels de Vreede and
               Jean{-}Paul M. G. Linnartz},
  title     = {Information Leakage of Continuous-Source Zero Secrecy Leakage Helper
               Data Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {566},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/566},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GrootSVL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS12a,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {False Negative probabilities in Tardos codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {667},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/667},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SimoneS12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/SkoricOVS11,
  author    = {Boris Skoric and
               Chibuzo Obi and
               Evgeny A. Verbitskiy and
               Berry Schoenmakers},
  title     = {Sharp lower bounds on the extractable randomness from non-uniform
               sources},
  journal   = {Inf. Comput.},
  volume    = {209},
  number    = {8},
  pages     = {1184--1196},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ic.2011.06.001},
  doi       = {10.1016/j.ic.2011.06.001},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iandc/SkoricOVS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SkoricKSC11,
  author    = {Boris Skoric and
               Stefan Katzenbeisser and
               Hans Georg Schaathun and
               Mehmet Utku Celik},
  title     = {Tardos Fingerprinting Codes in the Combined Digit Model},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {6},
  number    = {3-2},
  pages     = {906--919},
  year      = {2011},
  url       = {https://doi.org/10.1109/TIFS.2011.2116783},
  doi       = {10.1109/TIFS.2011.2116783},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/SkoricKSC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BoestenS11,
  author    = {Dion Boesten and
               Boris Skoric},
  title     = {Asymptotic Fingerprinting Capacity for Non-binary Alphabets},
  booktitle = {Information Hiding - 13th International Conference, {IH} 2011, Prague,
               Czech Republic, May 18-20, 2011, Revised Selected Papers},
  pages     = {1--13},
  year      = {2011},
  crossref  = {DBLP:conf/ih/2011},
  url       = {https://doi.org/10.1007/978-3-642-24178-9\_1},
  doi       = {10.1007/978-3-642-24178-9\_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/BoestenS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SimoneS11,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos
               Codes},
  booktitle = {Information Hiding - 13th International Conference, {IH} 2011, Prague,
               Czech Republic, May 18-20, 2011, Revised Selected Papers},
  pages     = {14--27},
  year      = {2011},
  crossref  = {DBLP:conf/ih/2011},
  url       = {https://doi.org/10.1007/978-3-642-24178-9\_2},
  doi       = {10.1007/978-3-642-24178-9\_2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/SimoneS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-0445,
  author    = {Dion Boesten and
               Boris Skoric},
  title     = {Asymptotic fingerprinting capacity for non-binary alphabets},
  journal   = {CoRR},
  volume    = {abs/1102.0445},
  year      = {2011},
  url       = {http://arxiv.org/abs/1102.0445},
  archivePrefix = {arXiv},
  eprint    = {1102.0445},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1102-0445},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-0451,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {Asymptotically false-positive-maximizing attack on non-binary Tardos
               codes},
  journal   = {CoRR},
  volume    = {abs/1102.0451},
  year      = {2011},
  url       = {http://arxiv.org/abs/1102.0451},
  archivePrefix = {arXiv},
  eprint    = {1102.0451},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1102-0451},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3597,
  author    = {Thijs Laarhoven and
               Jeroen Doumen and
               Peter Roelse and
               Boris Skoric and
               Benne de Weger},
  title     = {Dynamic Tardos Traitor Tracing Schemes},
  journal   = {CoRR},
  volume    = {abs/1111.3597},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.3597},
  archivePrefix = {arXiv},
  eprint    = {1111.3597},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1111-3597},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SkoricM10,
  author    = {Boris Skoric and
               Marc X. Makkes},
  title     = {Flowchart description of security primitives for controlled physical
               unclonable functions},
  journal   = {Int. J. Inf. Sec.},
  volume    = {9},
  number    = {5},
  pages     = {327--335},
  year      = {2010},
  url       = {https://doi.org/10.1007/s10207-010-0113-2},
  doi       = {10.1007/s10207-010-0113-2},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/SkoricM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VerbitskiyTOSS10,
  author    = {Evgeny A. Verbitskiy and
               Pim Tuyls and
               Chibuzo Obi and
               Berry Schoenmakers and
               Boris Skoric},
  title     = {Key extraction from general nondiscrete signals},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {5},
  number    = {2},
  pages     = {269--279},
  year      = {2010},
  url       = {https://doi.org/10.1109/TIFS.2010.2046965},
  doi       = {10.1109/TIFS.2010.2046965},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/VerbitskiyTOSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Skoric10,
