Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Streaming video over variable bit-rate wireless channels., , and . IEEE Trans. Multim., 6 (2): 268-277 (2004)Geological record and reconstruction of the late Pliocene impact of the Eltanin asteroid in the Southern Ocean, , , , , , , , , and 3 other author(s). Nature, 390 (6658): 357--363 (November 1997)Efficient, Portable Template Attacks., and . IEEE Trans. Inf. Forensics Secur., 13 (2): 490-501 (2018)Low Cost Attacks on Tamper Resistant Devices., and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 125-136. Springer, (1997)Exact JPEG recompression., and . Visual Information Processing and Communication, volume 7543 of SPIE Proceedings, page 75430V. SPIE, (2010)Information hiding-a survey., , and . Proc. IEEE, 87 (7): 1062-1078 (1999)Probabilistic Counting of Large Digital Signature Collections.. USENIX Security Symposium, USENIX Association, (2000)Efficient Template Attacks., and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 253-270. Springer, (2013)Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP.. IEEE Trans. Computers, 47 (10): 1153-1157 (1998)Electromagnetic Eavesdropping Risks of Flat-Panel Displays.. Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, page 88-107. Springer, (2004)