Ing. Lukáš MALINA

Publications

Journal papers
MALINA, L.; VIVES-GUASCH, A.; CASTELLA-ROCA, J.; VIEJO, A.; HAJNÝ, J. Efficient Group Signatures for Privacy- Preserving Vehicular Networks. TELECOMMUNICATION SYSTEMS, 2014, vol. 2014, no. 11, p. 1-18. ISSN: 1018- 4864.
Conference papers
MALINA, L.; HAJNÝ, J.; ZEMAN, V. Usability of Pairing- Based Cryptography on Smartphones. In 37th International Conference on Telecommunications and Signal Processing TSP. 2014. p. 56-61. ISBN: 978-80-214-4983- 1.
ČLUPEK, V.; MALINA, L.; ZEMAN, V. Secure Digital Archiving in Post- Quantum Era. In 37th International Conference on Telecommunications and Signal Processing TSP. 2014. p. 85-89. ISBN: 978-80-214-4983- 1.
MALINA, L.; ČLUPEK, V.; MARTINÁSEK, Z.; HAJNÝ, J.; OGUCHI, K.; ZEMAN, V. Evaluation of Software- Oriented Block Ciphers on Smartphones. In Foundations and Practice of Security. Lecture Notes in Computer Science. Springer International Publishing, 2014. p. 353-368. ISBN: 978-3-319-05301- 1. ISSN: 0302- 9743.
HAJNÝ, J.; MALINA, L.; MARTINÁSEK, Z.; TĚTHAL, O. Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-cards and Smart- phones. In Data Privacy Management and Autonomous Spontaneous Security. Springer, 2014. p. 17-33. ISBN: 978-3-642-54567- 2.
MALINA, L.; HAJNÝ, J.; MATEJ, M.; ZEMAN, V.; MARTINÁSEK, Z. Network Infrastructure Testing with DDoS Attacks. In Proceedings of 15th International Conference on Research in Telecommunication Technologies. 2013. p. 92-95. ISBN: 978-80-227-4026- 5.
HAJNÝ, J.; MALINA, L.; MARTINÁSEK, Z.; ZEMAN, V. Privacy-preserving SVANETs: Privacy-preserving Simple Vehicular Ad- hoc Networks. In Proceedings of the 10th International Conference on Security and Cryptography. 2013. p. 267-274. ISBN: 978-989-8565-73- 0.
MALINA, L.; HAJNÝ, J.; MARTINÁSEK, Z. Efficient Group Signatures with Verifier- local Revocation Employing a Natural Expiration. In Proceedings of the 10th International Conference on Security and Cryptography. 2013. p. 555-560. ISBN: 978-989-8565-73- 0.
MALINA, L.; HAJNÝ, J.; ZEMAN, V. Trade- off between Signature Aggregation and Batch Verification. In 36th International Conference on Telecommunications and Signal Processing TSP. 2013. p. 57-62. ISBN: 978-1-4799-0403- 7.
MALINA, L.; HAJNÝ, J. Efficient Security Solution for Privacy- Preserving Cloud Services. In 36th International Conference on Telecommunications and Signal Processing TSP. 2013. p. 23-28. ISBN: 978-1-4799-0403- 7.
HAJNÝ, J.; MALINA, L. Unlinkable Attribute-Based Credentials with Practical Revocation on Smart- Cards. In Smart Card Research and Advanced Applications. Lecture Notes in Computer Science. LNCS. Berlin: Springer- Verlag, 2013. p. 62-76. ISBN: 978-3-642-37287- 2. ISSN: 0302- 9743.
MALINA, L.; CASTELLA-ROCA, J.; VIVES-GUASCH, A.; HAJNÝ, J. Short- Term Linkable Group Signatures with Categorized Batch Verification. In Foundations and Practice of Security. Lecture Notes in Computer Science. LNCS. Berlin: Springer- Verlag, 2013. p. 244-260. ISBN: 978-3-642-37118- 9. ISSN: 0302- 9743.
HAJNÝ, J.; MALINA, L. Anonymous Credentials with Practical Revocation. In Proceedings of the First AESS European Conference on Satellite Telecommunications. 2012. p. 1-6. ISBN: 978-1-4673-4688- 7.
HAJNÝ, J.; MALINA, L. Practical Revocable Anonymous Credentials. In Proceedings of the 13th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security - CMS 2012. Springer, 2012. p. 211-213. ISBN: 978-3-642-32804- 6.
MALINA, L.; HAJNÝ, J.; ZEMAN, V. Group signatures for secure and privacy preserving vehicular ad hoc networks. In Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks - Q2SWinet ' 12. New York, NY, USA: ACM, 2012. p. 71-74. ISBN: 978-1-4503-1619- 4.
ČERVENKA, V.; KOMOSNÝ, D.; MALINA, L.; MRÁZ, Ľ. Energy Efficient Public Key Cryptography in Wireless Sensor Networks. In Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. USA, Berkeley: Springer New York, 2012. p. 497-509. ISBN: 978-1-4614-3534- 1.
Others
MALINA, L. Privacy Preserving Cryptographic Protocols for Secure Heterogeneous Networks. 2014. p. 1-167.