  author    = {Boris Skoric},
  title     = {Quantum Readout of Physical Unclonable Functions},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {369--386},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_22},
  doi       = {10.1007/978-3-642-12678-9\_22},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/Skoric10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Skoric10,
  author    = {Boris Skoric},
  title     = {Security with Noisy Data - (Extended Abstract of Invited Talk)},
  booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
               AB, Canada, June 28-30, 2010, Revised Selected Papers},
  pages     = {48--50},
  year      = {2010},
  crossref  = {DBLP:conf/ih/2010},
  url       = {https://doi.org/10.1007/978-3-642-16435-4\_4},
  doi       = {10.1007/978-3-642-16435-4\_4},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/Skoric10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS10,
  author    = {Antonino Simone and
               Boris Skoric},
  title     = {Accusation probabilities in Tardos codes: the Gaussian approximation
               is better than we thought},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {472},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/472},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SimoneS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/GuajardoSTKBBS09,
  author    = {Jorge Guajardo and
               Boris Skoric and
               Pim Tuyls and
               Sandeep S. Kumar and
               Thijs Bel and
               Antoon H. M. Blom and
               Geert Jan Schrijen},
  title     = {Anti-counterfeiting, key distribution, and key storage in an ambient
               world via physical unclonable functions},
  journal   = {Information Systems Frontiers},
  volume    = {11},
  number    = {1},
  pages     = {19--41},
  year      = {2009},
  url       = {https://doi.org/10.1007/s10796-008-9142-z},
  doi       = {10.1007/s10796-008-9142-z},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isf/GuajardoSTKBBS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KursaweSSST09,
  author    = {Klaus Kursawe and
               Ahmad{-}Reza Sadeghi and
               Dries Schellekens and
               Boris Skoric and
               Pim Tuyls},
  title     = {Reconfigurable Physical Unclonable Functions -- Enabling Technology
               for Tamper-Resistant Storage},
  booktitle = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
               {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  pages     = {22--29},
  year      = {2009},
  crossref  = {DBLP:conf/host/2009},
  url       = {https://doi.org/10.1109/HST.2009.5225058},
  doi       = {10.1109/HST.2009.5225058},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/KursaweSSST09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HooghSSV09,
  author    = {Sebastiaan de Hoogh and
               Berry Schoenmakers and
               Boris Skoric and
               Jos{\'{e}} Villegas},
  title     = {Verifiable Rotation of Homomorphic Encryptions},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {393--410},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_22},
  doi       = {10.1007/978-3-642-00468-1\_22},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/HooghSSV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/Skoric0SC09,
  author    = {Boris Skoric and
               Stefan Katzenbeisser and
               Hans Georg Schaathun and
               Mehmet Utku Celik},
  title     = {Tardos fingerprinting codes in the combined digit model},
  booktitle = {First {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2009, London, UK, December 6-9, 2009},
  pages     = {41--45},
  year      = {2009},
  crossref  = {DBLP:conf/wifs/2009},
  url       = {https://doi.org/10.1109/WIFS.2009.5386485},
  doi       = {10.1109/WIFS.2009.5386485},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/Skoric0SC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/SkoricM09,
  author    = {Boris Skoric and
               Marc X. Makkes},
  title     = {Simplification of Controlled {PUF} primitives},
  booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
               08.07.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9282},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2010/2404/},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/SkoricM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/SkoricT09,
  author    = {Boris Skoric and
               Pim Tuyls},
  title     = {An efficient fuzzy extractor for limited noise},
  booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
               08.07.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9282},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2010/2409/},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/SkoricT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricT09,
  author    = {Boris Skoric and
               Pim Tuyls},
  title     = {An efficient fuzzy extractor for limited noise},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {30},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/030},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricKSC09,
  author    = {Boris Skoric and
               Stefan Katzenbeisser and
               Hans Georg Schaathun and
               Mehmet Utku Celik},
  title     = {Tardos Fingerprinting Codes in the Combined Digit Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {244},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/244},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricKSC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VerbitskiyTOSS09,
