Lukas Malina
Orcid: 0000-0002-7208-2514
According to our database1,
Lukas Malina
authored at least 95 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Complex Syst. Informatics Model. Q., 2024
IEEE Access, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT Attacks.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
ADEROS: Artificial Intelligence-Based Detection System of Critical Events for Road Security.
IEEE Syst. J., December, 2023
Optimized Security Algorithms for Intelligent and Autonomous Vehicular Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
On Security and Privacy in Vehicle Speed-Limiting Services in the Internet of Vehicles.
IEEE Intell. Transp. Syst. Mag., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022
IEEE Access, 2022
Capturing the Vehicle to Everything Communication Using Software Defined Radio in ITS-G5.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022
On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Evaluation of anonymous digital signatures for privacy-enhancing mobile applications.
Int. J. Secur. Networks, 2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017
2016
Secur. Commun. Networks, 2016
Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers.
J. Circuits Syst. Comput., 2016
On perspective of security and privacy-preserving solutions in the internet of things.
Comput. Networks, 2016
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016
2015
Telecommun. Syst., 2015
Secur. Commun. Networks, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015
Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment.
Proceedings of the SECRYPT 2015, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Kryptografické protokoly s ochranou soukromí pro zabezpečení heterogenních sítí ; Privacy Preserving Cryptographic Protocols for Secure Heterogeneous Networks.
PhD thesis, 2014
Telecommun. Syst., 2014
Secur. Commun. Networks, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Advances in Information and Computer Security, 2014
2013
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Proceedings of the Q2SWinet'12, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011
Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011