Follow
Vashek Matyas
Vashek Matyas
Verified email at fi.muni.cz - Homepage
Title
Cited by
Cited by
Year
Biometrie a identita člověka ve forenzních a komerčních aplikacích. 1. vyd. Praha: Grada, 2008, 631 s
R RAK, V MATYÁŠ, Z ŘÍHA
ISBN 978-80-247-2365-5, 2008
240*2008
A study on the value of location privacy
D Cvrcek, M Kumpost, V Matyas, G Danezis
Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006
2372006
Biometric authentication systems
Z Riha, V Matyas
https://www.fi.muni.cz/reports/files/older/FIMU-RS-2000-08.pdf, 2000
166*2000
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli
M Nemec, M Sys, P Svenda, D Klinec, V Matyas
ACM Conference on Computer and Communications Security, 1631-1648, 2017
1622017
Biometric authentication—security and usability
V Matyáš, Z Říha
Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint …, 2002
1562002
Toward reliable user authentication through biometrics
V Matyas, Z Riha
IEEE Security & Privacy 1 (3), 45-49, 2003
1282003
Neighbor-based intrusion detection for wireless sensor networks
A Stetsko, L Folkman, V Matyáš
2010 6th International Conference on Wireless and Mobile Communications, 420-425, 2010
972010
On the interpretation of results from the NIST Statistical Test Suite
M SYS, Z RIHA, V MATYAS, K MARTON, A SUCIU
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY 18 (1), 18–32, 2015
83*2015
Calibrating and comparing simulators for wireless sensor networks
A Stetsko, M Stehlik, V Matyas
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
532011
Security of biometric authentication systems
V Matyáš, Z Říha
2010 International Conference on Computer Information Systems and Industrial …, 2010
522010
The million-key question—investigating the origins of {RSA} public keys
P Švenda, M Nemec, P Sekan, R Kvašňovský, D Formánek, D Komárek, ...
25th {USENIX} Security Symposium ({USENIX} Security 16), 893-910, 2016
482016
Towards True Random Number Generation in Mobile Environments.
J Bouda, J Krhovjak, V Matyas, P Svenda
NordSec 9, 179-189, 2009
392009
WSNProtectLayer: Security Middleware for Wireless Sensor Networks
V Matyáš, P Švenda, A Stetsko, D Klinec, F Jurnečka, M Stehlík
Securing Cyber-Physical Systems, 119-162, 2015
38*2015
Measuring popularity of cryptographic libraries in internet-wide scans
M Nemec, D Klinec, P Svenda, P Sekan, V Matyas
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
372017
D3. 2: A study on PKI and biometrics
M Gasson, M Meints, K Warwick
FIDIS deliverable (3) 2, 2005
272005
Evolutionary design of secrecy amplification protocols for wireless sensor networks
P Švenda, L Sekanina, V Matyáš
Proceedings of the second ACM conference on Wireless network security, 225-236, 2009
262009
User profiling and re-identification: case of university-wide network analysis
M Kumpošt, V Matyáš
Trust, Privacy and Security in Digital Business: 6th International …, 2009
252009
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
25*2008
PROLEMus: A proactive learning-based MAC protocol against PUEA and SSDF attacks in energy constrained cognitive radio networks
M Patnaik, V Kamakoti, V Matyáš, V Řchák
IEEE Transactions on Cognitive Communications and Networking 5 (2), 400-412, 2019
232019
The Global Internet Trust Register
R Anderson, B Crispo
MIT press, 1999
221999
The system can't perform the operation now. Try again later.
Articles 1–20