BibTeX records: Henk D. L. Hollmann

download as .bib file

@inproceedings{DBLP:conf/isit/HollmannRHTG18,
  author    = {Henk D. L. Hollmann and
               Ronald Rietman and
               Sebastiaan de Hoogh and
               Ludo Tolhuizen and
               Paul Gorissen},
  title     = {A Multi-layer Recursive Residue Number System},
  booktitle = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
               2018, Vail, CO, USA, June 17-22, 2018},
  pages     = {1460--1464},
  year      = {2018},
  crossref  = {DBLP:conf/isit/2018},
  url       = {https://doi.org/10.1109/ISIT.2018.8437612},
  doi       = {10.1109/ISIT.2018.8437612},
  timestamp = {Tue, 21 Aug 2018 13:02:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/HollmannRHTG18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07561,
  author    = {Henk D. L. Hollmann and
               Ronald Rietman and
               Sebastiaan de Hoogh and
               Ludo M. G. M. Tolhuizen and
               Paul Gorissen},
  title     = {A Multi-layer Recursive Residue Number System},
  journal   = {CoRR},
  volume    = {abs/1801.07561},
  year      = {2018},
  url       = {http://arxiv.org/abs/1801.07561},
  archivePrefix = {arXiv},
  eprint    = {1801.07561},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1801-07561},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TangYLH15,
  author    = {Xiaohu Tang and
               Bin Yang and
               Jie Li and
               Henk D. L. Hollmann},
  title     = {A New Repair Strategy for the Hadamard Minimum Storage Regenerating
               Codes for Distributed Storage Systems},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {61},
  number    = {10},
  pages     = {5271--5279},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIT.2015.2461623},
  doi       = {10.1109/TIT.2015.2461623},
  timestamp = {Thu, 18 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/TangYLH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Hollmann14,
  author    = {Henk D. L. Hollmann},
  title     = {On the minimum storage overhead of distributed storage codes with
               a given repair locality},
  booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
               HI, USA, June 29 - July 4, 2014},
  pages     = {1041--1045},
  year      = {2014},
  crossref  = {DBLP:conf/isit/2014},
  url       = {https://doi.org/10.1109/ISIT.2014.6874991},
  doi       = {10.1109/ISIT.2014.6874991},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/Hollmann14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/Hollmann13,
  author    = {Henk D. L. Hollmann},
  title     = {Storage codes - Coding rate and repair locality},
  booktitle = {International Conference on Computing, Networking and Communications,
               {ICNC} 2013, San Diego, CA, USA, January 28-31, 2013},
  pages     = {830--834},
  year      = {2013},
  crossref  = {DBLP:conf/iccnc/2013},
  url       = {https://doi.org/10.1109/ICCNC.2013.6504196},
  doi       = {10.1109/ICCNC.2013.6504196},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/Hollmann13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HollmannP13,
  author    = {Henk D. L. Hollmann and
               Wencin Poh},
  title     = {Characterizations and construction methods for linear functional-repair
               storage codes},
  booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information
               Theory, Istanbul, Turkey, July 7-12, 2013},
  pages     = {336--340},
  year      = {2013},
  crossref  = {DBLP:conf/isit/2013},
  url       = {https://doi.org/10.1109/ISIT.2013.6620243},
  doi       = {10.1109/ISIT.2013.6620243},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/HollmannP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Pamies-JuarezHO13,
  author    = {Lluis Pamies{-}Juarez and
               Henk D. L. Hollmann and
               Fr{\'{e}}d{\'{e}}rique E. Oggier},
  title     = {Locally repairable codes with multiple repair alternatives},
  booktitle = {Proceedings of the 2013 {IEEE} International Symposium on Information
               Theory, Istanbul, Turkey, July 7-12, 2013},
  pages     = {892--896},
  year      = {2013},
  crossref  = {DBLP:conf/isit/2013},
  url       = {https://doi.org/10.1109/ISIT.2013.6620355},
  doi       = {10.1109/ISIT.2013.6620355},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/Pamies-JuarezHO13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-4300,
  author    = {Henk D. L. Hollmann},
  title     = {Storage codes -- coding rate and repair locality},
  journal   = {CoRR},
  volume    = {abs/1301.4300},
  year      = {2013},
  url       = {http://arxiv.org/abs/1301.4300},
  archivePrefix = {arXiv},
  eprint    = {1301.4300},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1301-4300},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-5518,
  author    = {Lluis Pamies{-}Juarez and
               Henk D. L. Hollmann and
               Fr{\'{e}}d{\'{e}}rique E. Oggier},
