Wybrane publikacje |
1 | Referat konferencyjny 2021
Fair mutual authentication. W: Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT / eds. Sabrina De Capitani di Vimercati and Pierangela Samarati. [Setúbal : SCITEPRESS - Science and Technology Publications, 2021]. s. 754-759. ISBN: 978-989-758-524-1 | Zasoby:DOI | |
|
2 | Referat konferencyjny 2019
Cost-based storage of the R-tree aggregated values over flash memory. W: Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018) / eds. Luciana Andrawina [i in.]. Amsterdam [i in.] : Atlantis Press, 2019. s. 97-102. ISBN: 978-94-6252-689-1 | Zasoby:DOI | |
|
3 | Referat konferencyjny 2017
On structural entropy of uniform random intersection graphs. W: 2017 IEEE International Symposium on Information Theory (ISIT 2017), Aachen, Germany, 25-30 June 2017. Piscataway, NJ : IEEE, cop. 2017. s. 1470-1474. ISBN: 978-1-5090-4097-1 | Zasoby:DOI | |
|
4 | Referat konferencyjny 2016
Efficient probabilistic methods for proof of possession in clouds. W: Data Mining and Big Data : First International Conference, DMBD 2016, Bali, Indonesia, June 25-30, 2016 : proceedings / Ying Tan, Yuhui Shi (eds.). [Cham] : Springer, cop. 2016. s. 364-372. ISBN: 978-3-319-40972-6 | Zasoby:DOISFX | |
|
5 | Referat konferencyjny 2013
Hidden bits approach for authentication in RFID systems. W: Radio frequency identification : security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 : revised selected papers / Jaap-Henk Hoepman, Ingrid Verbauwhede (Eds.). Berlin ; Heidelberg : Springer, cop. 2013. s. 48-58. ISBN: 978-3-642-36139-5 | Zasoby:DOIURLSFX | |
|
6 | Referat konferencyjny 2013
Blocker-type methods for protecting customers' privacy in RFID systems. W: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Beijing, China, 10-12 October 2013. Los Alamitos [i in.] : IEEE Computer Society, cop. 2013. s. 89-96. ISBN: 978-0-7695-5106-7 | Zasoby:DOI | |
|
7 | Referat konferencyjny 2011
Practical attacks on HB and HB+ protocols. W: Information Security Theory and Practice : Security and Privacy of Mobile Devices in Wireless Communication : 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011 : proceedings / Claudio A. Ardagna, Jianying Zhou (eds.). Heidelberg [i in.] : Springer, cop. 2011. s. 244-253. ISBN: 978-3-642-21039-6 | Zasoby:DOISFX | |
|
8 | Referat konferencyjny 2011
RFID electronic visa with personalized verification. W: Radio frequency identification system security : RFIDsec'11 Asia Workshop : proceedings / ed. by Tieyan Li [i in.]. Amsterdam [i in.] : IOS Press, cop. 2011. s. 81-95. ISBN: 978-1-60750-721-5 | Zasoby:DOISFX | |
|
9 | Referat konferencyjny 2009
RFID system with allowers. W: Pervasive Computing and Communications, 2009, PerCom 2009 : IEEE International Conference, 9-13 March 2009, Galveston, TX, USA. [Piscataway, NJ] : IEEE, cop. 2009. s. 1-6. ISBN: 978-1-4244-3304-9 | Zasoby:DOI | |
|
10 | Artykuł 2008
Attacks on CKK family of RFID authentication protocols. Lecture Notes in Computer Science. 2008, vol. 5198, s. 241-250. ISSN: 0302-9743 | Zasoby:DOISFX | |
|