Wybrane publikacje |
1 | Referat konferencyjny 2021
PACE with Mutual Authentication - towards an upgraded eID in Europe. W: Computer Security - ESORICS 2021 : 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021 : proceedings. Pt. 2 / eds. Elisa Bertino, Haya Shulman, Michael Waidner. Cham : Springer, cop. 2021. s. 501-519. ISBN: 978-3-030-88427-7; 978-3-030-88428-4 | Zasoby:DOIURLSFX | |
|
2 | Komunikat konferencyjny 2021
Poster: eID in Europe - Password authentication revisited. W: 20th International IFIP TC6 Networking Conference : Networking 2021, Espoo, Finland, June 21-24, 2021 / eds. Zheng Yan, Gareth Tyson, Dimitrios Koutsonikolas. [Danvers, MA : IEEE, 2021]. s. 1-3. ISBN: 978-3-903176-39-3 | Zasoby:DOIURL | |
|
3 | Referat konferencyjny 2021
Preventing a fork in a blockchain - David fighting Goliath. W: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China : proceedings / eds. Guojun Wang [i in.]. Danvers, MA : IEEE, 2021. s. 1044-1051. ISBN: 978-0-7381-4380-4 | Zasoby:DOIURL | |
|
4 | Referat konferencyjny 2019
Privacy and security analysis of PACE GM protocol. W: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications : 13th IEEE International Conference on Big Data Science and Engineering, 5-8 August 2019, Rotorua, New Zealand : proceedings. Danvers, MA : IEEE, cop. 2019. s. 763-768. ISBN: 978-1-7281-2777-4 | Zasoby:DOI | |
|
5 | Referat konferencyjny 2015
Anonymous evaluation system. W: Network and System Security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015 : proceedings / Meikang Qiu [i in.] (Eds.). Cham [i in.] : Springer, cop. 2015. s. 283-299. ISBN: 978-3-319-25644-3 | Zasoby:DOISFX | |
|
6 | Referat konferencyjny 2015
Tracing attacks on U-Prove with revocation mechanism. W: ASIACCS'15 : Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, April 14-17, 2015, Singapore. New York, NY : ACM, cop. 2015. s. 603-608. ISBN: 978-1-4503-3245-3 | Zasoby:DOI | |
|
7 | Referat konferencyjny 2014
Supervised usage of signature creation devices. W: Information Security and Cryptology : 9th international conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013 : revised selected papers / Dongdai Lin, Shouhuai Xu, Moti Yung (Eds.). Cham [i in.] : Springer, cop. 2014. s. 132-149. ISBN: 978-3-319-12086-7 | Zasoby:DOISFX | |
|
8 | Referat konferencyjny 2014
Forbidden city model - towards a practice relevant framework for designing cryptographic protocols. W: Information Security Practice and Experience : 10th International conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014 : proceedings / Xinyi Huang, Jianying Zhou (Eds.). Cham [i in.] : Springer, cop. 2014. s. 42-59. ISBN: 978-3-319-06319-5 | Zasoby:DOISFX | |
|
9 | Referat konferencyjny 2014
Probabilistic Admissible Encoding on elliptic curves - towards PACE with generalized Integrated Mapping. W: SOFSEM 2014 : Theory and Practice of Computer Science : 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 26-29, 2014 : proceedings / Viliam Geffert [i in.] (Eds.). Cham [i in.] : Springer, cop. 2014. s. 395-406. ISBN: 978-3-319-04297-8 | Zasoby:DOISFX | |
|
10 | Artykuł 2013
Lightweight digital signature with secretly embedded warning. Control and Cybernetics. 2013, vol. 42, nr 4, s. 825-827. ISSN: 0324-8569 | Zasoby:URLSFX | |
|