  author    = {Evgeny A. Verbitskiy and
               Pim Tuyls and
               Chibuzo Obi and
               Berry Schoenmakers and
               Boris Skoric},
  title     = {Key extraction from general non-discrete signals},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {303},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/303},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/VerbitskiyTOSS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricM09,
  author    = {Boris Skoric and
               Marc X. Makkes},
  title     = {Flowchart description of security primitives for Controlled Physical
               Unclonable Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {328},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/328},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Skoric09,
  author    = {Boris Skoric},
  title     = {Quantum readout of Physical Unclonable Functions: Remote authentication
               without trusted readers and authenticated Quantum Key Exchange without
               initial shared secrets},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {369},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/369},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Skoric09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SkoricKC08,
  author    = {Boris Skoric and
               Stefan Katzenbeisser and
               Mehmet Utku Celik},
  title     = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes},
  journal   = {Des. Codes Cryptography},
  volume    = {46},
  number    = {2},
  pages     = {137--166},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10623-007-9142-x},
  doi       = {10.1007/s10623-007-9142-x},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/SkoricKC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SkoricVCT08,
  author    = {Boris Skoric and
               T. U. Vladimirova and
               Mehmet Utku Celik and
               Joop Talstra},
  title     = {Tardos Fingerprinting is Better Than We Thought},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {54},
  number    = {8},
  pages     = {3663--3676},
  year      = {2008},
  url       = {https://doi.org/10.1109/TIT.2008.926307},
  doi       = {10.1109/TIT.2008.926307},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/SkoricVCT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0804-0659,
  author    = {Boris Skoric},
  title     = {Steganography from weak cryptography},
  journal   = {CoRR},
  volume    = {abs/0804.0659},
  year      = {2008},
  url       = {http://arxiv.org/abs/0804.0659},
  archivePrefix = {arXiv},
  eprint    = {0804.0659},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0804-0659},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricOVS08,
  author    = {Boris Skoric and
               Chibuzo Obi and
               Evgeny A. Verbitskiy and
               Berry Schoenmakers},
  title     = {Sharp lower bounds on the extractable randomness from non-uniform
               sources},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {484},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/484},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricOVS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BirdCGMSSTTT07,
  author    = {Neil Bird and
               Claudine Conrado and
               Jorge Guajardo and
               Stefan Maubach and
               Geert Jan Schrijen and
               Boris Skoric and
               Anton M. H. Tombeur and
               Peter Thueringer and
               Pim Tuyls},
  title     = {{ALGSICS} - Combining Physics and Cryptography to Enhance Security
               and Privacy in {RFID} Systems},
  booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
               {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  pages     = {187--202},
  year      = {2007},
  crossref  = {DBLP:conf/esas/2007},
  url       = {https://doi.org/10.1007/978-3-540-73275-4\_14},
  doi       = {10.1007/978-3-540-73275-4\_14},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esas/BirdCGMSSTTT07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KatzenbeisserSCS07,
  author    = {Stefan Katzenbeisser and
               Boris Skoric and
               Mehmet Utku Celik and
               Ahmad{-}Reza Sadeghi},
  title     = {Combining Tardos Fingerprinting Codes and Fingercasting},
  booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
               France, June 11-13, 2007, Revised Selected Papers},
  pages     = {294--310},
  year      = {2007},
  crossref  = {DBLP:conf/ih/2007},
  url       = {https://doi.org/10.1007/978-3-540-77370-2\_20},
  doi       = {10.1007/978-3-540-77370-2\_20},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/KatzenbeisserSCS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/TuylsS07,
  author    = {Pim Tuyls and
               Boris Skoric},
  title     = {Strong Authentication with Physical Unclonable Functions},
  booktitle = {Security, Privacy, and Trust in Modern Data Management},
  pages     = {133--148},
  year      = {2007},
  crossref  = {DBLP:books/sp/PJ2007},
  url       = {https://doi.org/10.1007/978-3-540-69861-6\_10},
  doi       = {10.1007/978-3-540-69861-6\_10},
  timestamp = {Tue, 16 May 2017 14:01:42 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/07/TuylsS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0710-5002,
  author    = {Boris Skoric},
  title     = {The entropy of keys derived from laser speckle},
  journal   = {CoRR},
  volume    = {abs/0710.5002},
  year      = {2007},
  url       = {http://arxiv.org/abs/0710.5002},
  archivePrefix = {arXiv},
  eprint    = {0710.5002},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0710-5002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricKC07,
  author    = {Boris Skoric and
               Stefan Katzenbeisser and
               Mehmet Utku Celik},
  title     = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {41},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/041},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricKC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuFDLS06,
  author    = {Guofei Gu and
               Prahlad Fogla and
               David Dagon and
               Wenke Lee and
               Boris Skoric},
  title     = {Measuring intrusion detection capability: an information-theoretic
               approach},
  booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  pages     = {90--101},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006},
  url       = {https://doi.org/10.1145/1128817.1128834},
  doi       = {10.1145/1128817.1128834},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GuFDLS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TuylsSSGVW06,
  author    = {Pim Tuyls and
               Geert Jan Schrijen and
               Boris Skoric and
               Jan van Geloven and
               Nynke Verhaegh and
               Rob Wolters},
  title     = {Read-Proof Hardware from Protective Coatings},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  pages     = {369--383},
  year      = {2006},
  crossref  = {DBLP:conf/ches/2006},
  url       = {https://doi.org/10.1007/11894063\_29},
  doi       = {10.1007/11894063\_29},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ches/TuylsSSGVW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuFDLS06,
  author    = {Guofei Gu and
               Prahlad Fogla and
               David Dagon and
               Wenke Lee and
               Boris Skoric},
  title     = {Towards an Information-Theoretic Framework for Analyzing Intrusion
               Detection Systems},
  booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  pages     = {527--546},
  year      = {2006},
  crossref  = {DBLP:conf/esorics/2006},
  url       = {https://doi.org/10.1007/11863908\_32},
  doi       = {10.1007/11863908\_32},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/GuFDLS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IgnatenkoSSTW06,
  author    = {Tanya Ignatenko and
               Geert Jan Schrijen and
               Boris Skoric and
               Pim Tuyls and
               Frans M. J. Willems},
  title     = {Estimating the Secrecy-Rate of Physical Unclonable Functions with
               the Context-Tree Weighting Method},
  booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
               {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
               2006},
  pages     = {499--503},
  year      = {2006},
  crossref  = {DBLP:conf/isit/2006},
  url       = {https://doi.org/10.1109/ISIT.2006.261765},
  doi       = {10.1109/ISIT.2006.261765},
  timestamp = {Wed, 13 Feb 2019 13:26:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/IgnatenkoSSTW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/TuylsS06,
  author    = {Pim Tuyls and
               Boris Skoric},
  title     = {Physical Unclonable Functions for enhanced security of tokens and
               tags},
  booktitle = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of
               the Information Security Solutions Europe 2006 Conference, 10-12 October
               2006, Rome, Italy},
  pages     = {30--37},
  year      = {2006},
  crossref  = {DBLP:conf/isse/2006},
  url       = {https://doi.org/10.1007/978-3-8348-9195-2\_4},
  doi       = {10.1007/978-3-8348-9195-2\_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isse/TuylsS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0607131,
  author    = {Boris Skoric and
               T. U. Vladimirova and
               Mehmet Utku Celik and
               Joop Talstra},
  title     = {Tardos fingerprinting is better than we thought},
  journal   = {CoRR},
  volume    = {abs/cs/0607131},
  year      = {2006},
  url       = {http://arxiv.org/abs/cs/0607131},
  archivePrefix = {arXiv},
  eprint    = {cs/0607131},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0607131},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricMKT06,
  author    = {Boris Skoric and
               Stefan Maubach and
               Tom A. M. Kevenaar and
               Pim Tuyls},
  title     = {Information-theoretic analysis of coating PUFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {101},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/101},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SkoricMKT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SkoricTO05,
  author    = {Boris Skoric and
               Pim Tuyls and
               W. Ophey},
  title     = {Robust Key Extraction from Physical Uncloneable Functions},
  booktitle = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  pages     = {407--422},
  year      = {2005},
  crossref  = {DBLP:conf/acns/2005},
  url       = {https://doi.org/10.1007/11496137\_28},
  doi       = {10.1007/11496137\_28},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/SkoricTO05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuylsSSAO05,
