Volgen
Vashek Matyas
Vashek Matyas
Geverifieerd e-mailadres voor fi.muni.cz - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A study on the value of location privacy
D Cvrcek, M Kumpost, V Matyas, G Danezis
Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006
2352006
Biometrie a identita člověka ve forenzních a komerčních aplikacích. 1. vyd. Praha: Grada, 2008, 631 s
R RAK, V MATYÁŠ, Z ŘÍHA
ISBN 978-80-247-2365-5, 2008
223*2008
Biometric authentication systems
Z Riha, V Matyas
https://www.fi.muni.cz/reports/files/older/FIMU-RS-2000-08.pdf, 2000
160*2000
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
ACM Conference on Computer and Communications Security, 1631-1648, 2017
1532017
Biometric authentication—security and usability
V Matyáš, Z Říha
Advanced communications and multimedia security, 227-239, 2002
1512002
Toward reliable user authentication through biometrics
V Matyas, Z Riha
IEEE Security & Privacy 1 (3), 45-49, 2003
1232003
Neighbor-based intrusion detection for wireless sensor networks
A Stetsko, L Folkman, V Matyáš
2010 6th International Conference on Wireless and Mobile Communications, 420-425, 2010
932010
On the interpretation of results from the NIST Statistical Test Suite
M SYS, Z RIHA, V MATYAS, K MARTON, A SUCIU
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY 18 (1), 18–32, 2015
79*2015
Security of biometric authentication systems
V Matyáš, Z Říha
2010 International Conference on Computer Information Systems and Industrial …, 2010
532010
Calibrating and comparing simulators for wireless sensor networks
A Stetsko, M Stehlik, V Matyas
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
512011
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016
422016
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Nordic Conference on Secure IT Systems, 179-189, 2009
382009
WSNProtectLayer: Security Middleware for Wireless Sensor Networks
V Matyáš, P Švenda, A Stetsko, D Klinec, F Jurnečka, M Stehlík
Securing Cyber-Physical Systems, 119-162, 2015
36*2015
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
342017
User profiling and re-identification: case of university-wide network analysis
M Kumpošt, V Matyáš
International Conference on Trust, Privacy and Security in Digital Business …, 2009
252009
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
252009
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
25*2008
D3. 2: A study on PKI and biometrics
M Gasson, M Meints, K Warwick
FIDIS deliverable (3) 2, 2005
252005
PROLEMus: A proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks
M Patnaik, V Kamakoti, V Matyáš, V Řchák
IEEE Transactions on Cognitive Communications and Networking 5 (2), 400-412, 2019
202019
The sources of randomness in mobile devices
J Krhovják, P Švenda, V Matyáš
Proceedings of the 12th Nordic Workshop on Secure IT Systems. NordSec, 2007
202007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20