  title     = {Locally Repairable Codes with Multiple Repair Alternatives},
  journal   = {CoRR},
  volume    = {abs/1302.5518},
  year      = {2013},
  url       = {http://arxiv.org/abs/1302.5518},
  archivePrefix = {arXiv},
  eprint    = {1302.5518},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1302-5518},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HollmannP13,
  author    = {Henk D. L. Hollmann and
               Wencin Poh},
  title     = {Characterizations and construction methods for linear functional-repair
               storage codes},
  journal   = {CoRR},
  volume    = {abs/1307.5583},
  year      = {2013},
  url       = {http://arxiv.org/abs/1307.5583},
  archivePrefix = {arXiv},
  eprint    = {1307.5583},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/HollmannP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HellesethHKWX09,
  author    = {Tor Helleseth and
               Henk D. L. Hollmann and
               Alexander Kholosha and
               Zeying Wang and
               Qing Xiang},
  title     = {Proofs of two conjectures on ternary weakly regular bent functions},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {55},
  number    = {11},
  pages     = {5272--5283},
  year      = {2009},
  url       = {https://doi.org/10.1109/TIT.2009.2030465},
  doi       = {10.1109/TIT.2009.2030465},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/HellesethHKWX09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/CaoHX08,
  author    = {Xiwang Cao and
               Henk D. L. Hollmann and
               Qing Xiang},
  title     = {New Kloosterman sum identities and equalities over finite fields},
  journal   = {Finite Fields and Their Applications},
  volume    = {14},
  number    = {3},
  pages     = {823--833},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.ffa.2008.02.002},
  doi       = {10.1016/j.ffa.2008.02.002},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ffa/CaoHX08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HollmannT08,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {Minimum-redundancy codes for correcting a single (wrap-around) burst
               of erasures},
  booktitle = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
               2008, Toronto, ON, Canada, July 6-11, 2008},
  pages     = {1050--1052},
  year      = {2008},
  crossref  = {DBLP:conf/isit/2008},
  url       = {https://doi.org/10.1109/ISIT.2008.4595147},
  doi       = {10.1109/ISIT.2008.4595147},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/HollmannT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MichielsGH08,
  author    = {Wil Michiels and
               Paul Gorissen and
               Henk D. L. Hollmann},
  title     = {Cryptanalysis of a Generic Class of White-Box Implementations},
  booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  pages     = {414--428},
  year      = {2008},
  crossref  = {DBLP:conf/sacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-642-04159-4\_27},
  doi       = {10.1007/978-3-642-04159-4\_27},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/MichielsGH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0807-0595,
  author    = {Henk D. L. Hollmann},
  title     = {Nonstandard linear recurring sequence subgroups in finite fields and
               automorphisms of cyclic codes},
  journal   = {CoRR},
  volume    = {abs/0807.0595},
  year      = {2008},
  url       = {http://arxiv.org/abs/0807.0595},
  archivePrefix = {arXiv},
  eprint    = {0807.0595},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0807-0595},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MichielsGH08,
  author    = {Wil Michiels and
               Paul Gorissen and
               Henk D. L. Hollmann},
  title     = {Cryptanalysis of White-Box Implementations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {105},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/105},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MichielsGH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HollmannT07,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {On Parity-Check Collections for Iterative Erasure Decoding That Correct
               all Correctable Erasure Patterns of a Given Size},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {53},
  number    = {2},
  pages     = {823--828},
  year      = {2007},
  url       = {https://doi.org/10.1109/TIT.2006.888996},
  doi       = {10.1109/TIT.2006.888996},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/HollmannT07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0712-2182,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {Optimal codes for correcting a single (wrap-around) burst of errors},
  journal   = {CoRR},
  volume    = {abs/0712.2182},
  year      = {2007},
  url       = {http://arxiv.org/abs/0712.2182},
  archivePrefix = {arXiv},
  eprint    = {0712.2182},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0712-2182},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HollmannX06,
