default search action
Sara Ricci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Sara Ricci, Patrik Dobias, Lukas Malina, Jan Hajny, Petr Jedlicka:
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography. IEEE Access 12: 23206-23219 (2024) - [j8]Sara Ricci, Simon Parker, Jan Jerabek, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Imre Lendak, Vladimir Janout:
Understanding Cybersecurity Education Gaps in Europe. IEEE Trans. Educ. 67(2): 190-201 (2024) - [c30]Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão:
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques. ARES 2024: 107:1-107:10 - [c29]Sara Ricci, Vladyslav Shapoval, Petr Dzurenda, Peter B. Roenne, Jan Oupický, Lukas Malina:
Lattice-based Multisignature Optimization for RAM Constrained Devices. ARES 2024: 155:1-155:10 - [c28]Peter Cíbik, Patrik Dobias, Sara Ricci, Jan Hajny, Lukas Malina, Petr Jedlicka, David Smekal:
Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests. ACNS Workshops (1) 2024: 303-318 - 2023
- [c27]Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak:
DJM-CYBER: A Joint Master in Advanced Cybersecurity. ARES 2023: 65:1-65:10 - [c26]Alan Briones Delgado, Sara Ricci, Argyro Chatzopoulou, Jakub Cegan, Petr Dzurenda, Ioannis Koutoudis:
Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology. ARES 2023: 66:1-66:7 - [c25]Patrik Dobias, Sara Ricci, Petr Dzurenda, Lukas Malina, Nikita Snetkov:
Lattice-Based Threshold Signature Implementation for Constrained Devices. SECRYPT 2023: 724-730 - 2022
- [c24]Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys:
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. ARES 2022: 84:1-84:10 - [c23]Sara Ricci, Petr Dzurenda, Raúl Casanova Marqués, Petr Cika:
Threshold Signature for Privacy-Preserving Blockchain. BPM (Blockchain and RPA Forum) 2022: 100-115 - [c22]Lukas Malina, Sara Ricci, Patrik Dobias, Petr Jedlicka, Jan Hajny, Kim-Kwang Raymond Choo:
On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms. SECRYPT 2022: 605-613 - 2021
- [j7]Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-Amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang:
Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access 9: 36038-36077 (2021) - [j6]Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta, Rocco De Nicola:
Framework, Tools and Good Practices for Cybersecurity Curricula. IEEE Access 9: 94723-94747 (2021) - [j5]Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina:
Privacy-Enhancing Group Signcryption Scheme. IEEE Access 9: 136529-136551 (2021) - [j4]Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Privacy-preserving data splitting: a combinatorial approach. Des. Codes Cryptogr. 89(7): 1735-1756 (2021) - [c21]Sara Ricci, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda, Patrik Dobias:
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. ARES 2021: 1:1-1:11 - [c20]Sara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel:
PESTLE Analysis of Cybersecurity Education. ARES 2021: 142:1-142:8 - [c19]Jan Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora:
Cybersecurity Curricula Designer. ARES 2021: 144:1-144:7 - [c18]Petr Dzurenda, Sara Ricci, Raúl Casanova Marques, Jan Hajny, Petr Cika:
Secret Sharing-based Authenticated Key Agreement Protocol. ARES 2021: 152:1-152:10 - [c17]Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, Lukas Malina:
Privacy-Preserving Online Parking Based on Smart Contracts. ARES 2021: 153:1-153:10 - [c16]Lukas Malina, Peter Cíbik, Petr Jedlicka, David Smekal, Sara Ricci, Jakub Hrabovsky:
Hardware-based Cryptographic Accelerator for Post Quantum Era. ICUMT 2021: 149-155 - [c15]Sara Ricci, Petr Jedlicka, Peter Cíbik, Petr Dzurenda, Lukas Malina, Jan Hajny:
Towards CRYSTALS-Kyber VHDL Implementation. SECRYPT 2021: 760-765 - [i5]Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cíbik, Patrik Dobias:
Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. IACR Cryptol. ePrint Arch. 2021: 108 (2021) - [i4]Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina:
Privacy-Enhancing Group Signcryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1050 (2021) - 2020
- [j3]Josep Domingo-Ferrer, David Sánchez, Sara Ricci, Mónica Muñoz-Batista:
Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds. Knowl. Inf. Syst. 62(6): 2301-2326 (2020) - [c14]Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter Cíbik, Jakub Hrabovsky:
Hardware-Accelerated Cryptography for Software-Defined Networks with P4. SECITC 2020: 271-287
2010 – 2019
- 2019
- [j2]Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Local bounds for the optimal information ratio of secret sharing schemes. Des. Codes Cryptogr. 87(6): 1323-1344 (2019) - [c13]Carles Angles-Tafalla, Sara Ricci, Petr Dzurenda, Jan Hajny, Jordi Castellà-Roca, Alexandre Viejo:
Decentralized Privacy-preserving Access for Low Emission Zones. ICETE (2) 2019: 485-491 - [c12]David Smekal, Sara Ricci, Petr Dzurenda, Zdenek Martinasek:
Privacy-enhancing Cloud Computing Solution for Big Data. ICUMT 2019: 1-6 - [c11]Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci:
A Privacy-Enhancing Framework for Internet of Things Services. NSS 2019: 77-97 - [c10]Lukas Malina, Sara Ricci, Petr Dzurenda, David Smekal, Jan Hajny, Tomas Gerlich:
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. SECITC 2019: 109-124 - [i3]Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci:
A Privacy-Enhancing Framework for Internet of Things Services. IACR Cryptol. ePrint Arch. 2019: 1471 (2019) - 2018
- [b1]Sara Ricci:
Outsourcing Computation on Non-Encrypted SensitiveData to Untrusted Clouds. University of Rovira i Virgili, Spain, 2018 - [j1]Josep Domingo-Ferrer, Sara Ricci, Carles Domingo-Enrich:
Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds. Inf. Sci. 436-437: 320-342 (2018) - [c9]Jan Hajny, Petr Dzurenda, Lukas Malina, Sara Ricci:
Anonymous Data Collection Scheme from Short Group Signatures. ICETE (2) 2018: 366-375 - [c8]Lukas Malina, Jan Hajny, Petr Dzurenda, Sara Ricci:
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. ICETE (2) 2018: 692-697 - [c7]Jan Hajny, Petr Dzurenda, Sara Ricci, Lukas Malina, Kamil Vrba:
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices. ICUMT 2018: 1-5 - [i2]Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Privacy-preserving Data Splitting: A Combinatorial Approach. CoRR abs/1801.05974 (2018) - 2017
- [c6]Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas:
A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off. MDAI 2017: 132-143 - [c5]Petr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina:
Performance Analysis and Comparison of Different Elliptic Curves on Smart Cards. PST 2017: 365-374 - [c4]Petr Dzurenda, Jan Hajny, Lukas Malina, Sara Ricci:
Anonymous Credentials with Practical Revocation using Elliptic Curves. SECRYPT 2017: 534-539 - 2016
- [c3]Sara Ricci, Josep Domingo-Ferrer, David Sánchez:
Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data. MDAI 2016: 227-238 - [i1]Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures. IACR Cryptol. ePrint Arch. 2016: 726 (2016) - 2015
- [c2]Aida Calvino, Sara Ricci, Josep Domingo-Ferrer:
Privacy-preserving distributed statistical computation to a semi-honest multi-cloud. CNS 2015: 506-514 - [c1]Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas:
Disclosure risk assessment via record linkage by a maximum-knowledge attacker. PST 2015: 28-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-06 22:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint