Reproductive and post‐reproductive life history of wild‐caught Drosophila melanogaster under laboratory conditions P Klepsatel, M Gáliková, N De Maio, S Ricci, C Schlötterer, T Flatt Journal of Evolutionary Biology 26 (7), 1508-1520, 2013 | 74 | 2013 |
Disclosure risk assessment via record linkage by a maximum-knowledge attacker J Domingo-Ferrer, S Ricci, J Soria-Comas 2015 13th Annual Conference on Privacy, Security and Trust (PST), 28-35, 2015 | 58 | 2015 |
Post-quantum era privacy protection for intelligent infrastructures L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ... IEEE Access 9, 36038-36077, 2021 | 51 | 2021 |
Implementing crystals-dilithium signature scheme on fpgas S Ricci, L Malina, P Jedlicka, D Smékal, J Hajny, P Cibik, P Dzurenda, ... Proceedings of the 16th International Conference on Availability …, 2021 | 49 | 2021 |
A privacy-enhancing framework for internet of things services L Malina, G Srivastava, P Dzurenda, J Hajny, S Ricci Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 40 | 2019 |
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. L Malina, J Hajny, P Dzurenda, S Ricci ICETE (2), 692-697, 2018 | 30 | 2018 |
Framework, tools and good practices for cybersecurity curricula J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola IEEE Access 9, 94723-94747, 2021 | 24 | 2021 |
Performance analysis and comparison of different elliptic curves on smart cards P Dzurenda, S Ricci, J Hajny, L Malina 2017 15th Annual Conference on Privacy, Security and Trust (PST), 365-36509, 2017 | 22 | 2017 |
Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms L Malina, S Ricci, P Dzurenda, D Smekal, J Hajny, T Gerlich International Conference on Information Technology and Communications …, 2019 | 15 | 2019 |
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds J Domingo-Ferrer, S Ricci, C Domingo-Enrich Information Sciences 436, 320-342, 2018 | 15 | 2018 |
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud A Calviño, S Ricci, J Domingo-Ferrer 2015 IEEE Conference on Communications and Network Security (CNS), 506-514, 2015 | 13 | 2015 |
PESTLE analysis of cybersecurity education S Ricci, V Janout, S Parker, J Jerabek, J Hajny, A Chatzopoulou, ... Proceedings of the 16th International Conference on Availability …, 2021 | 9 | 2021 |
A methodology to compare anonymization methods regarding their risk-utility trade-off J Domingo-Ferrer, S Ricci, J Soria-Comas Modeling Decisions for Artificial Intelligence: 14th International …, 2017 | 9 | 2017 |
Hardware-accelerated cryptography for software-defined networks with P4 L Malina, D Smekal, S Ricci, J Hajny, P Cíbik, J Hrabovsky International Conference on Information Technology and Communications …, 2020 | 8 | 2020 |
Performance analysis of pairing-based elliptic curve cryptography on constrained devices J Hajny, P Dzurenda, S Ricci, L Malina, K Vrba 2018 10th International Congress on Ultra Modern Telecommunications and …, 2018 | 8 | 2018 |
Privacy-preserving cloud-based statistical analyses on sensitive categorical data S Ricci, J Domingo-Ferrer, D Sánchez Modeling Decisions for Artificial Intelligence: 13th International …, 2016 | 8 | 2016 |
Secret sharing-based authenticated key agreement protocol P Dzurenda, S Ricci, RC Marqués, J Hajny, P Cika Proceedings of the 16th International Conference on Availability …, 2021 | 7 | 2021 |
Cybersecurity curricula designer J Hajny, S Ricci, E Piesarskas, M Sikora Proceedings of the 16th International Conference on Availability …, 2021 | 7 | 2021 |
Privacy-preserving data splitting: a combinatorial approach O Farràs, J Ribes-González, S Ricci Designs, Codes and Cryptography 89 (7), 1735-1756, 2021 | 7 | 2021 |
Local bounds for the optimal information ratio of secret sharing schemes O Farràs, J Ribes-González, S Ricci Designs, Codes and Cryptography 87, 1323-1344, 2019 | 7 | 2019 |