Volgen
Petr Dzurenda
Petr Dzurenda
Brno University of Technology
Geverifieerd e-mailadres voor vut.cz
Titel
Geciteerd door
Geciteerd door
Jaar
Optimized blockchain model for internet of things based healthcare applications
AD Dwivedi, L Malina, P Dzurenda, G Srivastava
2019 42nd international conference on telecommunications and signal …, 2019
1192019
A secure publish/subscribe protocol for internet of things
L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak
Proceedings of the 14th international conference on availability …, 2019
932019
Profiling power analysis attack based on MLP in DPA contest V4. 2
Z Martinasek, P Dzurenda, L Malina
2016 39th International Conference on Telecommunications and Signal …, 2016
552016
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
492021
Implementing crystals-dilithium signature scheme on fpgas
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
482021
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
Network and System Security: 13th International Conference, NSS 2019 …, 2019
402019
On feasibility of post-quantum cryptography on small devices
L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek
IFAC-PapersOnLine 51 (6), 462-467, 2018
372018
Fast keyed-verification anonymous credentials on standard smart cards
J Camenisch, M Drijvers, P Dzurenda, J Hajny
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
332019
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
302018
Privacy-preserving security solution for cloud services
L Malina, J Hajny, P Dzurenda, V Zeman
Journal of applied research and technology 13 (1), 20-31, 2015
282015
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
222017
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
152019
Attribute‐based credentials with cryptographic collusion prevention
J Hajny, P Dzurenda, L Malina
Security and Communication Networks 8 (18), 3836-3846, 2015
152015
Network protection against DDoS attacks
P Dzurenda, Z Martinasek, L Malina
International Journal of Advances in Telecommunications, Electrotechnics …, 2015
152015
Privacy-pac: Privacy-enhanced physical access control
J Hajny, P Dzurenda, L Malina
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014
122014
Multi-Device Authentication using Wearables and IoT.
J Hajny, P Dzurenda, L Malina
SECRYPT, 483-488, 2016
102016
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L Malina, P Dzurenda, J Hajny, Z Martinasek
Computers & Security 77, 500-513, 2018
92018
Assessment of cryptography support and security on programmable smart cards
L Malina, P Dzurenda, J Hajny, Z Martinasek
2018 41st International Conference on Telecommunications and Signal …, 2018
92018
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba
2018 10th International Congress on Ultra Modern Telecommunications and …, 2018
82018
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th International Conference on Availability …, 2021
72021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20