Vashek Matyas
Orcid: 0000-0001-7957-7694
According to our database1,
Vashek Matyas
authored at least 96 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction.
Comput. Secur., March, 2024
sec-certs: Examining the security certification practice for better vulnerability mitigation.
Comput. Secur., 2024
No Thumbs Up in Pictures! Experimental Fingerprint Forgery for Inexperienced Impostors.
IEEE Access, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the Research Projects Exhibition Papers Presented at the 36th International Conference on Advanced Information Systems Engineering(CAiSE 2024), 2024
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks.
IEEE Commun. Lett., November, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Usable and secure? User perception of four authentication methods for mobile banking.
Comput. Secur., 2022
Even if users do not read security directives, their behavior is not so catastrophic.
Commun. ACM, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
Proceedings of the Progress in Cryptology, 2022
2021
On automated RBAC assessment by constructing a centralized perspective for microservice mesh.
PeerJ Comput. Sci., 2021
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
2020
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks.
IEEE Netw. Lett., 2020
IACR Cryptol. ePrint Arch., 2020
Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version).
DTRAP, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks.
IEEE Trans. Cogn. Commun. Netw., 2019
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.
Sensors, 2019
Sensors, 2019
Proceedings of the Security Protocols XXVII, 2019
I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Investigating results and performance of search and construction algorithms for word-based LFSRs, σ-LFSRs.
Discret. Appl. Math., 2018
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version.
CoRR, 2018
Experimental large-scale review of attractors for detection of potentially unwanted applications.
Comput. Secur., 2018
Proceedings of the Information Security Theory and Practice, 2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Genetic and Evolutionary Computation Conference, 2018
Proceedings of the 14th International Conference on Distributed Computing in Sensor Systems, 2018
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm.
ACM Trans. Math. Softw., 2017
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Security Protocols XXIV, 2016
Towards better selective forwarding and delay attacks detection in wireless sensor networks.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the New Codebreakers, 2016
2015
Proceedings of the Information Security Theory and Practice, 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2015
2014
A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks.
IEEE Secur. Priv., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013
2012
On the credibility of wireless sensor network simulations: evaluation of intrusion detection system.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks.
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2012
Proceedings of the Genetic Programming - 15th European Conference, 2012
2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Mathematical and Engineering Methods in Computer Science, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
2009
Proceedings of the Trust, 2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Proceedings of the Future of Identity in the Information Society, 2009
2008
Proceedings of the Security Protocols XVI, 2008
2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005