  author    = {Henk D. L. Hollmann and
               Qing Xiang},
  title     = {Pseudocyclic association schemes arising from the actions of PGL(2,
               2\({}^{\mbox{\emph{m}}}\)) and PGammaL(2, 2\({}^{\mbox{\emph{m}}}\))},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {113},
  number    = {6},
  pages     = {1008--1018},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcta.2005.09.004},
  doi       = {10.1016/j.jcta.2005.09.004},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/HollmannX06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/AschBHKT06,
  author    = {Bram Van Asch and
               Aart Blokhuis and
               Henk D. L. Hollmann and
               William M. Kantor and
               Henk C. A. van Tilborg},
  title     = {Jack van Lint {(1932-2004):} {A} survey of his scientific work},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {113},
  number    = {8},
  pages     = {1594--1613},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcta.2006.03.007},
  doi       = {10.1016/j.jcta.2006.03.007},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/AschBHKT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HollmannT06,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {Generic erasure correcting sets: Bounds and constructions},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {113},
  number    = {8},
  pages     = {1746--1759},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.jcta.2006.03.024},
  doi       = {10.1016/j.jcta.2006.03.024},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/HollmannT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0606026,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {Generating parity check equations for bounded-distance iterative erasure
               decoding},
  journal   = {CoRR},
  volume    = {abs/cs/0606026},
  year      = {2006},
  url       = {http://arxiv.org/abs/cs/0606026},
  archivePrefix = {arXiv},
  eprint    = {cs/0606026},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0606026},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TuylsHLT05,
  author    = {Pim Tuyls and
               Henk D. L. Hollmann and
               Jack H. van Lint and
               Ludo M. G. M. Tolhuizen},
  title     = {XOR-based Visual Cryptography Schemes},
  journal   = {Des. Codes Cryptography},
  volume    = {37},
  number    = {1},
  pages     = {169--186},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10623-004-3816-4},
  doi       = {10.1007/s10623-004-3816-4},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/TuylsHLT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/HollmannMV05,
  author    = {Henk D. L. Hollmann and
               Erik Jan Marinissen and
               Bart Vermeulen},
  title     = {Optimal Interconnect {ATPG} Under a Ground-Bounce Constraint},
  journal   = {J. Electronic Testing},
  volume    = {21},
  number    = {1},
  pages     = {17--31},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10836-005-5284-9},
  doi       = {10.1007/s10836-005-5284-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/et/HollmannMV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/HollmannX05,
  author    = {Henk D. L. Hollmann and
               Qing Xiang},
  title     = {A class of permutation polynomials of F\({}_{\mbox{2\({}^{\mbox{m}}\)}}\)
               related to Dickson polynomials},
  journal   = {Finite Fields and Their Applications},
  volume    = {11},
  number    = {1},
  pages     = {111--122},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.ffa.2004.06.005},
  doi       = {10.1016/j.ffa.2004.06.005},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ffa/HollmannX05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0507068,
  author    = {Henk D. L. Hollmann and
               Ludo M. G. M. Tolhuizen},
  title     = {On parity check collections for iterative erasure decoding that correct
               all correctable erasure patterns of a given size},
  journal   = {CoRR},
  volume    = {abs/cs/0507068},
  year      = {2005},
  url       = {http://arxiv.org/abs/cs/0507068},
  archivePrefix = {arXiv},
  eprint    = {cs/0507068},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0507068},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/HollmannX04,
  author    = {Henk D. L. Hollmann and
               Qing Xiang},
  title     = {Kloosterman sum identities over F\({}_{\mbox{2}}\)\emph{m}},
  journal   = {Discrete Mathematics},
  volume    = {279},
  number    = {1-3},
  pages     = {277--286},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0012-365X(03)00275-9},
  doi       = {10.1016/S0012-365X(03)00275-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dm/HollmannX04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/MarinissenVHB03,
  author    = {Erik Jan Marinissen and
               Bart Vermeulen and
               Henk D. L. Hollmann and
               Ben Bennetts},
