On the credibility of wireless sensor network simulations: evaluation of intrusion detection system A Stetsko, T Smolka, F Jurnečka, V Matyas Fifth International Conference on Simulation Tools and Techniques, 2012 | 11 | 2012 |
On the credibility of wireless sensor network simulations: evaluation of intrusion detection system A Stetsko, T Smolka, F Jurnečka, V Matyas Fifth International Conference on Simulation Tools and Techniques, 2012 | 11 | 2012 |
Improving intrusion detection systems for wireless sensor networks A Stetsko, T Smolka, V Matyáš, M Stehlík Applied Cryptography and Network Security: 12th International Conference …, 2014 | 10 | 2014 |
Improving resiliency of java card code against power analysis J Kur, T Smolka, P Svenda Mikulaska kryptobesidka, Sbornik prispevku, 29-39, 2009 | 7 | 2009 |
Evolutionary design of message efficient secrecy amplification protocols T Smolka, P Švenda, L Sekanina, V Matyáš Genetic Programming: 15th European Conference, EuroGP 2012, Málaga, Spain …, 2012 | 6 | 2012 |
Automatic source code transformations for strengthening practical security of smart card applications V Lorenc, T Smolka, P Švenda Sborník příspěvků, 93, 2010 | 5 | 2010 |
Nástroj pro automatizaci obsluhy dat na kryptografické cipové karte T Smolka Bakalárska práca, FI MUNI 4, 4, 2008 | 2 | 2008 |
Zvýšení bezpeˇcnosti aplikací na ˇcipových kartách s využitím automatické transformace BT Smolka | 1 | |
WSNProtectLayer V Matyáš, M Gazdík, F Jurnečka, D Klinec, J Kůr, L Němec, T Smolka, ... | | 2014 |
CesTa k ochraně čipových karet J Kůr, T Smolka, P Švenda | | 2010 |