On perspective of security and privacy-preserving solutions in the internet of things

L Malina, J Hajny, R Fujdiak, J Hosek - Computer Networks, 2016 - Elsevier
Abstract The Internet of Things (IoT) brings together a large variety of devices of different
platforms, computational capacities and functionalities. The network heterogeneity and the …

Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems

KM Renuka, S Kumari, D Zhao, L Li - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an
efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT …

Optimization of power analysis using neural network

Z Martinasek, J Hajny, L Malina - … 2013, Berlin, Germany, November 27-29 …, 2014 - Springer
In power analysis, many different statistical methods and power consumption models are
used to obtain the value of a secret key from the power traces measured. An interesting …

An Authentication Protocol for the Medical Internet of Things

N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh - Symmetry, 2022 - mdpi.com
The progress in biomedical sensors, Internet of Things technologies, big data, cloud
computing, and artificial intelligence is leading the development of e-health medical …

Performance analysis and comparison of different elliptic curves on smart cards

P Dzurenda, S Ricci, J Hajny… - 2017 15th Annual …, 2017 - ieeexplore.ieee.org
Elliptic curves are very often used in the cryptographic protocol design due to their memory
efficiency and useful features, such as the bilinear pairing support. However, in many …

[PDF][PDF] JCAlgTest: Robust Identification Metadata for Certified Smartcards.

P Svenda, R Kvasnovský, I Nagy, A Dufka - SECRYPT, 2022 - pdfs.semanticscholar.org
The certification of cryptographic smartcards under the Common Criteria or NIST FIPS140-2
is a wellestablished process, during which an evaluation facility validates the manufacturer's …

Attribute‐based credentials with cryptographic collusion prevention

J Hajny, P Dzurenda, L Malina - Security and Communication …, 2015 - Wiley Online Library
Cryptographic attribute‐based credentials (ABCs) allow users to prove their personal
attributes remotely and in a privacy‐friendly way. While staying anonymous and …

Assessment of cryptography support and security on programmable smart cards

L Malina, P Dzurenda, J Hajny… - 2018 41st International …, 2018 - ieeexplore.ieee.org
Nowadays, smart cards are widely used as authentication items in identification systems and
access control systems. Moreover, the smart cards may serve as cryptographic modules and …

Performance analysis of pairing-based elliptic curve cryptography on constrained devices

J Hajny, P Dzurenda, S Ricci… - … Congress on Ultra …, 2018 - ieeexplore.ieee.org
The paper deals with the implementation aspects of the bilinear pairing operation over an
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …

Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices

J Hajny, P Dzurenda, RC Marques… - 2020 12th International …, 2020 - ieeexplore.ieee.org
Cyber security and privacy protection play a crucial role in modern communication systems.
While it is relatively easy to secure classical networks, it is a hard problem to provide even …