On perspective of security and privacy-preserving solutions in the internet of things L Malina, J Hajny, R Fujdiak, J Hosek Computer Networks 102, 83-95, 2016 | 115 | 2016 |
Unlinkable attribute-based credentials with practical revocation on smart-cards J Hajny, L Malina International Conference on Smart Card Research and Advanced Applications, 62-76, 2012 | 60 | 2012 |
Optimization of power analysis using neural network Z Martinasek, J Hajny, L Malina International Conference on Smart Card Research and Advanced Applications …, 2013 | 57 | 2013 |
Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices A Ometov, P Masek, L Malina, R Florea, J Hosek, S Andreev, J Hajny, ... 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 54 | 2016 |
A secure publish/subscribe protocol for internet of things L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak Proceedings of the 14th International Conference on Availability …, 2019 | 27 | 2019 |
Scalable revocation scheme for anonymous credentials based on n-times unlinkable proofs J Camenisch, M Drijvers, J Hajny Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016 | 24 | 2016 |
Performance evaluation of primitives for privacy-enhancing cryptography on current smart-cards and smart-phones J Hajny, L Malina, Z Martinasek, O Tethal Data Privacy Management and Autonomous Spontaneous Security, 17-33, 2013 | 24 | 2013 |
Privacy-preserving security solution for cloud services L Malina, J Hajny, P Dzurenda, V Zeman Journal of applied research and technology 13 (1), 20-31, 2015 | 21 | 2015 |
Efficient security solution for privacy-preserving cloud services L Malina, J Hajny 2013 36th International Conference on Telecommunications and Signal …, 2013 | 21 | 2013 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny International Symposium on Foundations and Practice of Security, 244-260, 2012 | 21 | 2012 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny International Symposium on Foundations and Practice of Security, 244-260, 2012 | 21 | 2012 |
Efficient group signatures for privacy-preserving vehicular networks L Malina, A Vives-Guasch, J Castellŕ-Roca, A Viejo, J Hajny Telecommunication Systems 58 (4), 293-311, 2015 | 17 | 2015 |
Accelerated modular arithmetic for low-performance devices L Malina, J Hajny 2011 34th International Conference on Telecommunications and Signal …, 2011 | 17 | 2011 |
Usability of pairing-based cryptography on smartphones L Malina, J Hajny, V Zeman 2015 38th International Conference on Telecommunications and Signal …, 2015 | 14 | 2015 |
Acceleration of aes encryption algorithm using field programmable gate arrays D Smekal, J Frolka, J Hajny IFAC-PapersOnLine 49 (25), 384-389, 2016 | 13 | 2016 |
Evaluation of software-oriented block ciphers on smartphones L Malina, V Clupek, Z Martinasek, J Hajny, K Oguchi, V Zeman International Symposium on Foundations and Practice of Security, 353-368, 2013 | 11 | 2013 |
Trade-off between signature aggregation and batch verification L Malina, J Hajny, V Zeman 2013 36th International Conference on Telecommunications and Signal …, 2013 | 11 | 2013 |
Anonymous Authentication for Smartcards. J Hajný Radioengineering 19 (2), 2010 | 11 | 2010 |
Fast keyed-verification anonymous credentials on standard smart cards J Camenisch, M Drijvers, P Dzurenda, J Hajny IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019 | 10 | 2019 |
Towards secure gigabit passive optical networks: Signal propagation based key establishment L Malina, P Munster, J Hajny, T Horvath 2015 12th International Joint Conference on e-Business and …, 2015 | 10 | 2015 |