


default search action
Pawel Szalachowski
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yangguang Tian
, Bowen Liu, Yingjiu Li
, Pawel Szalachowski
, Jianying Zhou:
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. IEEE Trans. Inf. Forensics Secur. 19: 1756-1766 (2024) - 2023
- [j22]Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung
, Zengpeng Li:
Decentralized Identity Authentication with Auditability and Privacy. Algorithms 16(1): 4 (2023) - [c47]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret. ACNS Workshops 2023: 530-550 - [c46]Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting. Blockchain 2023: 297-306 - 2022
- [j21]Vishal Sharma
, Zengpeng Li
, Pawel Szalachowski
, Teik Guan Tan
, Jianying Zhou
:
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution. Distributed Ledger Technol. Res. Pract. 1(1): 1-23 (2022) - [j20]Teik Guan Tan
, Pawel Szalachowski, Jianying Zhou
:
Challenges of post-quantum digital signing in real-world applications: a survey. Int. J. Inf. Sec. 21(4): 937-952 (2022) - [c45]Vishal Sharma
, Pawel Szalachowski, Jianying Zhou:
Evaluating Blockchain Protocols with Abusive Modeling. AsiaCCS 2022: 109-122 - [c44]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. DSC 2022: 1-10 - [c43]Dahlia Malkhi, Pawel Szalachowski:
Maximal Extractable Value (MEV) Protection on a DAG. Tokenomics 2022: 6:1-6:17 - [i43]Dahlia Malkhi, Pawel Szalachowski:
Maximal Extractable Value (MEV) Protection on a DAG. CoRR abs/2208.00940 (2022) - [i42]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret. IACR Cryptol. ePrint Arch. 2022: 1373 (2022) - 2021
- [j19]Ivan Homoliak
, Sarad Venugopalan
, Daniël Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
:
The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Commun. Surv. Tutorials 23(1): 341-390 (2021) - [j18]Zengpeng Li
, Zheng Yang
, Pawel Szalachowski
, Jianying Zhou:
Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things. IEEE Internet Things J. 8(2): 844-859 (2021) - [j17]Chunpeng Ge
, Willy Susilo
, Zhe Liu, Jinyue Xia
, Pawel Szalachowski
, Liming Fang
:
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2787-2800 (2021) - [j16]Pawel Szalachowski
:
Password-Authenticated Decentralized Identities. IEEE Trans. Inf. Forensics Secur. 16: 4801-4810 (2021) - [j15]Bithin Alangot
, Daniël Reijsbergen, Sarad Venugopalan
, Pawel Szalachowski
, Kiat Seng Yeo
:
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains. IEEE Trans. Netw. Serv. Manag. 18(2): 1659-1672 (2021) - [c42]Bowen Liu, Pawel Szalachowski, Jianying Zhou:
A First Look into DeFi Oracles. DAPPS 2021: 39-48 - [c41]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
LaKSA: A Probabilistic Proof-of-Stake Protocol. NDSS 2021 - [i41]Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting. CoRR abs/2104.13543 (2021) - [i40]Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou:
Post-Quantum VRF and its Applications in Future-Proof Blockchain System. CoRR abs/2109.02012 (2021) - [i39]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An optimally sharded dual-blockchain for concurrency resolution. CoRR abs/2109.07316 (2021) - 2020
- [j14]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
:
Exploring HTTPS security inconsistencies: A cross-regional perspective. Comput. Secur. 97: 101975 (2020) - [c40]Yangguang Tian
, Nan Li
, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. ACSAC 2020: 813-828 - [c39]Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder
, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. AFT 2020: 145-162 - [c38]Bithin Alangot, Daniël Reijsbergen, Sarad Venugopalan
, Pawel Szalachowski:
Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients. Blockchain 2020: 337-342 - [c37]Juan Guarnizo, Bithin Alangot, Pawel Szalachowski:
SmartWitness: A Proactive Software Transparency System using Smart Contracts. BSCI 2020: 117-129 - [c36]Bowen Liu, Pawel Szalachowski, Siwei Sun:
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. AsiaCCS 2020: 506-518 - [c35]Bowen Liu, Siwei Sun, Pawel Szalachowski:
SMACS: Smart Contract Access Control Service. DSN 2020: 221-232 - [c34]Junming Ke, Pawel Szalachowski, Jianying Zhou
, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. ISC 2020: 334-351 - [i38]Bowen Liu, Pawel Szalachowski, Siwei Sun:
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. CoRR abs/2003.06127 (2020) - [i37]Bowen Liu, Siwei Sun, Pawel Szalachowski:
SMACS: Smart Contract Access Control Service. CoRR abs/2003.07495 (2020) - [i36]Pawel Szalachowski:
SmartCert: Redesigning Digital Certificates with Smart Contracts. CoRR abs/2003.13259 (2020) - [i35]Bowen Liu, Pawel Szalachowski:
A First Look into DeFi Oracles. CoRR abs/2005.04377 (2020) - [i34]Ivan Homoliak, Pawel Szalachowski:
Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing. CoRR abs/2005.13339 (2020) - [i33]Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
