Jan Hajny
Orcid: 0000-0003-2831-1073
According to our database1,
Jan Hajny
authored at least 92 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Maximizing privacy and security of collaborative indoor positioning using zero-knowledge proofs.
Internet Things, July, 2023
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023
Proceedings of the IEEE AFRICON 2023, Nairobi, Kenya, September 20-22, 2023, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Proceedings of the 30th International Conference on Software, 2022
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Evaluation of anonymous digital signatures for privacy-enhancing mobile applications.
Int. J. Secur. Networks, 2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
2017
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
A non-invasive electricity measurement within the smart grid landscape: Arduino-based visualization platform for IoT.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017
2016
Secur. Commun. Networks, 2016
Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers.
J. Circuits Syst. Comput., 2016
On perspective of security and privacy-preserving solutions in the internet of things.
Comput. Networks, 2016
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
2015
Telecommun. Syst., 2015
Secur. Commun. Networks, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Telecommun. Syst., 2014
Secur. Commun. Networks, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Advances in Information and Computer Security, 2014
2013
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Autentizační protokoly a ochrana soukromí ; Authentication Protocols and Privacy Protection.
PhD thesis, 2012
Proceedings of the Q2SWinet'12, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011
Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2010
Privacy Protection for user Authentication.
Proceedings of the SECRYPT 2010, 2010
2009
Universal Authentication Framework - Requirements and Phase Design.
Proceedings of the SECRYPT 2009, 2009