关注
Petr Dzurenda
Petr Dzurenda
Brno University of Technology
在 vut.cz 的电子邮件经过验证
标题
引用次数
引用次数
年份
Optimized blockchain model for internet of things based healthcare applications
AD Dwivedi, L Malina, P Dzurenda, G Srivastava
2019 42nd international conference on telecommunications and signal …, 2019
1352019
A secure publish/subscribe protocol for internet of things
L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak
Proceedings of the 14th international conference on availability …, 2019
992019
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
622021
Implementing crystals-dilithium signature scheme on fpgas
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
582021
Profiling power analysis attack based on MLP in DPA contest V4. 2
Z Martinasek, P Dzurenda, L Malina
2016 39th International Conference on Telecommunications and Signal …, 2016
572016
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
Network and System Security: 13th International Conference, NSS 2019 …, 2019
462019
On feasibility of post-quantum cryptography on small devices
L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek
IFAC-PapersOnLine 51 (6), 462-467, 2018
412018
Fast keyed-verification anonymous credentials on standard smart cards
J Camenisch, M Drijvers, P Dzurenda, J Hajny
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
352019
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
342018
Privacy-preserving security solution for cloud services
L Malina, J Hajny, P Dzurenda, V Zeman
Journal of applied research and technology 13 (1), 20-31, 2015
312015
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
232017
Attribute‐based credentials with cryptographic collusion prevention
J Hajny, P Dzurenda, L Malina
Security and Communication Networks 8 (18), 3836-3846, 2015
182015
Network protection against DDoS attacks
P Dzurenda, Z Martinasek, L Malina
International Journal of Advances in Telecommunications, Electrotechnics …, 2015
182015
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
162019
Privacy-pac: Privacy-enhanced physical access control
J Hajny, P Dzurenda, L Malina
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014
132014
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L Malina, P Dzurenda, J Hajny, Z Martinasek
Computers & Security 77, 500-513, 2018
122018
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th International Conference on Availability …, 2021
102021
Assessment of cryptography support and security on programmable smart cards
L Malina, P Dzurenda, J Hajny, Z Martinasek
2018 41st International Conference on Telecommunications and Signal …, 2018
102018
Multi-Device Authentication using Wearables and IoT.
J Hajny, P Dzurenda, L Malina
SECRYPT, 483-488, 2016
102016
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba
2018 10th International Congress on Ultra Modern Telecommunications and …, 2018
92018
系统目前无法执行此操作,请稍后再试。
文章 1–20