Discover Cutting-Edge Cyber-security Insights: Explore CHESS’s latest publications, where innovation meets expertise.
2024
Explore our 2024 Collection: This collection features pivotal publications that highlight the year’s most significant advancements and research findings in the field.
Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation
Dufka, A., Janků, J., Švenda, P. (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.
Read MoreComparable and Repeatable Information Security Level Evaluation
Seeba, M., (2024) CAiSE 2024 Doctoral Consortium; Published in: CAiSE 2024 Doctoral Consortium, CEUR Workshop Proceedings.
Read MoreSecure and Privacy-Preserving Car-Sharing Systems
M., Lukas, Dzurenda, P., Lövinger, N., Ekeh, I. E., Matulevicius, R., (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.
Read MoreDECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain
Iqbal, M., Suhail, S., Matulevicius, R. (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.
Read MoreThe Power of Many: Securing Organisational Identity Through Distributed Key Management
Bakhtina, M., Kvapil, J., Švenda, P., and Matulevičius, R., (2024) Published in: Advanced Information Systems Engineering. CAiSE 2024. Lecture Notes in Computer Science, vol 14663. Springer, Cham.
Read MoreCHESS: Cyber-security Excellence Hub in Estonia and South Moravia
Bakhtina, M., Vémolová, Z., and Matyáš, V., (2024). Published in: RPE@CAiSE’24: Research Projects Exhibition at the International Conference on Advanced Information Systems Engineering.
Read MoreThe Adoption Rate of JavaCard Features by Certified Products and Open-Source Projects
Zaoral, L., Dufka, A., and Svenda, P., (2024). Published in: Smart Card Research and Advanced Applications. CARDIS 2023. Lecture Notes in Computer Science, vol 14530. Springer, Cham.
Read MorePost-quantum trails: an educational board game about post-quantum cryptography
Vakarjuk, J., and Snetkov, N., (2024). Published in: Proceedings of the 7th International Conference on Historical Cryptology (HistoCrypt 2024)
Read MoreOptimizing Local Satisfaction of Long-Run Average Objectives in Markov Decision Processes
Klašk, D., Kučera, A., Kůr, V., Musil, V., and Řehák, V. (2024). Published in: Proceedings of the AAAI Conference on Artificial Intelligence, 38(18), 20143-20150.
Read MoreTighter Construction of Tight Büchi Automata
Jankola, M., Strejček, J., (2024). Published in: Foundations of Software Science and Computation Structures. FoSSaCS 2024. Lecture Notes in Computer Science, vol 14574. Springer, Cham.
Read MoreInformation Security and Privacy Management in Intelligent Transportation Systems
Bakhtina, M., Matulevičius, R., Malina, L. (2024). Published in: Complex Systems Informatics and Modeling Quarterly (CSIMQ) Issue 38, March/April 2024.
Read More2023
Explore our 2023 Collection: A Year of Breakthroughs in Cyber-security. This collection features pivotal publications that highlight the year’s most significant advancements and research findings in the field.
String Diagrammatic Trace Theory
Earnshaw, M. Sobociński, P., (2023). Published in: 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023).
Read More2LS: Arrays and Loop Unwinding
Malík, V., Nečas, F., Schrammel, P., Vojnar, T. (2023). Published in: Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol 13994. Springer, Cham.
Read MoreReducing Acceptance Marks in Emerson-LeiAutomata by QBF Solving
Schwarzová, T., Strejček, J., Major, J. (2023). Published in: 26th International Conference on Theory and Applications of Satisfiability Testing, SAT 2023, July 4-8, 2023, Alghero, Italy
Read MoreAutomated feedback for participants of hands-on cybersecurity training
Švábenský, V., Vykopal, J., Čeleda, P., Dovjak, J. (2023). Published in: Journal of Education and Information Technologies (2023).
Read MoreLattice-Based Threshold Signature Implementation for Constrained Devices
Dobias, P., Ricci, S., Dzurenda, P., Malina, L., Snetkov, N. (2023). Published in: Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). Science and Technology Publications. 2023. ISBN: 978-989-758-666-8.p. 724-730.
Read MoreOn Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms
Dobias, P., Malina, L., Ilgner, P., Dzurenda, P. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 127, 1–9.2023.
Read MoreSecurity level evaluation with F4SLE
Seeba, M., Oja, T., Murumaa, M. P., Stupka, V. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 132, 1–8.
Read MoreA Decentralised Public Key Infrastructure for X-Road
Bakhtina, M., Leung, K. L., Matulevičius, R., Awad, A., Švenda, P. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 128, 1–8.
Read MoreA Model of Qualitative Factors in Forensic-Ready Software Systems
Daubner, L., Matulevičius, R., Buhnova, B. (2023). Published in: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds) Research Challenges in Information Science: Information Science and the Connected World. RCIS 2023. Lecture Notes in Business Information Processing, vol 476. Springer, Cham.
Read MoreTowards More Secure and Data Protective Intelligent Infrastructure Systems
Bakhtina, M. (2023). Published in: CEUR Workshop Proceedings of the Doctoral Consortium Papers Presented at the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), June 12–16, 2023, Zaragoza, Spain.
Read MoreA Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture
Daubner, L., Matulevičius, R., Buhnova, B., Antol, M., Růžička, M., Pitner, T. (2023). Published in: Indulska, M., Reinhartz-Berger, I., Cetina, C., Pastor, O. (eds) Advanced Information Systems Engineering. CAiSE 2023. Lecture Notes in Computer Science, vol 13901. Springer, Cham.
Read MoreSynthesizing Resilient Strategies for Infinite-Horizon Objectives in Multi-Agent Systems
Klaška, D., Kučera, A., Kurečka, M., Musil, V., Novotný, P., Řehák, V. (2023). Published in: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China.
Read More