


Остановите войну!
for scientists:


default search action
Miroslaw Kutylowski
Miroslaw Kutylowsky
Person information

- affiliation: Wroclaw University of Technology, Department of Computer Science, Poland
- affiliation: University of Paderborn, Heinz Nixdorf Institute, Germany
- affiliation: Poznań University, Department of Mathematics and Computer Science, Poland
- affiliation (PhD 1985): University of Wroclaw, Institute of Computer Science, Poland
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j43]Miroslaw Kutylowski
, Przemyslaw Blaskiewicz:
Advanced Electronic Signatures and eIDAS - Analysis of the Concept. Comput. Stand. Interfaces 83: 103644 (2023) - 2022
- [c140]Przemyslaw Blaskiewicz
, Miroslaw Kutylowski
:
Chaining Electronic Seals - An eIDAS Compliant Framework for Controlling SSCD. ACIIDS (2) 2022: 714-732 - [e11]Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski
:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - 2021
- [c139]Lukasz Krzywiecki
, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga
:
Hierarchical Ring Signatures Immune to Randomness Injection Attacks. CSCML 2021: 171-186 - [c138]Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski:
PACE with Mutual Authentication - Towards an Upgraded eID in Europe. ESORICS (2) 2021: 501-519 - [c137]Miroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao:
Poster: eID in Europe - Password Authentication Revisited. Networking 2021: 1-3 - [c136]Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski:
Fair Mutual Authentication. SECRYPT 2021: 754-759 - 2020
- [j42]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [c135]Miroslaw Kutylowski
, Anna Lauks-Dutka
, Moti Yung
:
GDPR - Challenges for Reconciling Legal Rules with Technical Reality. ESORICS (1) 2020: 736-755 - [c134]Przemyslaw Kubiak, Miroslaw Kutylowski:
Preventing a Fork in a Blockchain - David Fighting Goliath. TrustCom 2020: 1044-1051 - [e10]Miroslaw Kutylowski
, Jun Zhang
, Chao Chen
:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4 [contents]
2010 – 2019
- 2019
- [j41]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
CTRL-PACE: Controlled Randomness for e-Passport Password Authentication. Fundam. Informaticae 169(4): 295-330 (2019) - [j40]Kamil Kluczniak
, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. Int. J. Inf. Sec. 18(2): 181-197 (2019) - [c133]Przemyslaw Blaskiewicz, Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
:
Revised Gateway Selection for LoRa Radio Networks. ADHOC-NOW 2019: 228-240 - [c132]Miroslaw Kutylowski, Lukasz Krzywiecki
, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. CSCML 2019: 296-315 - [c131]Lukasz Krzywiecki
, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). CSCML 2019: 320-323 - [c130]Miroslaw Kutylowski, Jakub Lemiesz
, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala:
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. ISPEC 2019: 341-361 - [c129]Adam Bobowski, Miroslaw Kutylowski:
Derandomized PACE with Mutual Authentication. NSS 2019: 697-705 - [c128]Miroslaw Kutylowski, Przemyslaw Kubiak
:
Privacy and Security Analysis of PACE GM Protocol. TrustCom/BigDataSE 2019: 763-768 - [p2]Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki
, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola:
Pseudonymous Signature Schemes. Advances in Cyber Security 2019: 185-255 - [r1]Miroslaw Kutylowski, Przemyslaw Blaskiewicz:
Privacy-Aware Identity Management. Encyclopedia of Big Data Technologies 2019 - [i17]Lukasz Krzywiecki
, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. IACR Cryptol. ePrint Arch. 2019: 337 (2019) - 2018
- [j39]Miroslaw Kutylowski, Yu Wang
, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [e9]Lech Jan Janczewski, Miroslaw Kutylowski:
ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 529, Springer 2018, ISBN 978-3-319-99827-5 [contents] - [i16]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token. IACR Cryptol. ePrint Arch. 2018: 1148 (2018) - 2017
- [j38]Yang Xiang
, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j37]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [c127]Jacek Cichon
, Miroslaw Kutylowski, Kamil Wolny:
Braid Chain Radio Communication. ALGOSENSORS 2017: 223-235 - [c126]Lukasz Krzywiecki
, Miroslaw Kutylowski:
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50 - [c125]Miroslaw Kutylowski:
On Crossroads of Privacy Protection. Inscrypt 2017: 11-20 - [c124]Lukasz Krzywiecki
, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98 - 2016
- [j36]Yang Xiang, Man Ho Au
, Miroslaw Kutylowsky:
Security and privacy in big data. Concurr. Comput. Pract. Exp. 28(10): 2856-2857 (2016) - [j35]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu
, Haojin Zhu
:
Cyber security, crime, and forensics of wireless networks and applications. Secur. Commun. Networks 9(16): 3763-3764 (2016) - [c123]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. ACISP (2) 2016: 467-477 - [c122]Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:
A Formal Concept of Domain Pseudonymous Signatures. ISPEC 2016: 238-254 - [c121]Lucjan Hanzlik, Miroslaw Kutylowski:
Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2. ISC 2016: 115-129 - [c120]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. Mycrypt 2016: 215-232 - [c119]Miroslaw Kutylowski, Jacek Cichon
, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c118]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - [c117]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz
, Malgorzata Sulkowska:
Ghost Train for Anonymous Communication. SpaCCS 2016: 224-239 - [c116]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev
:
Local Self-Organization with Strong Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 775-782 - [i15]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada
, Szymon Stefanski, Krzysztof Chrobak:
λ-persistant CSMA: a radio-channel access protocol. CoRR abs/1607.00861 (2016) - [i14]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada
:
One- and Multi-Pass Long-Hop Routing for Wireless Network. CoRR abs/1607.00862 (2016) - [i13]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada
, Krystyna Napierala, Michal Panek, Stanislaw Strzyz:
A Jamming-Resilient MAC-layer Device Identification for Internet of Things. CoRR abs/1607.00863 (2016) - 2015
- [j34]Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma
:
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. J. Cryptol. 28(3): 623-640 (2015) - [j33]Lucjan Hanzlik, Miroslaw Kutylowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model. J. Univers. Comput. Sci. 21(3): 419-439 (2015) - [j32]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk
:
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(2): 29:1-29:27 (2015) - [c115]Marcin Kardas, Miroslaw Kutylowski, Jakub Lemiesz
:
On Distributed Cardinality Estimation: Random Arcs Recycled. ANALCO 2015: 129-137 - [c114]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c113]Lucjan Hanzlik, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. AsiaCCS 2015: 603-608 - [c112]Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung:
Hard Invalidation of Electronic Signatures. ISPEC 2015: 421-436 - [c111]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Anonymous Evaluation System. NSS 2015: 283-299 - [c110]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Insecurity of Anonymous Login with German Personal Identity Cards. SocialSec 2015: 39-43 - [i12]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. IACR Cryptol. ePrint Arch. 2015: 108 (2015) - 2014
- [c109]Lucjan Hanzlik, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. Inscrypt 2014: 475-495 - [c108]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. Financial Cryptography 2014: 283-290 - [c107]Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga
:
Lightweight Protocol for Trusted Spontaneous Communication. INTRUST 2014: 228-242 - [c106]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak
, Lukasz Krzywiecki
:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c105]Lukasz Krzywiecki
, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406 - [e8]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8712, Springer 2014, ISBN 978-3-319-11202-2 [contents] - [e7]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 [contents] - 2013
- [j31]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Attack against Ibrahim's Distributed Key Generation for RSA. Int. J. Netw. Secur. 15(4): 313-316 (2013) - [c104]Przemyslaw Kubiak
, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. Inscrypt 2013: 132-149 - [c103]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki
:
Mutual Restricted Identification. EuroPKI 2013: 119-133 - [c102]Marcin Kik, Maciej Gebala
, Miroslaw Kutylowski:
Bit Reversal Broadcast Scheduling for Ad Hoc Systems. IDCS 2013: 223-237 - [c101]Lucjan Hanzlik, Lukasz Krzywiecki
, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. ISPEC 2013: 218-232 - [c100]Marek Klonowski, Miroslaw Kutylowski, Piotr Syga
:
Chameleon RFID and Tracking Prevention. RFIDSec Asia 2013: 17-29 - [c99]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Efficient and robust data aggregation using untrusted infrastructure. SIN 2013: 123-130 - [c98]Miroslaw Kutylowski, Piotr Lipiak:
Disability Parking Permit - Lightweight But Trustworthy Identity Documents. TrustCom/ISPA/IUCC 2013: 1535-1540 - [c97]Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki
, Miroslaw Kutylowski:
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689 - [e6]Miroslaw Kutylowski, Moti Yung:
Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6 [contents] - [i11]Lukasz Krzywiecki
, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptol. ePrint Arch. 2013: 730 (2013) - 2012
- [j30]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy efficient alert in single-hop networks of extremely weak devices. Theor. Comput. Sci. 453: 65-74 (2012) - [j29]Jacek Cichon
, Zbigniew Golebiewski, Miroslaw Kutylowski:
From key predistribution to key redistribution. Theor. Comput. Sci. 453: 75-87 (2012) - [c96]Lukasz Krzywiecki
, Przemyslaw Kubiak
, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307 - [c95]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Wojciech Wodo
, Kamil Wolny:
Extreme Propagation in an Ad-Hoc Radio Network - Revisited. ICCCI (2) 2012: 142-151 - [c94]Lukasz Krzywiecki
, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24 - [c93]Lukasz Krzywiecki
, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319 - [c92]Miroslaw Kutylowski, Maciej Gebala
:
Optimizing Segment Based Document Protection. SOFSEM 2012: 566-575 - [c91]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Restricted Identification without Group Keys. TrustCom 2012: 1194-1199 - [i10]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski:
