


default search action
Vashek Matyas
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas:
Revisiting the analysis of references among Common Criteria certified products. Comput. Secur. 152: 104362 (2025) - 2024
- [j22]Agata Kruzikova
, Alessia Michela Di Campi, Vashek Matyás
, Tomás Cerný
:
No Thumbs Up in Pictures! Experimental Fingerprint Forgery for Inexperienced Impostors. IEEE Access 12: 131297-131312 (2024) - [j21]Agata Kruzikova, Michal Muzik
, Lenka Knapova, Lenka Dedkova
, David Smahel, Vashek Matyas:
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction. Comput. Secur. 138: 103667 (2024) - [j20]Adam Janovsky, Jan Jancar, Petr Svenda, Lukasz Chmielewski
, Jiri Michalik, Vashek Matyas:
sec-certs: Examining the security certification practice for better vulnerability mitigation. Comput. Secur. 143: 103895 (2024) - [c68]Agata Kruzikova
, Jakub Suchanek
, Milan Broz
, Martin Ukrop
, Vashek Matyas
:
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers. ARES 2024: 185:1-185:11 - [c67]Mariia Bakhtina, Zuzana Vémolová, Vashek Matyás:
CHESS: Cyber-security Excellence Hub in Estonia and South Moravia. CAiSE Research Projects Exhibition 2024: 10-17 - [c66]Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas:
Chain of Trust: Unraveling References Among Common Criteria Certified Products. SEC 2024: 191-205 - [i11]Adam Janovsky, Lukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas:
Chain of trust: Unraveling references among Common Criteria certified products. CoRR abs/2404.14246 (2024) - 2023
- [j19]Milan Patnaik
, K. Bharati, Vashek Matyas:
ProMETHEUS: A Secure Lightweight Spectrum Allocation Protocol against SSDF Attacks in Cognitive Radio IoT Networks. IEEE Commun. Lett. 27(11): 2919-2923 (2023) - [c65]Agata Kruzikova
, Vashek Matyas
:
Fingerprint forgery training: Easy to learn, hard to perform. ARES 2023: 140:1-140:7 - [c64]Lydia Kraus
, Valdemar Svábenský
, Martin Horák
, Vashek Matyás
, Jan Vykopal
, Pavel Celeda
:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. ITiCSE (1) 2023: 236-242 - [c63]Agata Kruzikova
, Vashek Matyas, Milan Broz
:
Authentication of IT Professionals in the Wild - A Survey. Security Protocols Workshop 2023: 43-56 - [e11]Frank Stajano
, Vashek Matyás, Bruce Christianson
, Jonathan Anderson
:
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14186, Springer 2023, ISBN 978-3-031-43032-9 [contents] - [i10]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. CoRR abs/2307.07608 (2023) - [i9]Adam Janovsky, Jan Jancar, Petr Svenda, Lukasz Chmielewski, Jiri Michalik, Vashek Matyas:
sec-certs: Examining the security certification practice for better vulnerability mitigation. CoRR abs/2311.17603 (2023) - 2022
- [j18]Vashek Matyas, Kamil Malinka
, Lydia Kraus, Lenka Knapova, Agata Kruzikova:
Even if users do not read security directives, their behavior is not so catastrophic. Commun. ACM 65(1): 37-40 (2022) - [j17]Agata Kruzikova, Lenka Knapova, David Smahel
, Lenka Dedkova
, Vashek Matyas:
Usable and secure? User perception of four authentication methods for mobile banking. Comput. Secur. 115: 102603 (2022) - [j16]Marek Sýs
, Lubomír Obrátil, Vashek Matyás, Dusan Klinec:
A Bad Day to Die Hard: Correcting the Dieharder Battery. J. Cryptol. 35(1): 3 (2022) - [c62]Vladimir Sedlacek
, Vojtech Suchanek, Antonin Dufka
, Marek Sýs
, Vashek Matyas:
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits. AFRICACRYPT 2022: 493-517 - [c61]Martin Ukrop, Michaela Balázová, Pavol Zácik, Eric Vincent Valcík, Vashek Matyas:
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors. EuroUSEC 2022: 131-144 - [c60]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
Explaining the Use of Cryptographic API in Android Malware. ICSBT/SECRYPT (Revised Selected Papers) 2022: 69-97 - [c59]Lydia Kraus
, Matej Grabovský, Martin Ukrop
, Katarína Galanská, Vashek Matyás:
Usability Insights from Establishing TLS Connections. SEC 2022: 289-305 - [c58]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API: A Decade of Android Malware. SECRYPT 2022: 121-133 - [c57]Dusan Klinec, Marek Sýs
, Karel Kubicek
, Petr Svenda, Vashek Matyás:
Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions. SECRYPT 2022: 134-146 - [i8]Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto:
A Longitudinal Study of Cryptographic API - a Decade of Android Malware. CoRR abs/2205.05573 (2022) - [i7]Martin Ukrop, Lydia Kraus, Vashek Matyas:
