Skip to content

Publications

Discover Cutting-Edge Cyber-security Insights: Explore CHESS’s latest publications, where innovation meets expertise.

2024

Explore our 2024 Collection: This collection features pivotal publications that highlight the year’s most significant advancements and research findings in the field.

Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computation

Dufka, A., Janků, J., Švenda, P. (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.

Read More

Comparable and Repeatable Information Security Level Evaluation

Seeba, M., (2024) CAiSE 2024 Doctoral Consortium; Published in: CAiSE 2024 Doctoral Consortium, CEUR Workshop Proceedings.

Read More

Secure and Privacy-Preserving Car-Sharing Systems

M., Lukas, Dzurenda, P., Lövinger, N., Ekeh, I. E., Matulevicius, R., (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.

Read More

DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain

Iqbal, M., Suhail, S., Matulevicius, R. (2024) Published in: Proceedings of the 19th International Conference on Availability, Reliability and Security.

Read More

The Power of Many: Securing Organisational Identity Through Distributed Key Management

Bakhtina, M., Kvapil, J., Švenda, P., and Matulevičius, R., (2024) Published in: Advanced Information Systems Engineering. CAiSE 2024. Lecture Notes in Computer Science, vol 14663. Springer, Cham.

Read More

CHESS: Cyber-security Excellence Hub in Estonia and South Moravia

Bakhtina, M., Vémolová, Z., and Matyáš, V., (2024). Published in: RPE@CAiSE’24: Research Projects Exhibition at the International Conference on Advanced Information Systems Engineering.

Read More

The Adoption Rate of JavaCard Features by Certified Products and Open-Source Projects

Zaoral, L., Dufka, A., and Svenda, P., (2024). Published in: Smart Card Research and Advanced Applications. CARDIS 2023. Lecture Notes in Computer Science, vol 14530. Springer, Cham.

Read More

Post-quantum trails: an educational board game about post-quantum cryptography

Vakarjuk, J., and Snetkov, N., (2024). Published in: Proceedings of the 7th International Conference on Historical Cryptology (HistoCrypt 2024)

Read More

Optimizing Local Satisfaction of Long-Run Average Objectives in Markov Decision Processes

Klašk, D., Kučera, A., Kůr, V., Musil, V., and Řehák, V. (2024). Published in: Proceedings of the AAAI Conference on Artificial Intelligence, 38(18), 20143-20150.

Read More

Tighter Construction of Tight Büchi Automata

Jankola, M., Strejček, J., (2024). Published in: Foundations of Software Science and Computation Structures. FoSSaCS 2024. Lecture Notes in Computer Science, vol 14574. Springer, Cham.

Read More

Information Security and Privacy Management in Intelligent Transportation Systems

Bakhtina, M., Matulevičius, R., Malina, L. (2024). Published in: Complex Systems Informatics and Modeling Quarterly (CSIMQ) Issue 38, March/April 2024.

Read More
2023

Explore our 2023 Collection: A Year of Breakthroughs in Cyber-security. This collection features pivotal publications that highlight the year’s most significant advancements and research findings in the field.

String Diagrammatic Trace Theory

Earnshaw, M. Sobociński, P., (2023). Published in: 48th International Symposium on Mathematical Foundations of Computer Science (MFCS 2023).

Read More

2LS: Arrays and Loop Unwinding

Malík, V., Nečas, F., Schrammel, P., Vojnar, T. (2023). Published in: Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. Lecture Notes in Computer Science, vol 13994. Springer, Cham.

Read More

Reducing Acceptance Marks in Emerson-LeiAutomata by QBF Solving

Schwarzová, T., Strejček, J., Major, J. (2023). Published in: 26th International Conference on Theory and Applications of Satisfiability Testing, SAT 2023, July 4-8, 2023, Alghero, Italy

Read More

Automated feedback for participants of hands-on cybersecurity training

Švábenský, V., Vykopal, J., Čeleda, P., Dovjak, J. (2023). Published in: Journal of Education and Information Technologies (2023).

Read More

Lattice-Based Threshold Signature Implementation for Constrained Devices

Dobias, P., Ricci, S., Dzurenda, P., Malina, L., Snetkov, N. (2023). Published in: Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). Science and Technology Publications. 2023. ISBN: 978-989-758-666-8.p. 724-730.

Read More

On Efficiency and Usability of Group Signatures on Smartphone and Single-board Platforms

Dobias, P., Malina, L., Ilgner, P., Dzurenda, P. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 127, 1–9.2023.

Read More

Security level evaluation with F4SLE

Seeba, M., Oja, T., Murumaa, M. P., Stupka, V. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 132, 1–8.

Read More

A Decentralised Public Key Infrastructure for X-Road

Bakhtina, M., Leung, K. L., Matulevičius, R., Awad, A., Švenda, P. (2023). Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES '23). Association for Computing Machinery, New York, NY, USA, Article 128, 1–8.

Read More

A Model of Qualitative Factors in Forensic-Ready Software Systems

Daubner, L., Matulevičius, R., Buhnova, B. (2023). Published in: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds) Research Challenges in Information Science: Information Science and the Connected World. RCIS 2023. Lecture Notes in Business Information Processing, vol 476. Springer, Cham.

Read More

Towards More Secure and Data Protective Intelligent Infrastructure Systems

Bakhtina, M. (2023). Published in: CEUR Workshop Proceedings of the Doctoral Consortium Papers Presented at the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), June 12–16, 2023, Zaragoza, Spain.

Read More

A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture

Daubner, L., Matulevičius, R., Buhnova, B., Antol, M., Růžička, M., Pitner, T. (2023). Published in: Indulska, M., Reinhartz-Berger, I., Cetina, C., Pastor, O. (eds) Advanced Information Systems Engineering. CAiSE 2023. Lecture Notes in Computer Science, vol 13901. Springer, Cham.

Read More

Synthesizing Resilient Strategies for Infinite-Horizon Objectives in Multi-Agent Systems

Klaška, D., Kučera, A., Kurečka, M., Musil, V., Novotný, P., Řehák, V. (2023). Published in: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China.

Read More