  title     = {Minimizing Pattern Count for Interconnect Test under a Ground Bounce
               Constraint},
  journal   = {{IEEE} Design {\&} Test of Computers},
  volume    = {20},
  number    = {2},
  pages     = {8--18},
  year      = {2003},
  url       = {https://doi.org/10.1109/MDT.2003.1188257},
  doi       = {10.1109/MDT.2003.1188257},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dt/MarinissenVHB03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CaiTH03,
  author    = {Ning Cai and
               Ludo M. G. M. Tolhuizen and
               Henk D. L. Hollmann},
  title     = {Common coordinates in consecutive addresses},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {49},
  number    = {12},
  pages     = {3308--3312},
  year      = {2003},
  url       = {https://doi.org/10.1109/TIT.2003.820034},
  doi       = {10.1109/TIT.2003.820034},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/CaiTH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/HollmannMV03,
  author    = {Henk D. L. Hollmann and
               Erik Jan Marinissen and
               Bart Vermeulen},
  title     = {Optimal Interconnect {ATPG} Under a Ground-Bounce Constraint},
  booktitle = {Proceedings 2003 International Test Conference {(ITC} 2003), Breaking
               Test Interface Bottlenecks, 28 September - 3 October 2003, Charlotte,
               NC, {USA}},
  pages     = {369--378},
  year      = {2003},
  crossref  = {DBLP:conf/itc/2003},
  url       = {https://doi.org/10.1109/TEST.2003.1270860},
  doi       = {10.1109/TEST.2003.1270860},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itc/HollmannMV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejc/EbertEHX02,
  author    = {Gary L. Ebert and
               Sebastian Egner and
               Henk D. L. Hollmann and
               Qing Xiang},
  title     = {Proof of a Conjecture of De Caen and Van Dam},
  journal   = {Eur. J. Comb.},
  volume    = {23},
  number    = {2},
  pages     = {201--206},
  year      = {2002},
  url       = {https://doi.org/10.1006/eujc.2001.0523},
  doi       = {10.1006/eujc.2001.0523},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejc/EbertEHX02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuylsHLT02,
  author    = {Pim Tuyls and
               Henk D. L. Hollmann and
               Jacobus H. van Lint and
               Ludo M. G. M. Tolhuizen},
  title     = {A polarisation based Visual Crypto System and its Secret Sharing Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {194},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/194},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TuylsHLT02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HollmannLTT02,
  author    = {Henk D. L. Hollmann and
               Jacobus H. van Lint and
               Ludo M. G. M. Tolhuizen and
               Pim Tuyls},
  title     = {An addition to the paper: {A} polarisation based visual crypto system
               and its secret sharing schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {195},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/195},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HollmannLTT02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HollmannX01,
  author    = {Henk D. L. Hollmann and
               Qing Xiang},
  title     = {Maximal Arcs in Projective Three-Spaces and Double-Error-Correcting
               Cyclic Codes},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {93},
  number    = {1},
  pages     = {168--172},
  year      = {2001},
  url       = {https://doi.org/10.1006/jcta.2000.3064},
  doi       = {10.1006/jcta.2000.3064},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/HollmannX01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/EbertEHX01,
  author    = {Gary L. Ebert and
               Sebastian Egner and
               Henk D. L. Hollmann and
               Qing Xiang},
  title     = {A Four-Class Association Scheme},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {96},
  number    = {1},
  pages     = {180--191},
  year      = {2001},
  url       = {https://doi.org/10.1006/jcta.2001.3183},
  doi       = {10.1006/jcta.2001.3183},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/EbertEHX01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/KuijperDHO01,
  author    = {Margreta Kuijper and
               Marten van Dijk and
               Henk D. L. Hollmann and
               Job Oostveen},
  title     = {A Unifying System-Theoretic Framework for Errors-and-Erasures Reed-Solomon
               Decoding},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               14th International Symposium, AAECC-14, Melbourne, Australia November
               26-30, 2001, Proceedings},
  pages     = {343--352},
  year      = {2001},
  crossref  = {DBLP:conf/aaecc/2001},
  url       = {https://doi.org/10.1007/3-540-45624-4\_36},
  doi       = {10.1007/3-540-45624-4\_36},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaecc/KuijperDHO01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/EvansHKX99,
