Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
public:papers:wistp2015 [2015-09-03 08:14] petrspublic:papers:wistp2015 [2015-09-03 09:40] petrs
Line 6: Line 6:
  
   * Conference page: [[http://wistp2015.wistp.org/|WISTP 2015]]   * Conference page: [[http://wistp2015.wistp.org/|WISTP 2015]]
-  * Download paper: {{:public:papers:secamplif_wistp15.pdf|pdf}}+  * Download author pre-print of the paper: {{:public:papers:secamplif_wistp15.pdf|pdf}}
   * Download extended version of paper: {{:public:papers:secamplif_tr15_final.pdf|FIMU-RS-2015-01}} (technical report, FI MUNI)   * Download extended version of paper: {{:public:papers:secamplif_tr15_final.pdf|FIMU-RS-2015-01}} (technical report, FI MUNI)
   * Download presentation: {{:public:papers:secamplif_wistp15_svenda_slides.pdf|pdf}}   * Download presentation: {{:public:papers:secamplif_wistp15_svenda_slides.pdf|pdf}}
Line 13: Line 13:
 **Bibtex:** **Bibtex:**
    @inproceedings{secrecyamplif_wistp2015,    @inproceedings{secrecyamplif_wistp2015,
-     author = {Radim O\v{s}\v{t}\'{a}dal and Petr \v{S}venda and V{\'a}clav Maty{\'a}\v{s}},+     author = {Radim O\v{s}\v{t}\'{a}dal \Petr \v{S}venda \and V{\'a}clav Maty{\'a}\v{s}},
      title = {On Secrecy Amplification Protocols},      title = {On Secrecy Amplification Protocols},
      booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015),      booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015),
Line 46: Line 46:
 {{:public:papers:secure_links_random.png|}} {{:public:papers:secure_links_random.png|}}
  
-//Figure showing increase in the number of secured links after SA protocols in the random+//Figure showing increase in the number of secured links after secrecy amplification protocols in the random
 compromise pattern on network with 20.3 legal neighbours on average. With in- compromise pattern on network with 20.3 legal neighbours on average. With in-
 creasing number of neighbouring nodes the general effectiveness of protocol grows. creasing number of neighbouring nodes the general effectiveness of protocol grows.