  author    = {Pim Tuyls and
               Boris Skoric and
               S. Stallinga and
               Anton H. M. Akkermans and
               W. Ophey},
  title     = {Information-Theoretic Security Analysis of Physical Uncloneable Functions},
  booktitle = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  pages     = {141--155},
  year      = {2005},
  crossref  = {DBLP:conf/fc/2005},
  url       = {https://doi.org/10.1007/11507840\_15},
  doi       = {10.1007/11507840\_15},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/TuylsSSAO05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/TuylsSSAO04,
  author    = {Pim Tuyls and
               Boris Skoric and
               S. Stallinga and
               Ton H. Akkermans and
               W. Ophey},
  title     = {An information theoretic model for physical uncloneable functions},
  booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information
               Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
               USA, June 27 - July 2, 2004},
  pages     = {141},
  year      = {2004},
  crossref  = {DBLP:conf/isit/2004},
  url       = {https://doi.org/10.1109/ISIT.2004.1365176},
  doi       = {10.1109/ISIT.2004.1365176},
  timestamp = {Tue, 12 Mar 2019 11:57:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/TuylsSSAO04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2017,
  title     = {2017 {IEEE} Workshop on Information Forensics and Security, {WIFS}
               2017, Rennes, France, December 4-7, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8258575},
  isbn      = {978-1-5090-6769-5},
  timestamp = {Tue, 30 Jan 2018 12:23:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015trusted,
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414},
  doi       = {10.1145/2808414},
  isbn      = {978-1-4503-3828-8},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015trusted},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
  title     = {2015 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7364553},
  isbn      = {978-1-4673-6802-5},
  timestamp = {Thu, 07 Jan 2016 14:28:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013trusted,
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517300},
  isbn      = {978-1-4503-2486-1},
  timestamp = {Fri, 31 Jan 2014 10:38:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013trusted},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2013,
  editor    = {William Puech and
               Marc Chaumont and
               Jana Dittmann and
               Patrizio Campisi},
  title     = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
               '13, Montpellier, France, June 17-19, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2482513},
  isbn      = {978-1-4503-2081-8},
  timestamp = {Mon, 04 Aug 2014 16:00:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2013,
  title     = {2013 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2013, Guangzhou, China, November 18-21, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6693295},
  timestamp = {Mon, 20 Jan 2014 12:49:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012,
  editor    = {Sara Foresti and
               Moti Yung and
               Fabio Martinelli},
  title     = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7459},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1},
  doi       = {10.1007/978-3-642-33167-1},
  isbn      = {978-3-642-33166-4},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2012,
  editor    = {Matthias Kirchner and
               Dipak Ghosal},
  title     = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
               CA, USA, May 15-18, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7692},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36373-3},
  doi       = {10.1007/978-3-642-36373-3},
  isbn      = {978-3-642-36372-6},
  timestamp = {Sun, 21 May 2017 00:18:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2011,
  editor    = {Tom{\'{a}}s Filler and
               Tom{\'{a}}s Pevn{\'{y}} and
               Scott Craver and
               Andrew D. Ker},
  title     = {Information Hiding - 13th International Conference, {IH} 2011, Prague,
               Czech Republic, May 18-20, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6958},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24178-9},
  doi       = {10.1007/978-3-642-24178-9},
  isbn      = {978-3-642-24177-2},
  timestamp = {Sun, 21 May 2017 00:18:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2010,
  editor    = {Rainer B{\"{o}}hme and
               Philip W. L. Fong and
               Reihaneh Safavi{-}Naini},
  title     = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
               AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6387},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16435-4},
  doi       = {10.1007/978-3-642-16435-4},
  isbn      = {978-3-642-16434-7},
  timestamp = {Sun, 21 May 2017 00:18:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/host/2009,
  editor    = {Mohammad Tehranipoor and
               Jim Plusquellic},
  title     = {{IEEE} International Workshop on Hardware-Oriented Security and Trust,
               {HOST} 2009, San Francisco, CA, USA, July 27, 2009. Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5209455},
  isbn      = {978-1-4244-4805-0},
  timestamp = {Thu, 23 Oct 2014 17:07:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/host/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1},
