Остановите войну!
for scientists:
default search action
Boris Skoric
- > Home > Persons > Boris Skoric
Publications
- 2022
- [c31]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy. WPES@CCS 2022: 41-53 - 2020
- [c30]Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. NDSS 2020 - [c29]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Ninghui Li, Boris Skoric:
Estimating Numerical Distributions under Local Differential Privacy. SIGMOD Conference 2020: 621-635 - [c28]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Improving Frequency Estimation under Local Differential Privacy. WPES@CCS 2020: 123-135 - [i54]Boris Skoric, Wil Michiels:
The Blob: provable incompressibility and traceability in the whitebox model. CoRR abs/2004.04457 (2020) - [i53]Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Skoric:
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees. CoRR abs/2008.13151 (2020) - 2019
- [j28]Taras Stanko, Bin Chen, Boris Skoric:
Fingerprint template protection using minutia-pair spectral representations. EURASIP J. Inf. Secur. 2019: 12 (2019) - [j26]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser, Jakub Szefer:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c27]Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation. WIFS 2019: 1-6 - [i51]Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuhaä-Zwakenberg, Boris Skoric:
Consistent and Accurate Frequency Oracles under Local Differential Privacy. CoRR abs/1905.08320 (2019) - [i50]Behrooz Razeghi, Taras Stanko, Boris Skoric, Slava Voloshynovskiy:
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding. CoRR abs/1907.06388 (2019) - [i49]Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Information-theoretic metrics for Local Differential Privacy protocols. CoRR abs/1910.07826 (2019) - [i48]Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Four accuracy bounds and one estimator for frequency estimation under local differential privacy. CoRR abs/1911.10499 (2019) - [i47]Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li:
Estimating Numerical Distributions under Local Differential Privacy. CoRR abs/1912.01051 (2019) - 2018
- [j22]André Schaller, Taras Stanko, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 13(4): 954-964 (2018) - [i45]Taras Stanko, Bin Chen, Boris Skoric:
Fingerprint template protection using minutia-pair spectral representations. CoRR abs/1804.01744 (2018) - 2017
- [j20]Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized Quantization in Zero Leakage Helper Data Systems. IEEE Trans. Inf. Forensics Secur. 12(8): 1957-1966 (2017) - [c26]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. WIFS 2017: 1-6 - [i43]Taras Stanko, Boris Skoric:
Minutia-pair spectral representations for fingerprint template protection. CoRR abs/1703.06811 (2017) - 2016
- [j19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Quantization in zero leakage helper data schemes. EURASIP J. Adv. Signal Process. 2016: 54 (2016) - [j18]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [i38]Taras Stanko, Fitria Nur Andini, Boris Skoric:
Optimized quantization in Zero Leakage Helper Data Systems. IACR Cryptol. ePrint Arch. 2016: 325 (2016) - 2015
- [j16]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. Des. Codes Cryptogr. 74(1): 75-111 (2015) - [j15]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. Des. Codes Cryptogr. 74(1): 159-182 (2015) - [j14]Antonino Simone, Boris Skoric:
False positive probabilities in q-ary Tardos codes: comparison of attacks. Des. Codes Cryptogr. 75(3): 519-542 (2015) - [j12]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IEEE Trans. Inf. Theory 61(7): 3882-3900 (2015) - [c25]André Schaller, Boris Skoric, Stefan Katzenbeisser:
On the Systematic Drift of Physically Unclonable Functions Due to Aging. TrustED@CCS 2015: 15-20 - 2014
- [j11]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IEEE Trans. Inf. Forensics Secur. 9(5): 875-884 (2014) - [i34]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - [i33]André Schaller, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 741 (2014) - 2013
- [j10]Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. IEEE Trans. Inf. Theory 59(7): 4230-4242 (2013) - [c23]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. TrustED@CCS 2013: 13-20 - [c22]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal suspicion functions for tardos traitor tracing schemes. IH&MMSec 2013: 19-28 - [c21]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. SECRYPT 2013: 506-511 - [c20]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The holey grail A special score function for non-binary traitor tracing. WIFS 2013: 180-185 - [i30]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
Optimal Suspicion Functions for Tardos Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 154 (2013) - [i29]Jan-Jaap Oosterwijk, Boris Skoric, Jeroen Doumen:
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2013: 389 (2013) - [i28]Boris Skoric, Jan-Jaap Oosterwijk, Jeroen Doumen:
The Holey Grail: A special score function for non-binary traitor tracing. IACR Cryptol. ePrint Arch. 2013: 420 (2013) - [i26]Boris Skoric, Niels de Vreede:
The Spammed Code Offset Method. IACR Cryptol. ePrint Arch. 2013: 527 (2013) - [i25]Robbert van den Berg, Boris Skoric, Vincent van der Leest:
Bias-based modeling and entropy analysis of PUFs. IACR Cryptol. ePrint Arch. 2013: 656 (2013) - [i24]Sarah Ibrahimi, Boris Skoric, Jan-Jaap Oosterwijk:
Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing. IACR Cryptol. ePrint Arch. 2013: 809 (2013) - 2012
- [j9]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: beyond the Gaussian approximation. Des. Codes Cryptogr. 63(3): 379-412 (2012) - [j8]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-Based Reputation: More than Just Ranking. Int. J. Inf. Technol. Decis. Mak. 11(3): 551-578 (2012) - [c19]Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [i23]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. CoRR abs/1203.1820 (2012) - [i21]Boris Skoric, Jan-Jaap Oosterwijk:
Binary and q-ary Tardos codes, revisited. IACR Cryptol. ePrint Arch. 2012: 249 (2012) - [i20]Antonino Simone, Boris Skoric:
False Positive probabilities in q-ary Tardos codes: comparison of attacks. IACR Cryptol. ePrint Arch. 2012: 522 (2012) - [i19]Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes. IACR Cryptol. ePrint Arch. 2012: 566 (2012) - [i18]Antonino Simone, Boris Skoric:
False Negative probabilities in Tardos codes. IACR Cryptol. ePrint Arch. 2012: 667 (2012) - 2011
- [j7]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. Inf. Comput. 209(8): 1184-1196 (2011) - [j6]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - [c16]Antonino Simone, Boris Skoric:
Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes. Information Hiding 2011: 14-27 - [i16]Antonino Simone, Boris Skoric:
Asymptotically false-positive-maximizing attack on non-binary Tardos codes. CoRR abs/1102.0451 (2011) - [i15]Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger:
Dynamic Tardos Traitor Tracing Schemes. CoRR abs/1111.3597 (2011) - 2010
- [j4]Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general nondiscrete signals. IEEE Trans. Inf. Forensics Secur. 5(2): 269-279 (2010) - [i14]Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought. IACR Cryptol. ePrint Arch. 2010: 472 (2010) - 2009
- [j3]Jorge Guajardo, Boris Skoric, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert Jan Schrijen:
Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Inf. Syst. Frontiers 11(1): 19-41 (2009) - [c13]Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schellekens, Boris Skoric, Pim Tuyls:
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage. HOST 2009: 22-29 - [c12]Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas:
Verifiable Rotation of Homomorphic Encryptions. Public Key Cryptography 2009: 393-410 - [c11]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [i12]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. Foundations for Forgery-Resilient Cryptographic Hardware 2009 - [i11]Boris Skoric, Pim Tuyls:
An efficient fuzzy extractor for limited noise. IACR Cryptol. ePrint Arch. 2009: 30 (2009) - [i10]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - [i9]Evgeny A. Verbitskiy, Pim Tuyls, Chibuzo Obi, Berry Schoenmakers, Boris Skoric:
Key extraction from general non-discrete signals. IACR Cryptol. ePrint Arch. 2009: 303 (2009) - 2008
- [j2]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2): 137-166 (2008) - [j1]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos Fingerprinting is Better Than We Thought. IEEE Trans. Inf. Theory 54(8): 3663-3676 (2008) - [i5]Boris Skoric, Chibuzo Obi, Evgeny A. Verbitskiy, Berry Schoenmakers:
Sharp lower bounds on the extractable randomness from non-uniform sources. IACR Cryptol. ePrint Arch. 2008: 484 (2008) - 2007
- [c10]Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert Jan Schrijen, Boris Skoric, Anton M. H. Tombeur, Peter Thueringer, Pim Tuyls:
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems. ESAS 2007: 187-202 - [c9]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [p1]Pim Tuyls, Boris Skoric:
Strong Authentication with Physical Unclonable Functions. Security, Privacy, and Trust in Modern Data Management 2007: 133-148 - [i3]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptol. ePrint Arch. 2007: 41 (2007) - 2006
- [c8]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Measuring intrusion detection capability: an information-theoretic approach. AsiaCCS 2006: 90-101 - [c7]Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan van Geloven, Nynke Verhaegh, Rob Wolters:
Read-Proof Hardware from Protective Coatings. CHES 2006: 369-383 - [c6]Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. ESORICS 2006: 527-546 - [c5]Tanya Ignatenko, Geert Jan Schrijen, Boris Skoric, Pim Tuyls, Frans M. J. Willems:
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method. ISIT 2006: 499-503 - [c4]Pim Tuyls, Boris Skoric:
Physical Unclonable Functions for enhanced security of tokens and tags. ISSE 2006: 30-37 - [i2]Boris Skoric, T. U. Vladimirova, Mehmet Utku Celik, Joop Talstra:
Tardos fingerprinting is better than we thought. CoRR abs/cs/0607131 (2006) - [i1]Boris Skoric, Stefan Maubach, Tom A. M. Kevenaar, Pim Tuyls:
Information-theoretic analysis of coating PUFs. IACR Cryptol. ePrint Arch. 2006: 101 (2006) - 2005
- [c3]Boris Skoric, Pim Tuyls, W. Ophey:
Robust Key Extraction from Physical Uncloneable Functions. ACNS 2005: 407-422 - [c2]Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey:
Information-Theoretic Security Analysis of Physical Uncloneable Functions. Financial Cryptography 2005: 141-155 - 2004
- [c1]Pim Tuyls, Boris Skoric, S. Stallinga, Ton H. Akkermans, W. Ophey:
An information theoretic model for physical uncloneable functions. ISIT 2004: 141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-03 19:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint