Professor
Head of Institute ProtectIT; Course Co-ordinator Bachelor Cyber Security;Member of Examination Board Further Education Centre
Please ask (via E-Mail)
The Benefits of Combining Trusted Computing with Virtualization Techniques.
In: Applied Electronics International Conference
Pilsen, Tschechische Republik
The Benefits of Combining Trusted Computing with Virtualization Techniques.
In: IEEE International Conference on Applied Electronics 2010
Pilsen, Tschechische Republik
Utilizing a State-of-the-art Trust Anchor in Order to Increase the Trustworthiness of Embedded Platforms.
In: Embedded World International Conference 2011
Nürnberg
Trustworthy Building Blocks for a More Secure Embedded Computing Environment.
In: Applied Electronics International Conference
Pilsen, Tschechische Republik
The Establishment of High Degrees of Trust in a Linux Environment.
In: Embedded World International Conference 2012
Nürnberg
Reconfigurable Trust for Embedded Computing Platforms.
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
On the Implementation of a Lightweight Generic FPGA ECC Crypto-Core over GF(p).
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
On the Implementation of an Efficient Multiplier Logic for FPGA-based Cryptographic Applications.
In: IEEE Applied Electronics International Conference
Pilsen, Tschechische Republik
Enhanced Embedded Device Security by Combining Hardware-Based Trust Mechanisms. Poster-Session.
In: ACM Conference on Computer and Communications Security
Berlin
Embedded Trusted Computing on ARM-based Systems.
In: Security Forum 2014
Hagenberg im Mühlkreis, Österreich
Trusted Computing Concepts for Resilient Embedded Networks. International Workshop on Engineering Cyber Security and Resilience.
In: 2014 ASE Bigdata/SocialCom/Cybersecurity Conference
Stanford University Stanford, CA, USA
Resilience in Embedded Industrial Networks.
In: Trusted Computing Group Members Meeting 2014
Barcelona, Spanien
Embedded Plug-In Devices to Secure Industrial Network Communications.
In: IEEE Proceedings of the 21st International Conference on Applied Electronics (Sept 6-7 2016, Pilsen, Czech Republic).
Assessment simulation model for uncoupled message authentication.
In: Proceedings of the 22nd International Conference on Applied Electronics (AE 2017) [Sep 5-7, 2017; University of West Bohemia, Pilsen, Czech Republic].
Experimental assessment of FIRO- and GARO-based noise sources for digital TRNG designs on FPGAs.
In: Proceedings of the 22nd International Conference on Applied Electronics (AE 2017) [Sep 5-7, 2017; University of West Bohemia, Pilsen, Czech Republic]. pg. 1-6
Incident Reaction Based on Intrusion Detections’ Alert Analysis.
In: Proceedings of the 23rd International Conference on Applied Electronics (AE) 2018 (University of West Bohemia, Pilsen, Czech Republic; September 11-12, 2018). pg. 1-6
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF( 2m ) Based on Montgomery Arithmetic (Article ID 4983404).
In: Security and Communication Networks pg. 1-18
DOI: 10.1155/2018/4983404
A Practical Introduction to Cryptographic Engineering. [Invited Talk; eingeladen von Dalibor Fiala (PhD)].
Fakultät angewandte Wissenschaften, Department of Computer Science and Engineering Pilsen, Tschechische Republik
A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection.
In: Computers & Security vol. 85 pg. 270-285
DOI: 10.1016/j.cose.2019.05.010
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks.
In: Proceedings of the 2019 International Electronics Communication Conference (IECC '19) [July 7-9, 2019; Okinawa, Japan]. pg. 21-26
Hacking an optics manufacturing machine: You don't see it coming?!.
In: Proceedings of SPIE 11171 (Sixth European Seminar on Precision Optics Manufacturing, 1117101 [9-10 April 2019, Teisnach]). pg. 11171071-11171076
Bellingham, WA, USA
DOI: 10.1117/12.2526691
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication.
In: Proceedings of the IEEE Annual International Conference on Pervasive Computing and Communications Workshops (March 11-15, 2019; Kyoto, Japan). pg. 906-911
DOI: 10.1109/PERCOMW.2019.8730749
Delegation of Authentication to the Data Plane in Software Defined Networks.
In: Proceedings of the 18th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2019) [October 21-23, 2019, Shenyang, China]. pg. 58-65
DOI: 10.1109/IUCC/DSCI/SmartCNS.2019.00038
On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor Networks.
In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (July 26-28, 2019; Prague, Czech Republic). pg. 72-83
Lightweight edge authentication for software defined networks.
In: Computing (Special Issue)
DOI: 10.1007/s00607-020-00835-4
On the Improvement of the Isolation Forest Algorithm for Outlier Detection with Streaming Data.
In: Electronics vol. 10 pg. 1534
DOI: 10.3390/electronics10131534
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data.
In: Electronics vol. 10 pg. 2160
DOI: 10.3390/electronics10172160
Unsupervised Feature Selection for Outlier Detection on Streaming Data to Enhance Network Security.
In: Applied Sciences vol. 11 pg. 12073
DOI: 10.3390/app112412073
A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.
In: Proceedings of the International Wireless Communications & Mobile Computing Conference (IWCMC 2023): Smart & Sustainable Communications.
DOI: 10.1109/IWCMC58020.2023.10183131
Anonymization Procedures for Tabular Data: An Explanatory Technical and Legal Synthesis.
In: Information vol. 14 pg. 487
DOI: 10.3390/info14090487
Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.
In: Proceedings of the 10th International Conference on Ubiquitous Networking (UNet24).
ClustEm4Ano: Clustering Text Embeddings of Nominal Textual Attributes for Microdata Anonymization.
In: Database Engineered Applications. (Lecture Notes in Computer Science) pg. 122-137
Springer Nature Switzerland Cham
DOI: 10.1007/978-3-031-83472-1_9
Institute ProtectIT
IT-Security