Petr Dzurenda

Orcid: 0000-0002-4366-3950

According to our database1, Petr Dzurenda authored at least 49 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Lattice-based Multisignature Optimization for RAM Constrained Devices.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Secure and Privacy-Preserving Car-Sharing Systems.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Quantum-Resistant and Secure MQTT Communication.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Lattice-Based Threshold Signature Implementation for Constrained Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022

Design of Physical Security for Constrained End Devices within the IoT Ecosystem.
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022

Towards to Lightweight and Secure Access Control Systems for Car-Sharing Services.
Proceedings of the 14th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2022

Threshold Signature for Privacy-Preserving Blockchain.
Proceedings of the Business Process Management: Blockchain, Robotic Process Automation, and Central and Eastern Europe Forum, 2022

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Privacy-Enhancing Group Signcryption Scheme.
IEEE Access, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Towards CRYSTALS-Kyber VHDL Implementation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Privacy ABCs: Now Ready for Your Wallets!
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Secret Sharing-based Authenticated Key Agreement Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Privacy-Preserving Online Parking Based on Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

2019
Kryptografická ochrana digitální identity; Cryptographic Protection of Digital Identity.
PhD thesis, 2019

A Privacy-Enhancing Framework for Internet of Things Services.
IACR Cryptol. ePrint Arch., 2019

A Secure Publish/Subscribe Protocol for Internet of Things.
IACR Cryptol. ePrint Arch., 2019

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards.
IACR Cryptol. ePrint Arch., 2019

Optimized Blockchain Model for Internet of Things based Healthcare Applications.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Privacy-enhancing Cloud Computing Solution for Big Data.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Decentralized Privacy-preserving Access for Low Emission Zones.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Multidevice Authentication with Strong Privacy Protection.
Wirel. Commun. Mob. Comput., 2018

Evaluation of anonymous digital signatures for privacy-enhancing mobile applications.
Int. J. Secur. Networks, 2018

Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018

Assessment of Cryptography Support and Security on Programmable Smart Cards.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Anonymous Data Collection Scheme from Short Group Signatures.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Efficient and secure access control system based on programmable smart cards.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Anonymous Credentials with Practical Revocation using Elliptic Curves.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

On practical deployment of smart card based authenticated key agreement schemes.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

2016
Profiling power analysis attack based on MLP in DPA contest V4.2.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Multi-Device Authentication using Wearables and IoT.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
Attribute-based credentials with cryptographic collusion prevention.
Secur. Commun. Networks, 2015

Practical privacy-enhancing technologies.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Cryptography for privacy-preserving electronic services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Modern physical access control systems and privacy protection.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Secure Physical Access Control with Strong Cryptographic Protection.
Proceedings of the SECRYPT 2015, 2015

Privacy-Enhanced Data Collection Scheme for Smart-Metering.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Privacy-PAC: Privacy-Enhanced Physical Access Control.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014


  Loading...