Name
Affiliation
Papers
VASHEK MATYAS
Masaryk University, Brno, Czech Republic
66
Collaborators
Citations 
PageRank 
94
165
29.25
Referers 
Referees 
References 
410
662
310
Search Limit
100662
Title
Citations
PageRank
Year
A Longitudinal Study of Cryptographic API: A Decade of Android Malware00.342022
Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic00.342022
Large-scale Randomness Study of Security Margins for 100+Cryptographic Functions00.342022
On Automated Rbac Assessment By Constructing A Centralized Perspective For Microservice Mesh10.352021
Privacy-friendly Monero transaction signing on a hardware wallet, extended version.00.342020
ProBLeSS: A Proactive Blockchain Based Spectrum Sharing Protocol Against SSDF Attacks in Cognitive Radio IoBT Networks10.342020
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers00.342020
Privacy-Friendly Monero Transaction Signing on a Hardware Wallet.00.342020
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.00.342019
When Lagged Fibonacci Generators jump.00.342019
Will you trust this TLS certificate?: perceptions of people working in IT10.352019
Examining PBKDF2 security margin—Case study of LUKS00.342019
Evolution of SSL/TLS Indicators and Warnings in Web Browsers.00.342019
PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks.00.342019
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.00.342019
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version.00.342018
Bringing Kleptography to Real-World TLS.00.342018
A Large-Scale Comparative Study of Beta Testers and Standard Users.00.342018
A large-scale comparative study of beta testers and regular users.10.382018
Adaptive Secrecy Amplification with Radio Channel Key Extraction00.342018
Practical Cryptographic Data Integrity Protection with Full Disk Encryption.10.352018
Experimental large-scale review of attractors for detection of potentially unwanted applications.00.342018
Evolving boolean functions for fast and efficient randomness testing.00.342018
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability.10.362018
Investigating results and performance of search and construction algorithms for word-based LFSRs, σ-LFSRs.10.352018
Algorithm 970: Optimizing the NIST Statistical Test Suite and the Berlekamp-Massey Algorithm.00.342017
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans.10.352017
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.60.512017
The Million-Key Question - Investigating The Origins Of Rsa Public Keys40.462016
Randomness Testing: Result Interpretation and Speed.00.342016
Reconsidering Attacker Models in Ad-Hoc Networks.00.342016
Towards better selective forwarding and delay attacks detection in wireless sensor networks50.492016
Selecting a New Key Derivation Function for Disk Encryption00.342015
The Challenge of Increasing Safe Response of Antivirus Software Users.00.342015
On Secrecy Amplification Protocols00.342015
Service in Denial - Clouds Going with the Winds.10.362015
Challenges of Fiction in Network Security - Perspective of Virtualized Environments.00.342015
Analyzing Traffic Features of Common Standalone DoS Attack Tools.10.372015
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings00.342014
The TrueCrypt On-Disk Format--An Independent View00.342014
On Node Capturing Attacker Strategies.20.412014
Red Queen's Race: APT Win-Win Game.00.342014
Evaluation of Key Management Schemes in Wireless Sensor Networks.00.342014
Traversing symmetric NAT with predictable port allocation00.342014
Improving Intrusion Detection Systems for Wireless Sensor Networks.50.492014
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.00.342013
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks30.412013
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications.00.342013
Using encryption for authentication: Wireless sensor network case.00.342013
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks30.412013
  • 1
  • 2