A study on the value of location privacy D Cvrcek, M Kumpost, V Matyas, G Danezis Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006 | 249 | 2006 |
A touch of evil: High-assurance cryptographic hardware from untrusted components V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 48 | 2017 |
Smart dust security–key infection revisited D Cvrcek, P Svenda Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006 | 30 | 2006 |
Steel, cast iron and concrete: Security engineering for real world wireless sensor networks F Stajano, D Cvrcek, M Lewis Applied Cryptography and Network Security: 6th International Conference …, 2008 | 26 | 2008 |
Combining trust and risk to reduce the cost of attacks D Cvrček, K Moody International Conference on Trust Management, 372-383, 2005 | 19 | 2005 |
On the role of contextual information for privacy attacks and classification D Cvrcek, V Matyas Workshop on Privacy and Security Aspects of Data Mining, 31-39, 2004 | 18 | 2004 |
Dynamics of reputation D Cvrcek 9th Nordic Workshop on Secure IT-systems (Nordsec’04), 1-14, 2004 | 18 | 2004 |
Pseudonymity in the light of evidence-based trust D Cvrček, V Matyáš Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28 …, 2006 | 15 | 2006 |
The value of location information: A European-wide study D Cvrcek, M Kumpost, V Matyas, G Danezis Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 …, 2009 | 13 | 2009 |
Autorizace elektronických transakcí a autentizace dat i uživatelů VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ... Masarykova univerzita, 2008 | 12 | 2008 |
Hardware scrambling-no more password leaks D Cvrcek Technical report, 2014 | 11 | 2014 |
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised … V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda Springer Science & Business Media, 2009 | 11 | 2009 |
Authorizing card payments with pins V Matyas, J Krhovják, M Kumpost, D Cvrcek Computer 41 (2), 64-68, 2008 | 11 | 2008 |
Autentizace uživatelů a autorizace elektronických transakcí V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ... TATE International, sro, 2007 | 10 | 2007 |
Evidence processing and privacy issues in evidence-based reputation systems D Cvrček, V Matyáš Jr, A Patel Computer standards & interfaces 27 (5), 533-545, 2005 | 8 | 2005 |
PIN (and chip) or signature: beating the cheating? D Cvrcek, J Krhovjak, V Matyas Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007 | 6 | 2007 |
Real-world problems of PKI hierarchy D Cvrcek Proceedings of the SPI Conference, Brno Czech, 39-46, 2001 | 5 | 2001 |
Analyses of real email traffic properties K Malinka, P Hanácek, D Cvrcek Radioengineering 18 (4), 7, 2009 | 4 | 2009 |
Unwrapping the Chrysalis M Bond, D Cvrček, SJ Murdoch University of Cambridge, Computer Laboratory, 2004 | 4 | 2004 |
Mandatory access control in workflow systems D Cvrcek Proceedings of the JCKBSE Conference, 247-254, 2000 | 3 | 2000 |