Follow
Sara Ricci
Sara Ricci
Verified email at vutbr.cz - Homepage
Title
Cited by
Cited by
Year
Reproductive and post‐reproductive life history of wild‐caught Drosophila melanogaster under laboratory conditions
P Klepsatel, M Gáliková, N De Maio, S Ricci, C Schlötterer, T Flatt
Journal of Evolutionary Biology 26 (7), 1508-1520, 2013
742013
Disclosure risk assessment via record linkage by a maximum-knowledge attacker
J Domingo-Ferrer, S Ricci, J Soria-Comas
2015 13th Annual Conference on Privacy, Security and Trust (PST), 28-35, 2015
582015
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
512021
Implementing crystals-dilithium signature scheme on fpgas
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
492021
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
Network and System Security: 13th International Conference, NSS 2019 …, 2019
402019
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
302018
Framework, tools and good practices for cybersecurity curricula
J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola
IEEE Access 9, 94723-94747, 2021
222021
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
222017
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
152019
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
J Domingo-Ferrer, S Ricci, C Domingo-Enrich
Information Sciences 436, 320-342, 2018
152018
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud
A Calviño, S Ricci, J Domingo-Ferrer
2015 IEEE Conference on Communications and Network Security (CNS), 506-514, 2015
132015
A methodology to compare anonymization methods regarding their risk-utility trade-off
J Domingo-Ferrer, S Ricci, J Soria-Comas
Modeling Decisions for Artificial Intelligence: 14th International …, 2017
92017
Hardware-accelerated cryptography for software-defined networks with P4
L Malina, D Smekal, S Ricci, J Hajny, P Cíbik, J Hrabovsky
International Conference on Information Technology and Communications …, 2020
82020
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba
2018 10th International Congress on Ultra Modern Telecommunications and …, 2018
82018
Privacy-preserving cloud-based statistical analyses on sensitive categorical data
S Ricci, J Domingo-Ferrer, D Sánchez
Modeling Decisions for Artificial Intelligence: 13th International …, 2016
82016
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th International Conference on Availability …, 2021
72021
PESTLE analysis of cybersecurity education
S Ricci, V Janout, S Parker, J Jerabek, J Hajny, A Chatzopoulou, ...
Proceedings of the 16th International Conference on Availability …, 2021
72021
Cybersecurity curricula designer
J Hajny, S Ricci, E Piesarskas, M Sikora
Proceedings of the 16th International Conference on Availability …, 2021
72021
Privacy-preserving data splitting: a combinatorial approach
O Farràs, J Ribes-González, S Ricci
Designs, Codes and Cryptography 89 (7), 1735-1756, 2021
72021
Local bounds for the optimal information ratio of secret sharing schemes
O Farràs, J Ribes-González, S Ricci
Designs, Codes and Cryptography 87, 1323-1344, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20