  doi       = {10.1007/978-3-642-00468-1},
  isbn      = {978-3-642-00467-4},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2009,
  title     = {First {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2009, London, UK, December 6-9, 2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5377995},
  isbn      = {978-1-4244-5279-8},
  timestamp = {Wed, 22 Apr 2015 19:02:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wifs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9282,
  editor    = {Jorge Guajardo and
               Bart Preneel and
               Ahmad{-}Reza Sadeghi and
               Pim Tuyls},
  title     = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
               08.07.2009},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {09282},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2009},
  url       = {http://drops.dagstuhl.de/portals/09282/},
  timestamp = {Wed, 08 Apr 2015 17:19:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/2009P9282},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2007,
  editor    = {Frank Stajano and
               Catherine A. Meadows and
               Srdjan Capkun and
               Tyler Moore},
  title     = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
               {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4572},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73275-4},
  doi       = {10.1007/978-3-540-73275-4},
  isbn      = {978-3-540-73274-7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esas/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2007,
  editor    = {Teddy Furon and
               Fran{\c{c}}ois Cayre and
               Gwena{\"{e}}l J. Do{\"{e}}rr and
               Patrick Bas},
  title     = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
               France, June 11-13, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4567},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77370-2},
  doi       = {10.1007/978-3-540-77370-2},
  isbn      = {978-3-540-77369-6},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/PJ2007,
  editor    = {Milan Petkovic and
               Willem Jonker},
  title     = {Security, Privacy, and Trust in Modern Data Management},
  series    = {Data-Centric Systems and Applications},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-69861-6},
  doi       = {10.1007/978-3-540-69861-6},
  isbn      = {978-3-540-69860-9},
  timestamp = {Tue, 16 May 2017 14:01:42 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/PJ2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006,
  editor    = {Ferng{-}Ching Lin and
               Der{-}Tsai Lee and
               Bao{-}Shuh Paul Lin and
               Shiuhpyng Shieh and
               Sushil Jajodia},
  title     = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-272-0},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor    = {Louis Goubin and
               Mitsuru Matsui},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
               Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4249},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11894063},
  doi       = {10.1007/11894063},
  isbn      = {3-540-46559-6},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2006,
  editor    = {Dieter Gollmann and
               Jan Meier and
               Andrei Sabelfeld},
  title     = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4189},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11863908},
  doi       = {10.1007/11863908},
  isbn      = {3-540-44601-X},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2006,
  title     = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
               {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
               2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4035458},
  isbn      = {1-4244-0504-1},
  timestamp = {Wed, 13 Feb 2019 13:26:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isse/2006,
  editor    = {Sachar Paulus and
               Norbert Pohlmann and
               Helmut Reimer},
  title     = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of
               the Information Security Solutions Europe 2006 Conference, 10-12 October
               2006, Rome, Italy},
  publisher = {Vieweg},
  year      = {2006},
  url       = {https://doi.org/10.1007/978-3-8348-9195-2},
  doi       = {10.1007/978-3-8348-9195-2},
  isbn      = {978-3-8348-0213-2},
  timestamp = {Fri, 26 May 2017 00:48:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isse/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2005,
  editor    = {John Ioannidis and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3531},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137093},
  doi       = {10.1007/b137093},
  isbn      = {3-540-26223-7},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor    = {Andrew S. Patrick and
               Moti Yung},
  title     = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3570},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137875},
  doi       = {10.1007/b137875},
  isbn      = {3-540-26656-9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2004,
  title     = {Proceedings of the 2004 {IEEE} International Symposium on Information
               Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
               USA, June 27 - July 2, 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9423},
  isbn      = {0-7803-8280-3},
  timestamp = {Tue, 12 Mar 2019 11:57:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier