Daniel Cvrcek

According to our database1, Daniel Cvrcek authored at least 15 papers between 2000 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2008
Authorizing Card Payments with PINs.
Computer, 2008

Fighting the 'Good' Internet War.
Proceedings of the Security Protocols XVI, 2008

Security of Wireless Communication.
Proceedings of the Future of Identity in the Information Society, 2008

Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2006
A study on the value of location privacy.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

The Value of Location Information.
Proceedings of the Security Protocols, 2006

2005
Smart Dust Security - Key Infection Revisited.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Evidence processing and privacy issues in evidence-based reputation systems.
Comput. Stand. Interfaces, 2005

PIN (and Chip) or Signature: Beating the Cheating?
Proceedings of the Security Protocols, 2005

Combining Trust and Risk to Reduce the Cost of Attacks.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Pseudonymity in the Light of Evidence-Based Trust.
Proceedings of the Security Protocols, 2004

Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

2000
Active Access Control as High-Level Control.
Proceedings of the Data and Application Security, 2000


  Loading...