On public-key cryptosystems based on combinatorial group theory JC Birget, SS Magliveras, M Sramka Cryptology ePrint Archive, 2005 | 62 | 2005 |
Cryptanalysis of video encryption algorithms T Seidel, D Socek, M Sramka Proceedings of The 3rd central european conference on cryptology TATRACRYPT, 2003 | 55 | 2003 |
Privacy-preserving publication of trajectories using microaggregation J Domingo-Ferrer, M Sramka, R Trujillo-Rasúa Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010 | 46 | 2010 |
A practice-oriented framework for measuring privacy and utility in data sanitization systems M Sramka, R Safavi-Naini, J Denzinger, M Askari Proceedings of the 2010 EDBT/ICDT Workshops, 1-10, 2010 | 30 | 2010 |
Discrete logarithms for finite groups LC Klingler, SS Magliveras, F Richman, M Sramka Computing 85 (1), 3-19, 2009 | 17 | 2009 |
On the security of Stickel’s key exchange scheme M Sramka Journal of Combinatorial Mathematics and Combinatorial Computing 66, 2008 | 16 | 2008 |
Parallel symmetric attack on NTRU using non-deterministic lattice reduction TE Seidel, D Socek, M Sramka Designs, Codes and Cryptography 32, 369-379, 2004 | 14 | 2004 |
An attack on the privacy of sanitized data that fuses the outputs of multiple data miners M Sramka, R Safavi-Naini, J Denzinger 2009 IEEE International Conference on Data Mining Workshops, 130-137, 2009 | 12 | 2009 |
A privacy attack that removes the majority of the noise from perturbed data M Sramka The 2010 international joint conference on neural networks (IJCNN), 1-8, 2010 | 11 | 2010 |
Evaluating privacy risks in social networks from the user’s perspective M Sramka Advanced Research in Data Privacy, 251-267, 2015 | 10 | 2015 |
Utility of knowledge extracted from unsanitized data when applied to sanitized data M Sramka, R Safavi-Naini, J Denzinger, M Askari, J Gao 2008 Sixth Annual Conference on Privacy, Security and Trust, 227-231, 2008 | 8 | 2008 |
Cryptanalysis of the Cryptosystem Based on DLP gamma= alphaabetab. M Sramka Int. J. Netw. Secur. 6 (1), 80-81, 2008 | 7 | 2008 |
Privacy scores: Assessing privacy risks beyond social networks M Sramka Infocommunications Journal 4 (4), 36-41, 2012 | 6 | 2012 |
Data mining as a tool in privacy-preserving data publishing M Sramka Tatra Mountains Mathematical Publications 45 (1), 151-159, 2010 | 5 | 2010 |
New results in group theoretic cryptology M Sramka Florida Atlantic University, 2006 | 5 | 2006 |
An improvement to a biometric. based multimedia content protection scheme D Socek, M Sramka, O Marques, D Ćulibrk Proceedings of the 8th workshop on Multimedia and security, 135-139, 2006 | 3 | 2006 |
Breaching privacy using data mining: Removing noise from perturbed data M Sramka Computational Intelligence for Privacy and Security, 135-157, 2012 | 2 | 2012 |
Disclosure Control by Computer Scientists: An Overview and an Application of Microaggregation to Mobility Data Anonymization J Domingo-Ferrer, M Sramka | 2 | 2011 |
Utility of knowledge discovered from sanitized data M Sramka, R Safavi-Naini, J Denzinger, M Askari, J Gao Technical Report 2008-910-23, University of Calgary, 2008 | 2 | 2008 |
Efficiency of the Elliptic Curve Cryptosystems M Sramka, O Grosek Slovak University of Technology, Department of Mathematics, SK–812 19, 0 | 2 | |