One-side Energy costs of the RBO receiver. CoRR abs/1209.4605 (2012) - [i9]Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection (Corrected Version). IACR Cryptol. ePrint Arch. 2012: 520 (2012) - 2011
- [c90]Miroslaw Kutylowski, Anna Lauks-Dutka
:
Challenges for Electronic Identity Documents. BIS (Workshops) 2011: 256-257 - [c89]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki
, Przemyslaw Kubiak
, Wieslaw Paluszynski, Michal Tabor:
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281 - [c88]Miroslaw Kutylowski, Jun Shao:
Signing with multiple ID's and a single key. CCNC 2011: 519-520 - [c87]Miroslaw Kutylowski, Jun Shao:
1-out-of-2 signature. AsiaCCS 2011: 391-395 - [c86]Miroslaw Kutylowski, Lukasz Krzywiecki
, Przemyslaw Kubiak
, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238 - [c85]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - [c84]Krzysztof Barczynski, Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski:
Self-keying Identification Mechanism for Small Devices. STA 2011: 37-44 - [c83]Lukasz Krzywiecki
, Miroslaw Kutylowski:
Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48-62 - [p1]Przemyslaw Blaskiewicz, Miroslaw Kutylowski:
Security and Trust in Sensor Networks. Theoretical Aspects of Distributed Computing in Sensor Networks 2011: 697-739 - 2010
- [j28]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka
:
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. KSII Trans. Internet Inf. Syst. 4(3): 380-399 (2010) - [c82]Przemyslaw Kubiak
, Miroslaw Kutylowski, Jun Shao:
How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73 - [c81]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. ACISP 2010: 391-402 - [c80]Jacek Cichon
, Zbigniew Golebiewski, Miroslaw Kutylowski:
From Key Predistribution to Key Redistribution. ALGOSENSORS 2010: 92-104 - [c79]Przemyslaw Kubiak
, Miroslaw Kutylowski, Anna Lauks-Dutka
, Michal Tabor:
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309 - [c78]Lukasz Krzywiecki
, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386 - [c77]Przemyslaw Blaskiewicz, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270 - [c76]Przemyslaw Blaskiewicz, Przemyslaw Kubiak
, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188 - [c75]Miroslaw Kutylowski, Przemyslaw Kubiak:
Polish Concepts for Securing E-Government Document Flow. ISSE 2010: 399-407 - [c74]Lukasz Krzywiecki
, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123 - [c73]Miroslaw Kutylowski, Filip Zagórski
:
Scratch, Click & Vote: E2E Voting over the Internet. Towards Trustworthy Elections 2010: 343-356 - [e5]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents]
2000 – 2009
- 2009
- [j27]Marek Klonowski, Lukasz Krzywiecki
, Miroslaw Kutylowski, Anna Lauks
:
Step-out group signatures. Computing 85(1-2): 137-151 (2009) - [c72]Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. ACIIDS 2009: 477-482 - [c71]Zbigniew Golebiewski, Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Towards Fair Leader Election in Wireless Networks. ADHOC-NOW 2009: 166-179 - [c70]Jacek Cichon
, Jaroslaw Grzaslewicz, Miroslaw Kutylowski:
Key Levels and Securing Key Predistribution against Node Captures. ALGOSENSORS 2009: 64-75 - [c69]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. ALGOSENSORS 2009: 139-150 - [c68]Jacek Cichon, Maciej Gebala, Miroslaw Kutylowski:
On Optimal One-dimensional Routing Strategies in Sensor Networks. BroadBandCom 2009: 209-214 - [c67]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka
:
Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273 - [e4]Miroslaw Kutylowski, Witold Charatonik, Maciej Gebala:
Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings. Lecture Notes in Computer Science 5699, Springer 2009, ISBN 978-3-642-03408-4 [contents] - [i8]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Security Challenges for Wireless Sensor Networks. ERCIM News 2009(76) (2009) - 2008
- [j26]Lukasz Krzywiecki
, Miroslaw Kutylowski, Maciej Nikodem
:
General anonymous key broadcasting via Lagrangian interpolation. IET Inf. Secur. 2(3): 79-84 (2008) - [j25]Jacek Cichon
, Miroslaw Kutylowski, Marcin Zawada
:
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing. Theor. Comput. Sci. 402(1): 16-28 (2008) - [c66]Jacek Cichon
, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. ACISP 2008: 128-140 - [c65]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
:
Repelling Detour Attack Against Onions with Re-encryption. ACNS 2008: 296-308 - [c64]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Random Fault Attack against Shrinking Generator. ALGOSENSORS 2008: 87-99 - [c63]Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak
, Filip Zagórski
:
Self-stabilizing population of mobile agents. IPDPS 2008: 1-8 - [c62]Marek Klonowski, Lukasz Krzywiecki
, Miroslaw Kutylowski, Anna Lauks
:
Step-Out Ring Signatures. MFCS 2008: 431-442 - [c61]Jacek Cichon
, Miroslaw Kutylowski, Marcin Zawada
:
Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks. MSN 2008: 9-15 - [c60]Jacek Cichon
, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection for RFID with Hidden Subset Identifiers. Pervasive 2008: 298-314 - [c59]Jacek Cichon
, Miroslaw Kutylowski, Bogdan Weglorz:
Short Ballot Assumption and Threeballot Voting Protocol. SOFSEM 2008: 585-598 - [c58]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
Practical Deniable Encryption. SOFS