Follow
Petr Dzurenda
Petr Dzurenda
Brno University of Technology
Verified email at vut.cz
Title
Cited by
Cited by
Year
Optimized blockchain model for internet of things based healthcare applications
AD Dwivedi, L Malina, P Dzurenda, G Srivastava
2019 42nd international conference on telecommunications and signal …, 2019
1192019
A secure publish/subscribe protocol for internet of things
L Malina, G Srivastava, P Dzurenda, J Hajny, R Fujdiak
Proceedings of the 14th international conference on availability …, 2019
932019
Profiling power analysis attack based on MLP in DPA contest V4. 2
Z Martinasek, P Dzurenda, L Malina
2016 39th International Conference on Telecommunications and Signal …, 2016
552016
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
492021
Implementing crystals-dilithium signature scheme on fpgas
S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ...
Proceedings of the 16th International Conference on Availability …, 2021
482021
A privacy-enhancing framework for internet of things services
L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci
Network and System Security: 13th International Conference, NSS 2019 …, 2019
402019
On feasibility of post-quantum cryptography on small devices
L Malina, L Popelova, P Dzurenda, J Hajny, Z Martinasek
IFAC-PapersOnLine 51 (6), 462-467, 2018
372018
Fast keyed-verification anonymous credentials on standard smart cards
J Camenisch, M Drijvers, P Dzurenda, J Hajny
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
332019
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
L Malina, J Hajny, P Dzurenda, S Ricci
ICETE (2), 692-697, 2018
302018
Privacy-preserving security solution for cloud services
L Malina, J Hajny, P Dzurenda, V Zeman
Journal of applied research and technology 13 (1), 20-31, 2015
282015
Performance analysis and comparison of different elliptic curves on smart cards
P Dzurenda, S Ricci, J Hajny, L Malina
2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017
222017
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms
L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich
International Conference on Information Technology and Communications …, 2019
152019
Attribute‐based credentials with cryptographic collusion prevention
J Hajny, P Dzurenda, L Malina
Security and Communication Networks 8 (18), 3836-3846, 2015
152015
Network protection against DDoS attacks
P Dzurenda, Z Martinasek, L Malina
International Journal of Advances in Telecommunications, Electrotechnics …, 2015
152015
Privacy-pac: Privacy-enhanced physical access control
J Hajny, P Dzurenda, L Malina
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 93-96, 2014
122014
Multi-Device Authentication using Wearables and IoT.
J Hajny, P Dzurenda, L Malina
SECRYPT, 483-488, 2016
102016
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
L Malina, P Dzurenda, J Hajny, Z Martinasek
Computers & Security 77, 500-513, 2018
92018
Assessment of cryptography support and security on programmable smart cards
L Malina, P Dzurenda, J Hajny, Z Martinasek
2018 41st International Conference on Telecommunications and Signal …, 2018
92018
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba
2018 10th International Congress on Ultra Modern Telecommunications and …, 2018
82018
Secret sharing-based authenticated key agreement protocol
P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika
Proceedings of the 16th International Conference on Availability …, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20