Somorovsky, Juraj
33  Ergebnisse:
Personensuche X
?
1

Into the asymmetry 

(Journey through the mathematics of public key cryptography 
 
?
2

Security Analysis of BigBlueButton and eduMEET:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Heitmann, Nico ; Siewert, Hendrik ; Moog, Sven. - p. 190-216 , 2024
 
?
5

Poster: Circumventing the GFW with TLS Record Fragmentation:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Niere, Niklas ; Hebrok, Sven ; Somorovsky, Juraj. - p. 3528-3530 , 2023
 
?
6

Re-Envisioning Industrial Control Systems Security by Consi..:

, In: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
Pottebaum, Jens ; Rossel, Jost ; Somorovsky, Juraj... - p. 379-385 , 2023
 
?
7

Security Analysis of the 3MF Data Format:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
 
?
 
?
9

FutureTrust – Future Trust Services for Trustworthy Global ..:

, In: Challenges in Cybersecurity and Privacy - the European Research Landscape,
Hühnlein, Detlef ; Frosch, Tilman ; Schwenk, Jörg... - p. 285-301 , 2022
 
?
 
?
11

"I don't know why I check this…" Investigating Expert Users..:

Mayer, Peter ; Poddebniak, Damian ; Fischer, Konstantin...
https://discovery.ucl.ac.uk/id/eprint/10174061/1/soups2022-mayer.pdf.  , 2022
 
?
12

Automated Detection of Side Channels in Cryptographic Proto..:

, In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security,
 
?
15

Mitigation of Attacks on Email End-to-End Encryption:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Schwenk, Jörg ; Brinkmann, Marcus ; Poddebniak, Damian... - p. 1647-1664 , 2020
 
1-15