On perspective of security and privacy-preserving solutions in the internet of things L Malina, J Hajny, R Fujdiak, J Hosek Computer Networks 102, 83-95, 2016 | 116 | 2016 |
Unlinkable attribute-based credentials with practical revocation on smart-cards J Hajny, L Malina International Conference on Smart Card Research and Advanced Applications, 62-76, 2012 | 59 | 2012 |
Optimization of power analysis using neural network Z Martinasek, J Hajny, L Malina International Conference on Smart Card Research and Advanced Applications …, 2013 | 58 | 2013 |
Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices A Ometov, P Masek, L Malina, R Florea, J Hosek, S Andreev, J Hajny, ... 2016 IEEE International Conference on Pervasive Computing and Communication …, 2016 | 54 | 2016 |
A secure publish/subscribe protocol for internet of things L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak Proceedings of the 14th International Conference on Availability …, 2019 | 27 | 2019 |
Performance evaluation of primitives for privacy-enhancing cryptography on current smart-cards and smart-phones J Hajny, L Malina, Z Martinasek, O Tethal Data Privacy Management and Autonomous Spontaneous Security, 17-33, 2013 | 24 | 2013 |
Optimized blockchain model for internet of things based healthcare applications AD Dwivedi, L Malina, P Dzurenda, G Srivastava 2019 42nd international conference on telecommunications and signal …, 2019 | 22 | 2019 |
Privacy-preserving security solution for cloud services L Malina, J Hajny, P Dzurenda, V Zeman Journal of applied research and technology 13 (1), 20-31, 2015 | 21 | 2015 |
Efficient security solution for privacy-preserving cloud services L Malina, J Hajny 2013 36th International Conference on Telecommunications and Signal …, 2013 | 21 | 2013 |
Profiling power analysis attack based on MLP in DPA contest V4. 2 Z Martinasek, P Dzurenda, L Malina 2016 39th International Conference on Telecommunications and Signal …, 2016 | 20 | 2016 |
Short-term linkable group signatures with categorized batch verification L Malina, J Castella-Roca, A Vives-Guasch, J Hajny International Symposium on Foundations and Practice of Security, 244-260, 2012 | 20 | 2012 |
Profiling power analysis attack based on multi-layer perceptron network Z Martinasek, L Malina, K Trasy Computational Problems in Science and Engineering, 317-339, 2015 | 19 | 2015 |
Accelerated modular arithmetic for low-performance devices L Malina, J Hajny 2011 34th International Conference on Telecommunications and Signal …, 2011 | 17 | 2011 |
On track of sigfox confidentiality with end-to-end encryption R Fujdiak, P Blazek, K Mikhaylov, L Malina, P Mlynek, J Misurec, V Blazek Proceedings of the 13th International Conference on Availability …, 2018 | 16 | 2018 |
On security in gigabit passive optical networks T Horvath, L Malina, P Munster 2015 International Workshop on Fiber Optics in Access Network (FOAN), 51-55, 2015 | 16 | 2015 |
Efficient group signatures for privacy-preserving vehicular networks L Malina, A Vives-Guasch, J Castellà-Roca, A Viejo, J Hajny Telecommunication Systems 58 (4), 293-311, 2015 | 16 | 2015 |
Usability of pairing-based cryptography on smartphones L Malina, J Hajny, V Zeman 2015 38th International Conference on Telecommunications and Signal …, 2015 | 14 | 2015 |
K-nearest neighbors algorithm in profiling power analysis attacks Z Martinasek, V Zeman, L Malina, J Martinasek Radioengineering 25 (2), 365-382, 2016 | 11 | 2016 |
Network protection against DDoS attacks P Dzurenda, Z Martinasek, L Malina International Journal of Advances in Telecommunications, Electrotechnics …, 2015 | 11 | 2015 |
Trade-off between signature aggregation and batch verification L Malina, J Hajny, V Zeman 2013 36th International Conference on Telecommunications and Signal …, 2013 | 11 | 2013 |