Follow
Dan Cvrcek
Dan Cvrcek
Independent
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
A study on the value of location privacy
D Cvrcek, M Kumpost, V Matyas, G Danezis
Proceedings of the 5th ACM workshop on Privacy in electronic society, 109-118, 2006
2502006
A touch of evil: High-assurance cryptographic hardware from untrusted components
V Mavroudis, A Cerulli, P Svenda, D Cvrcek, D Klinec, G Danezis
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
482017
Smart dust security–key infection revisited
D Cvrcek, P Svenda
Electronic Notes in Theoretical Computer Science 157 (3), 11-25, 2006
302006
Steel, cast iron and concrete: Security engineering for real world wireless sensor networks
F Stajano, D Cvrcek, M Lewis
Applied Cryptography and Network Security: 6th International Conference …, 2008
262008
Combining trust and risk to reduce the cost of attacks
D Cvrček, K Moody
International Conference on Trust Management, 372-383, 2005
192005
On the role of contextual information for privacy attacks and classification
D Cvrcek, V Matyas
Workshop on Privacy and Security Aspects of Data Mining, 31-39, 2004
182004
Dynamics of reputation
D Cvrcek
9th Nordic Workshop on Secure IT-systems (Nordsec’04), 1-14, 2004
182004
Pseudonymity in the light of evidence-based trust
D Cvrček, V Matyáš
Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28 …, 2006
152006
The value of location information: A European-wide study
D Cvrcek, M Kumpost, V Matyas, G Danezis
Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 …, 2009
132009
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
122008
Hardware scrambling-no more password leaks
D Cvrcek
Technical report, 2014
112014
The Future of Identity in the Information Society: 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised …
V Matyáš, S Fischer-Hübner, D Cvrcek, P Švenda
Springer Science & Business Media, 2009
112009
Authorizing card payments with pins
V Matyas, J Krhovják, M Kumpost, D Cvrcek
Computer 41 (2), 64-68, 2008
112008
Autentizace uživatelů a autorizace elektronických transakcí
V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ...
TATE International, sro, 2007
102007
Evidence processing and privacy issues in evidence-based reputation systems
D Cvrček, V Matyáš Jr, A Patel
Computer standards & interfaces 27 (5), 533-545, 2005
82005
PIN (and chip) or signature: beating the cheating?
D Cvrcek, J Krhovjak, V Matyas
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007
62007
Real-world problems of PKI hierarchy
D Cvrcek
Proceedings of the SPI Conference, Brno Czech, 39-46, 2001
52001
Analyses of real email traffic properties
K Malinka, P Hanácek, D Cvrcek
Radioengineering 18 (4), 7, 2009
42009
Unwrapping the Chrysalis
M Bond, D Cvrček, SJ Murdoch
University of Cambridge, Computer Laboratory, 2004
42004
Mandatory access control in workflow systems
D Cvrcek
Proceedings of the JCKBSE Conference, 247-254, 2000
32000
The system can't perform the operation now. Try again later.
Articles 1–20