Follow
Petr Dzurenda
Petr Dzurenda
Brno University of Technology
Verified email at vut.cz
Title
Cited by
Cited by
Year
Optimized blockchain model for internet of things based healthcare applications
AD Dwivedi, L Malina, P Dzurenda, G Srivastava
2019 42nd international conference on telecommunications and signal …, 2019
1422019
A secure publish/subscribe protocol for internet of things
L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak
Proceedings of the 14th international conference on availability …, 2019
1062019
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
742021
Implementing crystals-dilithium signature scheme on fpgas
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
632021
Profiling power analysis attack based on MLP in DPA contest V4. 2
Z Martinasek, P Dzurenda, L Malina
2016 39th International Conference on Telecommunications and Signal …, 2016
592016
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
Network and System Security: 13th International Conference, NSS 2019 …, 2019
482019
On feasibility of post-quantum cryptography on small devices
L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek
IFAC-PapersOnLine 51 (6), 462-467, 2018
462018
Fast keyed-verification anonymous credentials on standard smart cards
J Camenisch, M Drijvers, P Dzurenda, J Hajny
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
412019
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
382018
Privacy-preserving security solution for cloud services
L Malina, J Hajny, P Dzurenda, V Zeman
Journal of applied research and technology 13 (1), 20-31, 2015
322015
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
242017
Network protection against DDoS attacks
P Dzurenda, Z Martinasek, L Malina
International Journal of Advances in Telecommunications, Electrotechnics …, 2015
192015
Attribute‐based credentials with cryptographic collusion prevention
J Hajny, P Dzurenda, L Malina
Security and Communication Networks 8 (18), 3836-3846, 2015
182015
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
162019
Privacy-pac: Privacy-enhanced physical access control
J Hajny, P Dzurenda, L Malina
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014
132014
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L Malina, P Dzurenda, J Hajny, Z Martinasek
Computers & Security 77, 500-513, 2018
122018
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th International Conference on Availability …, 2021
112021
Assessment of cryptography support and security on programmable smart cards
L Malina, P Dzurenda, J Hajny, Z Martinasek
2018 41st International Conference on Telecommunications and Signal …, 2018
112018
Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
J Hajny, P Dzurenda, RC Marques, L Malina
2020 12th International Congress on Ultra Modern Telecommunications and …, 2020
102020
Multi-Device Authentication using Wearables and IoT.
J Hajny, P Dzurenda, L Malina
SECRYPT, 483-488, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20