  author    = {Ronald Evans and
               Henk D. L. Hollmann and
               Christian Krattenthaler and
               Qing Xiang},
  title     = {Gauss Sums, Jacobi Sums, and p-Ranks of Cyclic Difference Sets},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {87},
  number    = {1},
  pages     = {74--119},
  year      = {1999},
  url       = {https://doi.org/10.1006/jcta.1998.2950},
  doi       = {10.1006/jcta.1998.2950},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/EvansHKX99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itc/BiewengaHJL99,
  author    = {Alex S. Biewenga and
               Henk D. L. Hollmann and
               Frans de Jong and
               Maurice Lousberg},
  title     = {Static component interconnect test technology {(SCITT)} a new technology
               for assembly testing},
  booktitle = {Proceedings {IEEE} International Test Conference 1999, Atlantic City,
               NJ, USA, 27-30 September 1999},
  pages     = {439--448},
  year      = {1999},
  crossref  = {DBLP:conf/itc/1999},
  url       = {https://doi.org/10.1109/TEST.1999.805766},
  doi       = {10.1109/TEST.1999.805766},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itc/BiewengaHJL99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HollmannLLT98,
  author    = {Henk D. L. Hollmann and
               Jack H. van Lint and
               Jean{-}Paul M. G. Linnartz and
               Ludo M. G. M. Tolhuizen},
  title     = {On Codes with the Identifiable Parent Property},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {82},
  number    = {2},
  pages     = {121--133},
  year      = {1998},
  url       = {https://doi.org/10.1006/jcta.1997.2851},
  doi       = {10.1006/jcta.1997.2851},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/HollmannLLT98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HollmannL97,
  author    = {Henk D. L. Hollmann and
               Jacobus H. van Lint},
  title     = {Universal Sequences},
  journal   = {Appl. Algebra Eng. Commun. Comput.},
  volume    = {8},
  number    = {5},
  pages     = {347--352},
  year      = {1997},
  url       = {https://doi.org/10.1007/s002000050071},
  doi       = {10.1007/s002000050071},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/aaecc/HollmannL97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HollmannLLBT97,
  author    = {Henk D. L. Hollmann and
               Jean{-}Paul M. G. Linnartz and
               Jacobus H. van Lint and
               Constant P. M. J. Baggen and
               Ludo M. G. M. Tolhuizen},
  title     = {Protection of software algorithms executed on secure modules},
  journal   = {Future Generation Comp. Syst.},
  volume    = {13},
  number    = {1},
  pages     = {55--63},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0167-739X(97)89111-X},
  doi       = {10.1016/S0167-739X(97)89111-X},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/HollmannLLBT97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/HollmannKL97,
  author    = {Henk D. L. Hollmann and
               J{\'{a}}nos K{\"{o}}rner and
               Simon Litsyn},
  title     = {Tiling Hamming Space with Few Spheres},
  journal   = {J. Comb. Theory, Ser. {A}},
  volume    = {80},
  number    = {2},
  pages     = {388--393},
  year      = {1997},
  url       = {https://doi.org/10.1006/jcta.1997.2816},
  doi       = {10.1006/jcta.1997.2816},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jct/HollmannKL97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/BergmansHV97,
  author    = {Jan W. M. Bergmans and
               Henk D. L. Hollmann and
               Johannes O. Voorman},
  title     = {Antiwhistle codes},
  journal   = {{IEEE} Trans. Communications},
  volume    = {45},
  number    = {8},
  pages     = {893--896},
  year      = {1997},
  url       = {https://doi.org/10.1109/26.618283},
  doi       = {10.1109/26.618283},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcom/BergmansHV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann97,
  author    = {Henk D. L. Hollmann},
  title     = {On an approximate eigenvector associated with a modulation code},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {43},
  number    = {5},
  pages     = {1672--1678},
  year      = {1997},
  url       = {https://doi.org/10.1109/18.623173},
  doi       = {10.1109/18.623173},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann96,
  author    = {Henk D. L. Hollmann},
  title     = {Bounded-delay-encodable, block-decodable codes for constrained systems},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {42},
  number    = {6},
  pages     = {1957--1970},
  year      = {1996},
  url       = {https://doi.org/10.1109/18.556687},
  doi       = {10.1109/18.556687},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/HollmannLLB96,
  author    = {Henk D. L. Hollmann and
               Jean{-}Paul M. G. Linnartz and
               Jacobus H. van Lint and
               C. P. M. J. Baggen},
  title     = {Protection of Software Algorithms Executed on Secure Microprocessors},
  booktitle = {Proceedings of the Second Smart Card Research and Advanced Application
               Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
               The Netherlands},
  year      = {1996},
  crossref  = {DBLP:conf/cardis/1996},
  timestamp = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/HollmannLLB96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann95,
  author    = {Henk D. L. Hollmann},
  title     = {On the construction of bounded-delay encodable codes for constrained
               systems},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {41},
  number    = {5},
  pages     = {1354--1378},
  year      = {1995},
  url       = {https://doi.org/10.1109/18.412682},
  doi       = {10.1109/18.412682},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TolhuizenIH95,
  author    = {Ludo M. G. M. Tolhuizen and
               Kees A. Schouhamer Immink and
               Henk D. L. Hollmann},
  title     = {Constructions and properties of block codes for partial-response channels},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {41},
  number    = {6},
  pages     = {2019--2026},
  year      = {1995},
  url       = {https://doi.org/10.1109/18.476329},
  doi       = {10.1109/18.476329},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/TolhuizenIH95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/TolhuizenHK95,
  author    = {Ludo M. G. M. Tolhuizen and
               Henk D. L. Hollmann and
               Antonius A. C. M. Kalker},
  title     = {On the realizability of biorthogonal, m-dimensional two-band filter
               banks},
  journal   = {{IEEE} Trans. Signal Processing},
  volume    = {43},
  number    = {3},
  pages     = {640--648},
  year      = {1995},
  url       = {https://doi.org/10.1109/78.370619},
  doi       = {10.1109/78.370619},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsp/TolhuizenHK95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann94,
  author    = {Henk D. L. Hollmann},
  title     = {A block-decodable (1, 8) runlength-limited rate 8/12 code},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {40},
  number    = {4},
  pages     = {1292--1296},
  year      = {1994},
  url       = {https://doi.org/10.1109/18.335934},
  doi       = {10.1109/18.335934},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann93,
  author    = {Henk D. L. Hollmann},
  title     = {A relation between Levenshtein-type distances and insertion-and-deletion
               correcting capabilities of codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {39},
  number    = {4},
  pages     = {1424--1427},
  year      = {1993},
  url       = {https://doi.org/10.1109/18.243463},
  doi       = {10.1109/18.243463},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/HollmannL92,
  author    = {Henk D. L. Hollmann and
               Jacobus H. van Lint},
  title     = {Nonblocking Self-Routing Switching Networks},
  journal   = {Discrete Applied Mathematics},
  volume    = {37/38},
  pages     = {319--340},
  year      = {1992},
  url       = {https://doi.org/10.1016/0166-218X(92)90142-W},
  doi       = {10.1016/0166-218X(92)90142-W},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dam/HollmannL92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ImminkH92,
  author    = {Kees A. Schouhamer Immink and
               Henk D. L. Hollmann},
  title     = {Prefix-Synchronized Run-Length-Limited Sequences},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {10},
  number    = {1},
  pages     = {214--222},
  year      = {1992},
  url       = {https://doi.org/10.1109/49.124480},
  doi       = {10.1109/49.124480},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/ImminkH92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamrev/Hollmann91,
  author    = {Henk D. L. Hollmann},
  title     = {Elements of Maximum Order in a Matrix Group (Lih-Yuan Deng)},
  journal   = {{SIAM} Review},
  volume    = {33},
  number    = {3},
  pages     = {479--481},
  year      = {1991},
  url       = {https://doi.org/10.1137/1033110},
  doi       = {10.1137/1033110},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/siamrev/Hollmann91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann91,
  author    = {Henk D. L. Hollmann},
  title     = {The general solution of write equalization for {RLL} (d, k) codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {37},
  number    = {3},
  pages     = {856--862},
  year      = {1991},
  url       = {https://doi.org/10.1109/18.79952},
  doi       = {10.1109/18.79952},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HollmannI91,
  author    = {Henk D. L. Hollmann and
               Kees A. Schouhamer Immink},
  title     = {Schouhamer Immink. Performance of efficient balanced codes},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {37},