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). CoRR abs/2207.11610 (2022) - [i6]Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sýs, Vashek Matyas:
DiSSECT: Distinguisher of Standard & Simulated Elliptic Curves via Traits. IACR Cryptol. ePrint Arch. 2022: 943 (2022) - 2021
- [j15]Dipta Das
, Andrew Walker, Vincent Bushong
, Jan Svacina
, Tomás Cerný
, Vashek Matyas:
On automated RBAC assessment by constructing a centralized perspective for microservice mesh. PeerJ Comput. Sci. 7: e376 (2021) - [c56]Lukas Nemec, Vashek Matyas, Radim Ostádal, Petr Svenda:
Practical approach to re-securing compromised wireless sensor networks. FNC/MobiSPC 2021: 264-271 - 2020
- [j14]Martin Ukrop, Lydia Kraus, Vashek Matyas:
Will You Trust This TLS Certificate?: Perceptions of People Working in IT (Extended Version). DTRAP 1(4): 25:1-25:29 (2020) - [j13]Milan Patnaik
, G. Prabhu
, Chester Rebeiro, Vashek Matyas, Kamakoti Veezhinathan:
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks. IEEE Netw. Lett. 2(2): 67-70 (2020) - [c55]Adam Janovsky, Matús Nemec
, Petr Svenda, Peter Sekan, Vashek Matyas:
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys. ESORICS (2) 2020: 505-524 - [c54]Dusan Klinec, Vashek Matyas:
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. SEC 2020: 338-351 - [e10]Jonathan Anderson
, Frank Stajano
, Bruce Christianson
, Vashek Matyás
:
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12287, Springer 2020, ISBN 978-3-030-57042-2 [contents] - [i5]Adam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas:
Biased RSA private keys: Origin attribution of GCD-factorable keys. CoRR abs/2009.06700 (2020) - [i4]Dusan Klinec, Vashek Matyas:
Privacy-friendly Monero transaction signing on a hardware wallet, extended version. IACR Cryptol. ePrint Arch. 2020: 281 (2020)
2010 – 2019
- 2019
- [j12]Moon K. Chetry, Susil Kumar Bishoi
, Vashek Matyas:
When Lagged Fibonacci Generators jump. Discret. Appl. Math. 267: 64-72 (2019) - [j11]Andrea Visconti, Ondrej Mosnácek, Milan Broz
, Vashek Matyás:
Examining PBKDF2 security margin - Case study of LUKS. J. Inf. Secur. Appl. 46: 296-306 (2019) - [j10]Lukas Nemec
, Vashek Matyas, Radim Ostádal, Petr Svenda
, Pierre-Louis Palant:
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. Sensors 19(4): 914 (2019) - [j9]Radim Ostádal, Vashek Matyas, Petr Svenda
, Lukas Nemec
:
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors 19(22): 5041 (2019) - [j8]Milan Patnaik
, V. Kamakoti, Vashek Matyas, Vojtech Rehák
:
PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 5(2): 400-412 (2019) - [c53]Martin Ukrop
, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh:
Will you trust this TLS certificate?: perceptions of people working in IT. ACSAC 2019: 718-731 - [c52]Vladimir Sedlacek, Dusan Klinec, Marek Sýs, Petr Svenda, Vashek Matyas:
I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability. ICETE (2) 2019: 25-36 - [c51]Lydia Kraus, Martin Ukrop
, Vashek Matyas, Tobias Fiebig
:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. Security Protocols Workshop 2019: 267-280 - 2018
- [j7]Vlasta Stavova, Lenka Dedkova
, Martin Ukrop
, Vashek Matyas:
A large-scale comparative study of beta testers and regular users. Commun. ACM 61(2): 64-71 (2018) - [j6]Vlasta Stavova, Lenka Dedkova
, Vashek Matyas, Mike Just
, David Smahel
, Martin Ukrop
:
Experimental large-scale review of attractors for detection of potentially unwanted applications. Comput. Secur. 76: 92-100 (2018) - [j5]Susil Kumar Bishoi
, Vashek Matyas:
Investigating results and performance of search and construction algorithms for word-based LFSRs, σ-LFSRs. Discret. Appl. Math. 243: 90-98 (2018) - [c50]Martin Ukrop
, Vashek Matyas:
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability. CT-RSA 2018: 45-64 - [c49]Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda:
Adaptive Secrecy Amplification with Radio Channel Key Extraction. DCOSS 2018: 123-130 - [c48]Vojtech Mrazek
, Marek Sýs
, Zdenek Vasícek, Lukás Sekanina, Vashek Matyas:
Evolving boolean functions for fast and efficient randomness testing. GECCO 2018: 1302-1309 - [c47]Milan Broz, Mikulás Patocka, Vashek Matyás:
Practical Cryptographic Data Integrity Protection with Full Disk Encryption. SEC 2018: 79-93 - [c46]Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda:
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. Security Protocols Workshop 2018: 84-92 - [c45]Adam Janovsky, Jan Krhovjak, Vashek Matyas:
Bringing Kleptography to Real-World TLS. WISTP 2018: 15-27 - [e9]Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 [contents] - [i3]Milan Broz
, Mikulás Patocka, Vashek Matyas:
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version. CoRR abs/1807.00309 (2018) - [i2]Vlasta Stavova, Lenka Dedkova, Martin Ukrop, Vashek Matyas:
A Large-Scale Comparative Study of Beta Testers and Standard Users. CoRR abs/1811.07053 (2018) - 2017
- [j4]Marek Sýs
, Zdenek Ríha, Vashek Matyás:
Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm. ACM Trans. Math. Softw. 43(3): 27:1-27:11 (2017) - [c44]Matús Nemec
, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas:
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. ACSAC 2017: 162-175 - [c43]Matús Nemec
, Marek Sýs
, Petr Svenda, Dusan Klinec, Vashek Matyas:
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. CCS 2017: 1631-1648 - [e8]Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano:
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10368, Springer 2017, ISBN 978-3-319-62032-9 [contents] - [e7]Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 [contents] - 2016
- [c42]Marek Sýs
, Vashek Matyás:
Randomness Testing: Result Interpretation and Speed. The New Codebreakers 2016: 389-395 - [c41]Radim Ostádal, Petr Svenda, Vashek Matyás:
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case. CANS 2016: 552-561 - [c40]Martin Stehlík, Vashek Matyas, Andriy Stetsko:
Towards better selective forwarding and delay attacks detection in wireless sensor networks. ICNSC 2016: 1-6 - [c39]Radim Ostádal, Petr Svenda, Vashek Matyás:
Reconsidering Attacker Models in Ad-Hoc Networks. Security Protocols Workshop 2016: 219-227 - [c38]Petr Svenda, Matús Nemec, Peter Sekan, Rudolf Kvasnovský, David Formánek, David Komárek, Vashek Matyás:
The Million-Key Question - Investigating the Origins of RSA Public Keys. USENIX Security Symposium 2016: 893-910 - [c37]Vlasta Stavova, Vashek Matyas, Mike Just
:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. WISTP 2016: 35-50 - 2015
- [c36]Vlasta Stavova, Vashek Matyas, Kamil Malinka
:
The Challenge of Increasing Safe Response of Antivirus Software Users. MEMICS 2015: 133-143 - [c35]Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas:
Service in Denial - Clouds Going with the Winds. NSS 2015: 130-143 - [c34]Vit Bukac, Vashek Matyas:
Analyzing Traffic Features of Common Standalone DoS Attack Tools. SPACE 2015: 21-40 - [c33]Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas:
Challenges of Fiction in Network Security - Perspective of Virtualized Environments. Security Protocols Workshop 2015: 145-151 - [c32]Milan Broz
, Vashek Matyás:
Selecting a New Key Derivation Function for Disk Encryption. STM 2015: 185-199 - [c31]Radim Ostádal, Petr Svenda
, Vashek Matyás:
On Secrecy Amplification Protocols. WISTP 2015: 3-19 - [e6]Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson
:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 [contents] - 2014
- [j3]Milan Broz
, Vashek Matyas:
The TrueCrypt On-Disk Format-An Independent View. IEEE Secur. Priv. 12(3): 74-77 (2014) - [c30]Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík:
Improving Intrusion Detection Systems for Wireless Sensor Networks. ACNS 2014: 343-360 - [c29]Marek Sýs
, Petr Svenda
, Martin Ukrop
, Vashek Matyas:
Constructing Empirical Tests of Randomness. SECRYPT 2014: 229-237 - [c28]Dusan Klinec, Vashek Matyás:
Traversing symmetric NAT with predictable port allocation. SIN 2014: 543 - [c27]Vit Bukac, Vaclav Lorenc, Vashek Matyás:
Red Queen's Race: APT Win-Win Game. Security Protocols Workshop 2014: 55-61 - [c26]Filip Jurnecka, Martin Stehlík, Vashek Matyás:
On Node Capturing Attacker Strategies. Security Protocols Workshop 2014: 300-315 - [c25]Filip Jurnecka, Martin Stehlík, Vashek Matyas:
Evaluation of Key Management Schemes in Wireless Sensor Networks. STM 2014: 198-203 - [c24]Jirí Kur, Vashek Matyás:
A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks. TrustBus 2014: 180-190 - [e5]Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont
:
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings. Lecture Notes in Computer Science 8804, Springer 2014, ISBN 978-3-319-12059-1 [contents] - [e4]Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda
