Follow
Vashek Matyas
Vashek Matyas
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
A study on the value of location privacy
D Cvrcek, M Kumpost, V Matyas, G Danezis
Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006
2452006
Biometrie a identita člověka ve forenzních a komerčních aplikacích. 1. vyd. Praha: Grada, 2008, 631 s
R RAK, V MATYÁŠ, Z ŘÍHA
ISBN 978-80-247-2365-5, 2008
244*2008
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
ACM Conference on Computer and Communications Security, 1631-1648, 2017
1852017
Biometric authentication systems
Z Riha, V Matyas
https://www.fi.muni.cz/reports/files/older/FIMU-RS-2000-08.pdf, 2000
174*2000
Biometric authentication—security and usability
V Matyáš, Z Říha
Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint …, 2002
1712002
Toward reliable user authentication through biometrics
V Matyas, Z Riha
IEEE Security & Privacy 1 (3), 45-49, 2003
1392003
Neighbour-based intrusion detection in wireless sensor networks
L Folkman, V Matyas
IEEE Xplore Press, 20-25, 2010
106*2010
On the interpretation of results from the NIST Statistical Test Suite
M SYS, Z RIHA, V MATYAS, K MARTON, A SUCIU
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY 18 (1), 18–32, 2015
104*2015
Calibrating and comparing simulators for wireless sensor networks
A Stetsko, M Stehlik, V Matyas
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
572011
The {Million-Key}{Question—Investigating} the Origins of {RSA} Public Keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th USENIX Security Symposium (USENIX Security 16), 893-910, 2016
562016
Security of biometric authentication systems
V Matyáš, Z Říha
2010 International Conference on Computer Information Systems and Industrial …, 2010
552010
Towards true random number generation in mobile environments
J Bouda, J Krhovjak, V Matyas, P Svenda
Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure …, 2009
422009
WSNProtectLayer: Security Middleware for Wireless Sensor Networks
V Matyáš, P Švenda, A Stetsko, D Klinec, F Jurnečka, M Stehlík
Securing Cyber-Physical Systems, 119-162, 2015
41*2015
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
402017
ProBLeSS: A proactive blockchain based spectrum sharing protocol against SSDF attacks in cognitive radio IoBT networks
M Patnaik, G Prabhu, C Rebeiro, V Matyas, K Veezhinathan
IEEE Networking Letters 2 (2), 67-70, 2020
322020
PROLEMus: A proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks
M Patnaik, V Kamakoti, V Matyáš, V Řchák
IEEE Transactions on Cognitive Communications and Networking 5 (2), 400-412, 2019
302019
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
29*2008
D3. 2: A study on PKI and biometrics
M Gasson, M Meints, K Warwick
FIDIS deliverable (3) 2, 2005
272005
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
262009
User profiling and re-identification: case of university-wide network analysis
M Kumpošt, V Matyáš
Trust, Privacy and Security in Digital Business: 6th International …, 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20