[go: up one dir, main page]

Follow
Petr Dzurenda
Petr Dzurenda
Brno University of Technology
Verified email at vut.cz
Title
Cited by
Cited by
Year
Optimized blockchain model for internet of things based healthcare applications
AD Dwivedi, L Malina, P Dzurenda, G Srivastava
2019 42nd international conference on telecommunications and signal …, 2019
1502019
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
1262021
A secure publish/subscribe protocol for internet of things
L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak
Proceedings of the 14th international conference on availability …, 2019
1112019
Implementing CRYSTALS-Dilithium signature scheme on FPGAs
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
752021
Profiling power analysis attack based on MLP in DPA contest V4. 2
Z Martinasek, P Dzurenda, L Malina
2016 39th International Conference on Telecommunications and Signal …, 2016
662016
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
International Conference on Network and System Security, 77-97, 2019
512019
On feasibility of post-quantum cryptography on small devices
L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek
IFAC-PapersOnLine 51 (6), 462-467, 2018
502018
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
472018
Fast keyed-verification anonymous credentials on standard smart cards
J Camenisch, M Drijvers, P Dzurenda, J Hajny
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2019
462019
Privacy-preserving security solution for cloud services
L Malina, J Hajny, P Dzurenda, V Zeman
Journal of applied research and technology 13 (1), 20-31, 2015
332015
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
252017
Network protection against DDoS attacks
P Dzurenda, Z Martinasek, L Malina
International Journal of Advances in Telecommunications, Electrotechnics …, 2015
242015
Attribute‐based credentials with cryptographic collusion prevention
J Hajny, P Dzurenda, L Malina
Security and Communication Networks 8 (18), 3836-3846, 2015
182015
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
162019
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L Malina, P Dzurenda, J Hajny, Z Martinasek
Computers & Security 77, 500-513, 2018
142018
Privacy-pac: Privacy-enhanced physical access control
J Hajny, P Dzurenda, L Malina
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014
132014
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th international conference on availability …, 2021
122021
Multi-Device Authentication using Wearables and IoT.
J Hajny, P Dzurenda, L Malina
SECRYPT, 483-488, 2016
122016
Threshold signature for privacy-preserving blockchain
S Ricci, P Dzurenda, R Casanova-Marqués, P Cika
International conference on business process management, 100-115, 2022
112022
Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
J Hajny, P Dzurenda, RC Marques, L Malina
2020 12th International Congress on Ultra Modern Telecommunications and …, 2020
112020
The system can't perform the operation now. Try again later.
Articles 1–20