On perspective of security and privacy-preserving solutions in the internet of things L Malina, J Hajny, R Fujdiak, J Hosek Computer Networks 102, 83-95, 2016 | 192 | 2016 |
Optimization of power analysis using neural network Z Martinasek, J Hajny, L Malina Smart Card Research and Advanced Applications: 12th International Conference …, 2014 | 109 | 2014 |
A secure publish/subscribe protocol for internet of things L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak Proceedings of the 14th international conference on availability …, 2019 | 106 | 2019 |
Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices A Ometov, P Masek, L Malina, R Florea, J Hosek, S Andreev, J Hajny, ... 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 80 | 2016 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 74 | 2021 |
Unlinkable attribute-based credentials with practical revocation on smart-cards J Hajny, L Malina Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 70 | 2013 |
Implementing crystals-dilithium signature scheme on fpgas S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ... Proceedings of the 16th International Conference on Availability …, 2021 | 63 | 2021 |
Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs J Camenisch, M Drijvers, J Hajny Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016 | 53 | 2016 |
A privacy-enhancing framework for internet of things services L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 48 | 2019 |
On feasibility of post-quantum cryptography on small devices L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek IFAC-PapersOnLine 51 (6), 462-467, 2018 | 46 | 2018 |
Fast keyed-verification anonymous credentials on standard smart cards J Camenisch, M Drijvers, P Dzurenda, J Hajny ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019 | 41 | 2019 |
Framework, tools and good practices for cybersecurity curricula J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola IEEE Access 9, 94723-94747, 2021 | 40 | 2021 |
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. L Malina, J Hajny, P Dzurenda, S Ricci ICETE (2), 692-697, 2018 | 38 | 2018 |
Privacy-preserving security solution for cloud services L Malina, J Hajny, P Dzurenda, V Zeman Journal of applied research and technology 13 (1), 20-31, 2015 | 32 | 2015 |
Performance evaluation of primitives for privacy-enhancing cryptography on current smart-cards and smart-phones J Hajny, L Malina, Z Martinasek, O Tethal International Workshop on Data Privacy Management, 17-33, 2013 | 32 | 2013 |
Efficient security solution for privacy-preserving cloud services L Malina, J Hajny 2013 36th International Conference on Telecommunications and Signal …, 2013 | 31 | 2013 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny Foundations and Practice of Security: 5th International Symposium, FPS 2012 …, 2013 | 28 | 2013 |
Efficient group signatures for privacy-preserving vehicular networks L Malina, A Vives-Guasch, J Castella-Roca, A Viejo, J Hajny Telecommunication Systems 58, 293-311, 2015 | 25 | 2015 |
Performance analysis and comparison of different elliptic curves on smart cards P Dzurenda, S Ricci, J Hajny, L Malina 2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017 | 24 | 2017 |
Acceleration of aes encryption algorithm using field programmable gate arrays D Smekal, J Frolka, J Hajny IFAC-PapersOnLine 49 (25), 384-389, 2016 | 23 | 2016 |