Optimized blockchain model for internet of things based healthcare applications AD Dwivedi, L Malina, P Dzurenda, G Srivastava 2019 42nd international conference on telecommunications and signal …, 2019 | 135 | 2019 |
A secure publish/subscribe protocol for internet of things L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak Proceedings of the 14th international conference on availability …, 2019 | 99 | 2019 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 62 | 2021 |
Implementing crystals-dilithium signature scheme on fpgas S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ... Proceedings of the 16th International Conference on Availability …, 2021 | 58 | 2021 |
Profiling power analysis attack based on MLP in DPA contest V4. 2 Z Martinasek, P Dzurenda, L Malina 2016 39th International Conference on Telecommunications and Signal …, 2016 | 57 | 2016 |
A privacy-enhancing framework for internet of things services L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 46 | 2019 |
On feasibility of post-quantum cryptography on small devices L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek IFAC-PapersOnLine 51 (6), 462-467, 2018 | 41 | 2018 |
Fast keyed-verification anonymous credentials on standard smart cards J Camenisch, M Drijvers, P Dzurenda, J Hajny ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 35 | 2019 |
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. L Malina, J Hajny, P Dzurenda, S Ricci ICETE (2), 692-697, 2018 | 34 | 2018 |
Privacy-preserving security solution for cloud services L Malina, J Hajny, P Dzurenda, V Zeman Journal of applied research and technology 13 (1), 20-31, 2015 | 31 | 2015 |
Performance analysis and comparison of different elliptic curves on smart cards P Dzurenda, S Ricci, J Hajny, L Malina 2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017 | 23 | 2017 |
Attribute‐based credentials with cryptographic collusion prevention J Hajny, P Dzurenda, L Malina Security and Communication Networks 8 (18), 3836-3846, 2015 | 18 | 2015 |
Network protection against DDoS attacks P Dzurenda, Z Martinasek, L Malina International Journal of Advances in Telecommunications, Electrotechnics …, 2015 | 18 | 2015 |
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich International Conference on Information Technology and Communications …, 2019 | 16 | 2019 |
Privacy-pac: Privacy-enhanced physical access control J Hajny, P Dzurenda, L Malina Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014 | 13 | 2014 |
Secure and efficient two-factor zero-knowledge authentication solution for access control systems L Malina, P Dzurenda, J Hajny, Z Martinasek Computers & Security 77, 500-513, 2018 | 12 | 2018 |
Secret sharing-based authenticated key agreement protocol P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika Proceedings of the 16th International Conference on Availability …, 2021 | 10 | 2021 |
Assessment of cryptography support and security on programmable smart cards L Malina, P Dzurenda, J Hajny, Z Martinasek 2018 41st International Conference on Telecommunications and Signal …, 2018 | 10 | 2018 |
Multi-Device Authentication using Wearables and IoT. J Hajny, P Dzurenda, L Malina SECRYPT, 483-488, 2016 | 10 | 2016 |
Performance analysis of pairing-based elliptic curve cryptography on constrained devices J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba 2018 10th International Congress on Ultra Modern Telecommunications and …, 2018 | 9 | 2018 |