Masarykova univerzita

Výpis publikací

česky | in English

Filtrování publikací

    2024

    1. JANOVSKÝ, Adam, Lukasz Michal CHMIELEWSKI, Petr ŠVENDA, Ján JANČÁR a Václav MATYÁŠ. Chain of Trust: Unraveling References Among Common Criteria Certified Products. Online. In Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis. ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology. volume 710. Cham: Springer Nature Switzerland, 2024, s. 191-205. ISBN 978-3-031-65175-5. Dostupné z: https://dx.doi.org/10.1007/978-3-031-65175-5_14.
    2. JANOVSKÝ, Adam, Ján JANČÁR, Petr ŠVENDA, Lukasz Michal CHMIELEWSKI, Jiří MICHALÍK a Václav MATYÁŠ. sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security. 2024, roč. 2024, č. 143, s. "103895", 13 s. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2024.103895.

    2023

    1. JANOVSKÝ, Adam, Davide MAIORCA, Dominik MACKO, Václav MATYÁŠ a Giorgio GIACINTO. Explaining the Use of Cryptographic API in Android Malware. Online. In Van Sinderen, M., Wijnhoven, F., Hammoudi, S., Samarati, P., Vimercati. E-Business and Telecommunications. Cham: Springer Nature Switzerland, 2023, s. 69-97. ISBN 978-3-031-45136-2. Dostupné z: https://dx.doi.org/10.1007/978-3-031-45137-9_4.

    2022

    1. JANOVSKÝ, Adam, Davide MAIORCA, Dominik MACKO, Václav MATYÁŠ a Giorgio GIACINTO. A Longitudinal Study of Cryptographic API: a Decade of Android Malware. In Sabrina De Capitani di Vimercati and Pierangela Samarati. Proceedings of the 19th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2022, s. 121-133. ISBN 978-989-758-590-6. Dostupné z: https://dx.doi.org/10.5220/0011265300003283.
    2. ŠVENDA, Petr a Adam JANOVSKÝ. Analysis of cryptographic implementations, Intermediate report fo progress for NUKIB, CRoCS@FI Masaryk Univerzity. 2022.

    2020

    1. JANOVSKÝ, Adam, Matúš NEMEC, Petr ŠVENDA, Peter SEKAN a Václav MATYÁŠ. Biased RSA private keys: Origin attribution of GCD-factorable keys. In Liqun Chen and Ninghui Li and Kaitai Liang and Steve Schneider. Computer Security – ESORICS 2020. Cham, Switzerland: Springer, 2020, s. 505-524. ISBN 978-3-030-59012-3. Dostupné z: https://dx.doi.org/10.1007/978-3-030-59013-0_25.

    2019

    1. JANOVSKÝ, Adam, Jan KRHOVJÁK a Václav MATYÁŠ. Bringing kleptography to real-world TLS. Online. In Olivier Blazy, Chan Yeob Yeun. Information Security Theory and Practice. Cham, Switzerland: Springer, 2019, s. 15-27. ISBN 978-3-030-20073-2. Dostupné z: https://dx.doi.org/10.1007/978-3-030-20074-9_3.
Zobrazit podrobně
Zobrazeno: 29. 8. 2024 06:00