Radim Ostádal

According to our database1, Radim Ostádal authored at least 11 papers between 2014 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Practical approach to re-securing compromised wireless sensor networks.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021

2019
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.
Sensors, 2019

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.
Sensors, 2019

2018
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks.
Proceedings of the Security Protocols XXVI, 2018

Adaptive Secrecy Amplification with Radio Channel Key Extraction.
Proceedings of the 14th International Conference on Distributed Computing in Sensor Systems, 2018

2016
Reconsidering Attacker Models in Ad-Hoc Networks.
Proceedings of the Security Protocols XXIV, 2016

Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
On Secrecy Amplification Protocols.
Proceedings of the Information Security Theory and Practice, 2015

Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Challenges of Fiction in Network Security - Perspective of Virtualized Environments.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper).
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014


  Loading...