Zdenek Martinasek

Orcid: 0000-0002-6504-5619

According to our database1, Zdenek Martinasek authored at least 36 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ADEROS: Artificial Intelligence-Based Detection System of Critical Events for Road Security.
IEEE Syst. J., December, 2023

On Security and Privacy in Vehicle Speed-Limiting Services in the Internet of Vehicles.
IEEE Intell. Transp. Syst. Mag., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

Side-Channel Analysis of Cryptographic Processor CEC 1702.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Efficient Web Application Mapping During the Reconnaissance Phase of Penetration Testing.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Implementation and Field Testing of V2V Vehicle Stopping System.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Interactive Environment for Effective Cybersecurity Teaching and Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Capturing the Vehicle to Everything Communication Using Software Defined Radio in ITS-G5.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

2020
Manager Asks: Which Vulnerability Must be Eliminated First?
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Detection of wireless fake access points.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Simplified Method for Fast and Efficient Incident Detection in Industrial Networks.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

2019
Scalable DDoS Mitigation System.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Modeling the Trade-off Between Security and Performance to Support the Product Life Cycle.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

Privacy-enhancing Cloud Computing Solution for Big Data.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems.
Comput. Secur., 2018

Hardware-Accelerated Twofish Core for FPGA.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Assessment of Cryptography Support and Security on Programmable Smart Cards.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

2017
Robust profiled attacks: should the adversary trust the dataset?
IET Inf. Secur., 2017

Packet generators on field programmable gate array platform.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Methodology for correlations discovery in security logs.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

2016
Crucial pitfall of DPA Contest V4.2 implementation.
Secur. Commun. Networks, 2016

Profiling power analysis attack based on MLP in DPA contest V4.2.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Privacy-preserving authentication systems using smart devices.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

2015
Power analysis attack based on the MLP in DPA Contest v4.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Scalable authentication for integration server.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Acoustic attack on keyboard using spectrogram and neural network.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

2013
General scheme of differential power analysis.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Proceedings of the SECRYPT 2013, 2013

Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks.
Proceedings of the SECRYPT 2013, 2013

Evaluation of Software-Oriented Block Ciphers on Smartphones.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Optimization of Power Analysis Using Neural Network.
Proceedings of the Smart Card Research and Advanced Applications, 2013


  Loading...