  number    = {3},
  pages     = {913--918},
  year      = {1991},
  url       = {https://doi.org/10.1109/18.79961},
  doi       = {10.1109/18.79961},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/HollmannI91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Hollmann90,
  author    = {Henk D. L. Hollmann},
  title     = {Design of test sequences for {VLSI} self-testing using {LFSR}},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {36},
  number    = {2},
  pages     = {386--392},
  year      = {1990},
  url       = {https://doi.org/10.1109/18.52485},
  doi       = {10.1109/18.52485},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/Hollmann90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/Hollmann84,
  author    = {Henk D. L. Hollmann},
  title     = {Pseudocyclic 3-class association schemes on 28 points},
  journal   = {Discrete Mathematics},
  volume    = {52},
  number    = {2-3},
  pages     = {209--224},
  year      = {1984},
  url       = {https://doi.org/10.1016/0012-365X(84)90082-7},
  doi       = {10.1016/0012-365X(84)90082-7},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dm/Hollmann84},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2018,
  title     = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
               2018, Vail, CO, USA, June 17-22, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8410646},
  isbn      = {978-1-5386-4781-3},
  timestamp = {Tue, 21 Aug 2018 13:02:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2014,
  title     = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
               HI, USA, June 29 - July 4, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6867217},
  isbn      = {978-1-4799-5186-4},
  timestamp = {Thu, 15 Jan 2015 17:11:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccnc/2013,
  title     = {International Conference on Computing, Networking and Communications,
               {ICNC} 2013, San Diego, CA, USA, January 28-31, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6495637},
  isbn      = {978-1-4673-5287-1},
  timestamp = {Tue, 21 Apr 2015 17:24:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2013,
  title     = {Proceedings of the 2013 {IEEE} International Symposium on Information
               Theory, Istanbul, Turkey, July 7-12, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6597029},
  isbn      = {978-1-4799-0446-4},
  timestamp = {Thu, 15 Jan 2015 17:11:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isit/2008,
  editor    = {Frank R. Kschischang and
               En{-}Hui Yang},
  title     = {2008 {IEEE} International Symposium on Information Theory, {ISIT}
               2008, Toronto, ON, Canada, July 6-11, 2008},
  publisher = {{IEEE}},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4586217},
  isbn      = {978-1-4244-2256-2},
  timestamp = {Wed, 18 Apr 2012 08:49:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isit/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2008,
  editor    = {Roberto Maria Avanzi and
               Liam Keliher and
               Francesco Sica},
  title     = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5381},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04159-4},
  doi       = {10.1007/978-3-642-04159-4},
  isbn      = {978-3-642-04158-7},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itc/2003,
  title     = {Proceedings 2003 International Test Conference {(ITC} 2003), Breaking
               Test Interface Bottlenecks, 28 September - 3 October 2003, Charlotte,
               NC, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8970},
  isbn      = {0-7803-8106-8},
  timestamp = {Wed, 26 Aug 2015 09:28:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aaecc/2001,
  editor    = {Serdar Boztas and
               Igor E. Shparlinski},
  title     = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
               14th International Symposium, AAECC-14, Melbourne, Australia November
               26-30, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2227},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45624-4},
  doi       = {10.1007/3-540-45624-4},
  isbn      = {3-540-42911-5},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaecc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itc/1999,
  title     = {Proceedings {IEEE} International Test Conference 1999, Atlantic City,
               NJ, USA, 27-30 September 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6540},
  isbn      = {0-7803-5753-1},
  timestamp = {Wed, 26 Aug 2015 09:28:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cardis/1996,
  title     = {Proceedings of the Second Smart Card Research and Advanced Application
               Conference, {CARDIS} 1996, September 18-20, 1996, CWI, Amsterdam,
               The Netherlands},
  year      = {1996},
  timestamp = {Fri, 15 Oct 2004 16:01:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cardis/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier