On the credibility of wireless sensor network simulations: evaluation of intrusion detection system A Stetsko, T Smolka, V Matyas, F Jurnečka Proceedings of the 5th International ICST Conference on Simulation Tools and …, 2012 | 9 | 2012 |
On the credibility of wireless sensor network simulations: evaluation of intrusion detection system A Stetsko, T Smolka, V Matyas, F Jurnečka Proceedings of the 5th International ICST Conference on Simulation Tools and …, 2012 | 9 | 2012 |
Improving intrusion detection systems for wireless sensor networks A Stetsko, T Smolka, V Matyáš, M Stehlík International Conference on Applied Cryptography and Network Security, 343-360, 2014 | 8 | 2014 |
Improving resiliency of java card code against power analysis J Kur, T Smolka, P Svenda Mikulaska kryptobesidka, Sbornik prispevku, 29-39, 2009 | 7 | 2009 |
Evolutionary design of message efficient secrecy amplification protocols T Smolka, P Švenda, L Sekanina, V Matyáš European Conference on Genetic Programming, 194-205, 2012 | 6 | 2012 |
Automatic source code transformations for strengthening practical security of smart card applications V Lorenc, T Smolka, P Švenda Sborník příspěvků, 93, 2010 | 4 | 2010 |
Nástroj pro automatizaci obsluhy dat na kryptografické cipové karte T Smolka Bakalárska práca, FI MUNI 4, 4, 2008 | 2 | 2008 |
Zvýšení bezpeˇcnosti aplikací na ˇcipových kartách s využitím automatické transformace BT Smolka | 1 | |
WSNProtectLayer V Matyáš, M Gazdík, F Jurnečka, D Klinec, J Kůr, L Němec, T Smolka, ... | | 2014 |
CesTa k ochraně čipových karet J Kůr, T Smolka, P Švenda | | 2010 |