RESULTS
Function–Threat Alignment in CPS with FAST and MITRE ATT&CK
Antipenko, V., Matulevičius, R. (2026). Function–Threat Alignment in CPS with FAST and MITRE ATT&CK. In: Deneckère, R., Kirikova, M., Grabis, J. (eds) Perspectives in Business Informatics Research. BIR 2025.
Network Traffic Encryptor on Linux Platform
Author: Jan Havlín; Supervisor: Jan Hajný
Network Infrastructure for Performance Testing of Quantum-Safe Encryptors
Author: Adam Fridrich; Supervisor: Jan Hajný
Analysis of security features of smart lock protocol
Author: Petr Hanák; Supervisors: Petr Švenda and Arnis Parsovs
Two-Party ECDSA with JavaCard-Based Smartcards
Dufka, A., Laud, P., Švenda, P. (2025). Two-Party ECDSA with JavaCard-Based Smartcards. In: Fischlin, M., Moonsamy, V. (eds) Applied Cryptography and Network Security. ACNS 2025. Lecture Notes in Computer Science, vol 15826. Springer, Cham.
Large-Scale Security Analysis of Hardware Wallets
Šorf, M., Švenda, P., Chmielewski, Ł. (2025). Large-Scale Security Analysis of Hardware Wallets. In: Coppens, B., Volckaert, B., Naessens, V., De Sutter, B. (eds) Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science, vol 15995. Springer, Cham.
BlockSci-based methods for Bitcoin on-chain analysis with focus on CoinJoin
Author: Stanislav Boboň; Supervisor: Petr Švenda
Cryptographic policies for private key operations
Author: Martin Sečkár; Supervisor: Petr Švenda
AI-Driven Blockchain-based Federated Learning for Edge Devices
Author: Lanxiang Zhang; Supervisor: Mubashar Iqbal