Zobrazeno 1 - 10
of 91
pro vyhledávání: '"Vashek Matyas"'
Publikováno v:
IEEE Access, Vol 12, Pp 131297-131312 (2024)
Fingerprint verification is a popular smartphone authentication method used even for sensitive services such as banking. However, fingerprint verification also has some issues, such as spoofing even by inexperienced impostors utilizing a thumbs up In
Externí odkaz:
https://doaj.org/article/aa9c7a11cff64c52b5e419257078a2ff
Publikováno v:
PeerJ Computer Science, Vol 7, p e376 (2021)
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (
Externí odkaz:
https://doaj.org/article/1ec160d21dcd40a192c2aa09d5dcb723
Publikováno v:
Sensors, Vol 19, Iss 22, p 5041 (2019)
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocol
Externí odkaz:
https://doaj.org/article/59f48b66b15a4b04bc5bbdcefd81ac86
Publikováno v:
Sensors, Vol 19, Iss 4, p 914 (2019)
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic proto
Externí odkaz:
https://doaj.org/article/b936e86884a744a1886fac7eb8a75ec4
Publikováno v:
Communications of the ACM. 65:37-40
Turning believers into nonbelievers.
Publikováno v:
FNC/MobiSPC
Wireless sensor networks with a large number of cheap, low-power interconnected devices bring up challenging tasks when considering the security of their communications. We have previously proposed two novel approaches to updating cryptographic link
Publikováno v:
IEEE Networking Letters. 2:67-70
Spectrum Sharing Data Falsification (SSDF) attacks can cause heavy performance degradation to Cognitive Radio (CR) based Internet of Battlefield Things (IoBT) networks. The challenge in such networks is to handle this security problem real time, in a
Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::684e1e889e99df52c0e0239ea824fb55
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9f6faeaef75c32d31e7dd6cc37e9dfbb
https://doi.org/10.1007/978-3-031-17433-9_21
https://doi.org/10.1007/978-3-031-17433-9_21
Publikováno v:
Journal of Cryptology. 35
We analyze Dieharder statistical randomness tests according to accuracy and correct interpretation of their results. We used all tests, processed 8 TB of quantum-generated data, and obtained null distributions of first-level and second-level p-values