Reproductive and post‐reproductive life history of wild‐caught Drosophila melanogaster under laboratory conditions P Klepsatel, M Gáliková, N De Maio, S Ricci, C Schlötterer, T Flatt Journal of Evolutionary Biology 26 (7), 1508-1520, 2013 | 78 | 2013 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 74 | 2021 |
Implementing crystals-dilithium signature scheme on fpgas S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ... Proceedings of the 16th International Conference on Availability …, 2021 | 63 | 2021 |
Disclosure risk assessment via record linkage by a maximum-knowledge attacker J Domingo-Ferrer, S Ricci, J Soria-Comas 2015 13th Annual Conference on Privacy, Security and Trust (PST), 28-35, 2015 | 58 | 2015 |
A privacy-enhancing framework for internet of things services L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 48 | 2019 |
Framework, tools and good practices for cybersecurity curricula J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola IEEE Access 9, 94723-94747, 2021 | 40 | 2021 |
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. L Malina, J Hajny, P Dzurenda, S Ricci ICETE (2), 692-697, 2018 | 38 | 2018 |
Performance analysis and comparison of different elliptic curves on smart cards P Dzurenda, S Ricci, J Hajny, L Malina 2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017 | 24 | 2017 |
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich International Conference on Information Technology and Communications …, 2019 | 16 | 2019 |
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds J Domingo-Ferrer, S Ricci, C Domingo-Enrich Information Sciences 436, 320-342, 2018 | 16 | 2018 |
PESTLE analysis of cybersecurity education S Ricci, V Janout, S Parker, J Jerabek, J Hajny, A Chatzopoulou, ... Proceedings of the 16th International Conference on Availability …, 2021 | 14 | 2021 |
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography S Ricci, P Dobias, L Malina, J Hajny, P Jedlicka IEEE Access, 2024 | 13 | 2024 |
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud A Calviño, S Ricci, J Domingo-Ferrer 2015 IEEE Conference on Communications and Network Security (CNS), 506-514, 2015 | 13 | 2015 |
A methodology to compare anonymization methods regarding their risk-utility trade-off J Domingo-Ferrer, S Ricci, J Soria-Comas Modeling Decisions for Artificial Intelligence: 14th International …, 2017 | 12 | 2017 |
Secret sharing-based authenticated key agreement protocol P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika Proceedings of the 16th International Conference on Availability …, 2021 | 11 | 2021 |
Threshold signature for privacy-preserving blockchain S Ricci, P Dzurenda, R Casanova-Marqués, P Cika International Conference on Business Process Management, 100-115, 2022 | 9 | 2022 |
Privacy-preserving data splitting: a combinatorial approach O Farràs, J Ribes-González, S Ricci Designs, Codes and Cryptography 89 (7), 1735-1756, 2021 | 9 | 2021 |
Hardware-accelerated cryptography for software-defined networks with P4 L Malina, D Smekal, S Ricci, J Hajny, P Cíbik, J Hrabovsky International Conference on Information Technology and Communications …, 2020 | 9 | 2020 |
Performance analysis of pairing-based elliptic curve cryptography on constrained devices J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba 2018 10th International Congress on Ultra Modern Telecommunications and …, 2018 | 9 | 2018 |
Cybersecurity curricula designer J Hajny, S Ricci, E Piesarskas, M Sikora Proceedings of the 16th International Conference on Availability …, 2021 | 8 | 2021 |