, Frank Stajano, Jonathan Anderson
:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 [contents] - 2013
- [j2]Vashek Matyas, Jirí Kur:
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks. IEEE Secur. Priv. 11(5): 73-76 (2013) - [c23]Martin Stehlík, Adam Saleh, Andriy Stetsko, Vashek Matyás:
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks. ECAL 2013: 569-576 - [c22]Petr Svenda
, Martin Ukrop
, Vashek Matyás:
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. ICETE (Selected Papers) 2013: 290-305 - [c21]Jirí Kur, Vashek Matyás:
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications. LightSec 2013: 81-96 - [c20]Filip Jurnecka, Vashek Matyas:
Using encryption for authentication: Wireless sensor network case. SECON 2013: 59-64 - [c19]Petr Svenda, Martin Ukrop, Vashek Matyas:
Towards Cryptographic Function Distinguishers with Evolutionary Circuits. SECRYPT 2013: 135-146 - [e3]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Lecture Notes in Computer Science 7028, Springer 2013, ISBN 978-3-642-36212-5 [contents] - 2012
- [c18]Tobiás Smolka, Petr Svenda
, Lukás Sekanina, Vashek Matyás:
Evolutionary Design of Message Efficient Secrecy Amplification Protocols. EuroGP 2012: 194-205 - [c17]Filip Jurnecka, Vashek Matyás:
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks. MEMICS 2012: 131-142 - [c16]Jirí Kur, Vashek Matyás, Petr Svenda
:
Two Improvements of Random Key Predistribution for Wireless Sensor Networks. SecureComm 2012: 61-75 - [c15]Andriy Stetsko, Tobiás Smolka, Vashek Matyas, Filip Jurnecka:
On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. SimuTools 2012: 75-84 - [i1]Marek Kumpost, Vashek Matyás:
The Real Value of Private Information - Two Experimental Studies. ERCIM News 2012(90) (2012) - 2011
- [c14]Andriy Stetsko, Martin Stehlík, Vashek Matyas:
Calibrating and Comparing Simulators for Wireless Sensor Networks. MASS 2011: 733-738 - [c13]Roman Zilka, Vashek Matyás, Libor Kyncl
:
Four Authorization Protocols for an Electronic Payment System. MEMICS 2011: 205-214 - [c12]Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda
:
Attack Detection vs. Privacy - How to Find the Link or How to Hide It? Security Protocols Workshop 2011: 189-199 - [e2]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 [contents]
2000 – 2009
- 2009
- [c11]Jan Krhovjak, Vashek Matyas, Jiri Zizkovsky:
Generating Random and Pseudorandom Sequences in Mobile Devices. MobiSec 2009: 122-133 - [c10]Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda
:
Towards True Random Number Generation in Mobile Environments. NordSec 2009: 179-189 - [c9]Marek Kumpost, Vashek Matyas:
User Profiling and Re-identification: Case of University-Wide Network Analysis. TrustBus 2009: 1-10 - [p1]Maike Gilliot, Vashek Matyas, Sven Wohlgemuth:
Privacy and Identity. The Future of Identity in the Information Society 2009: 351-390 - [e1]Vashek Matyás, Simone Fischer-Hübner, Daniel Cvrcek, Petr Svenda
:
The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers. IFIP Advances in Information and Communication Technology 298, Springer 2009, ISBN 978-3-642-03314-8 [contents] - 2008
- [j1]Vashek Matyas, Daniel Cvrcek, Jan Krhovjak, Marek Kumpost:
Authorizing Card Payments with PINs. Computer 41(2): 64-68 (2008) - [c8]Jan Krhovjak, Andriy Stetsko, Vashek Matyas:
Generating Random Numbers in Hostile Environments. Security Protocols Workshop 2008: 38-50 - 2007
- [c7]Vashek Matyas, Marek Kumpost:
Location Privacy Pricing and Motivation. MDM 2007: 263-267 - 2006
- [c6]Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
The Value of Location Information. Security Protocols Workshop 2006: 112-121 - [c5]Vashek Matyas:
The Value of Location Information. Security Protocols Workshop 2006: 122-127 - [c4]Vashek Matyas:
Update on PIN or Signature. Security Protocols Workshop 2006: 128-131 - [c3]Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
A study on the value of location privacy. WPES 2006: 109-118 - 2005
- [c2]Daniel Cvrcek, Jan Krhovjak, Vashek Matyas:
PIN (and Chip) or Signature: Beating the Cheating? Security Protocols Workshop 2005: 69-75 - [c1]Vashek Matyas:
PIN (and Chip) or Signature: Beating the Cheating? Security Protocols Workshop 2005: 76-81
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-18 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint