Vaclav Zeman

According to our database1, Vaclav Zeman authored at least 31 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Neurosymbolic Methods for Rule Mining.
CoRR, 2024

2021
RDFRules: Making RDF rule mining easier and even more efficient.
Semantic Web, 2021

2018
EasyMiner.eu: Web framework for interpretable machine learning based on rules and frequent itemsets.
Knowl. Based Syst., 2018

RdfRules Preview: Towards an Analytics Engine for Rule Mining in RDF Knowledge Graphs.
Proceedings of the Doctoral Consortium and Challenge @ RuleML+RR 2018 hosted by 2nd International Joint Conference on Rules and Reasoning (RuleML+RR 2018), 2018

Denial of Service Attack Generator in Apache JMeter.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Network Emulator of Transmission Parameters of Data Networks.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

2017
Using EasyMiner API for Financial Data Analysis in the OpenBudgets.eu Project.
Proceedings of the Doctoral Consortium, 2017

EasyMiner - Short History of Research and Current Development.
Proceedings of the 17th Conference on Information Technologies, 2017

2016
Light-weight group signatures with time-bound membership.
Secur. Commun. Networks, 2016

Robust mutual authentication and secure transmission of information on low-cost devices using Physical unclonable functions and Hash functions.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

DB-quiz: a DBpedia-backed knowledge game.
Proceedings of the 12th International Conference on Semantic Systems, 2016

The Linked Data Mining Challenge 2016.
Proceedings of the Joint Proceedings of the 5th Workshop on Data Mining and Knowledge Discovery meets Linked Open Data and the 1st International Workshop on Completing and Debugging the Semantic Web (Know@LOD-2016, 2016

2015
Scalable authentication for integration server.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Security and privacy in the smart grid services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Usability of pairing-based cryptography on smartphones.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Cryptography for privacy-preserving electronic services.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Modern physical access control systems and privacy protection.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Unilateral authentication on low-cost devices.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Secure digital archiving in post-quantum era.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

EasyMiner/R Preview: Towards a Web Interface for Association Rule Learning and Classification in R.
Proceedings of the RuleML 2015 Challenge, 2015

The Linked Data Mining Challenge 2015.
Proceedings of the 4th Workshop on Knowledge Discovery and Data Mining Meets Linked Open Data co-located with 12th Extended Semantic Web Conference (ESWC 2015), 2015

2013
Trade-off between signature aggregation and batch verification.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks.
Proceedings of the SECRYPT 2013, 2013

Evaluation of Software-Oriented Block Ciphers on Smartphones.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Group signatures for secure and privacy preserving vehicular ad hoc networks.
Proceedings of the Q2SWinet'12, 2012

2011
Anonymous Authentication with Spread Revelation.
Cryptologia, 2011

Application of FMEA procedure for ALU unit testing.
Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP 2011), 2011

Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Privacy Protection for user Authentication.
Proceedings of the SECRYPT 2010, 2010

2005
H.323 Client-Independent Security Approach.
Proceedings of the Networking, 2005

2000
Novel universal active block: a universal current conveyor.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000


  Loading...