Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:wistp2015 [2015-09-03 08:14] petrspublic:papers:wistp2015 [2016-12-01 13:28] (current) – external edit 127.0.0.1
Line 6: Line 6:
  
   * Conference page: [[http://wistp2015.wistp.org/|WISTP 2015]]   * Conference page: [[http://wistp2015.wistp.org/|WISTP 2015]]
-  * Download paper: {{:public:papers:secamplif_wistp15.pdf|pdf}}+  * Download author pre-print of the paper: {{:public:papers:secamplif_wistp15.pdf|pdf}}
   * Download extended version of paper: {{:public:papers:secamplif_tr15_final.pdf|FIMU-RS-2015-01}} (technical report, FI MUNI)   * Download extended version of paper: {{:public:papers:secamplif_tr15_final.pdf|FIMU-RS-2015-01}} (technical report, FI MUNI)
   * Download presentation: {{:public:papers:secamplif_wistp15_svenda_slides.pdf|pdf}}   * Download presentation: {{:public:papers:secamplif_wistp15_svenda_slides.pdf|pdf}}
Line 13: Line 13:
 **Bibtex:** **Bibtex:**
    @inproceedings{secrecyamplif_wistp2015,    @inproceedings{secrecyamplif_wistp2015,
-     author = {Radim O\v{s}\v{t}\'{a}dal and Petr \v{S}venda and V{\'a}clav Maty{\'a}\v{s}},+     author = {Radim O\v{s}\v{t}\'{a}dal \Petr \v{S}venda \and V{\'a}clav Maty{\'a}\v{s}},
      title = {On Secrecy Amplification Protocols},      title = {On Secrecy Amplification Protocols},
      booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015),      booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015),
Line 46: Line 46:
 {{:public:papers:secure_links_random.png|}} {{:public:papers:secure_links_random.png|}}
  
-//Figure showing increase in the number of secured links after SA protocols in the random+//Figure showing increase in the number of secured links after secrecy amplification protocols in the random
 compromise pattern on network with 20.3 legal neighbours on average. With in- compromise pattern on network with 20.3 legal neighbours on average. With in-
 creasing number of neighbouring nodes the general effectiveness of protocol grows. creasing number of neighbouring nodes the general effectiveness of protocol grows.