ProPoS: A Probabilistic Proof-of-Stake Protocol. CoRR abs/2006.01427 (2020) - [i32]Bithin Alangot, Daniël Reijsbergen, Sarad Venugopalan, Pawel Szalachowski:
Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients. CoRR abs/2007.02287 (2020) - [i31]Pawel Szalachowski:
Password-authenticated Decentralized Identities. CoRR abs/2007.15881 (2020) - [i30]Sarad Venugopalan, Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting. CoRR abs/2010.09112 (2020) - [i29]Eman Salem Alashwali, Pawel Szalachowski, Andrew P. Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. CoRR abs/2010.10170 (2020) - [i28]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. CoRR abs/2011.06257 (2020) - [i27]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. IACR Cryptol. ePrint Arch. 2020: 79 (2020) - [i26]Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu:
Formalizing Bitcoin Crashes with Universally Composable Security. IACR Cryptol. ePrint Arch. 2020: 1098 (2020)
2010 – 2019
- 2019
- [j13]Chunpeng Ge
, Lu Zhou
, Jinyue Xia
, Pawel Szalachowski
, Chunhua Su
:
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing. IEEE Access 7: 137266-137278 (2019) - [j12]Christos Pappas
, Taeho Lee, Raphael M. Reischuk, Pawel Szalachowski
, Adrian Perrig
:
Network Transparency for Better Internet Security. IEEE/ACM Trans. Netw. 27(5): 2028-2042 (2019) - [c33]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? ARES 2019: 23:1-23:7 - [c32]Ivan Homoliak, Sarad Venugopalan
, Qingze Hum, Pawel Szalachowski:
A Security Reference Architecture for Blockchains. Blockchain 2019: 390-397 - [c31]Pawel Szalachowski:
EVLA: Extended-Validation Certificates with Location Assurance. BSCI 2019: 73-79 - [c30]Juan Guarnizo, Pawel Szalachowski:
PDFS: Practical Data Feed Service for Smart Contracts. ESORICS (1) 2019: 767-789 - [c29]Chunpeng Ge, Siwei Sun, Pawel Szalachowski:
Permission less Block chains and Secure Logging. IEEE ICBC 2019: 56-60 - [c28]Pawel Szalachowski:
PADVA: A Blockchain-Based TLS Notary Service. ICPADS 2019: 836-843 - [c27]Junming Ke, Pawel Szalachowski, Jianying Zhou
, Qiuliang Xu, Zheng Yang:
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate. ISC 2019: 3-24 - [c26]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. SecureComm (1) 2019: 341-364 - [c25]Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su:
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds. SocialSec 2019: 139-151 - [c24]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836 - [i25]Chunpeng Ge, Siwei Sun, Pawel Szalachowski:
Permissionless Blockchains and Secure Logging. CoRR abs/1903.03954 (2019) - [i24]Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski:
A Security Reference Architecture for Blockchains. CoRR abs/1904.06898 (2019) - [i23]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019) - [i22]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? CoRR abs/1906.06505 (2019) - [i21]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. CoRR abs/1907.00231 (2019) - [i20]Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniël Reijsbergen, Richard Schumi, Pawel Szalachowski:
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. CoRR abs/1910.09775 (2019) - [i19]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. IACR Cryptol. ePrint Arch. 2019: 821 (2019) - [i18]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? IACR Cryptol. ePrint Arch. 2019: 941 (2019) - 2018
- [j11]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig
, Ralf Sasse
, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. IEEE Trans. Dependable Secur. Comput. 15(3): 393-408 (2018) - [c23]Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Towards Sustainable Evolution for the TLS Public-Key Infrastructure. AsiaCCS 2018: 637-649 - [c22]Eman Salem Alashwali, Pawel Szalachowski:
DSTC: DNS-Based Strict TLS Configurations. CRiSIS 2018: 93-109 - [c21]Pawel Szalachowski:
(Short Paper) Towards More Reliable Bitcoin Timestamps. CVCBT 2018: 101-104 - [c20]Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig
:
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure. ICDM Workshops 2018: 105-114 - [c19]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. iThings/GreenCom/CPSCom/SmartData 2018: 1273-1280 - [c18]Gaurav Varshney, Pawel Szalachowski:
A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. SecureComm (2) 2018: 155-170 - [i17]Pawel Szalachowski:
Towards More Reliable Bitcoin Timestamps. CoRR abs/1803.09028 (2018) - [i16]Pawel Szalachowski:
Blockchain-based TLS Notary Service. CoRR abs/1804.00875 (2018) - [i15]Gaurav Varshney, Pawel Szalachowski:
A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. CoRR abs/1804.04274 (2018) - [i14]Vincent Chia, Pieter H. Hartel, Qingze Hum, Sebastian Ma, Georgios Piliouras, Daniël Reijsbergen, Mark van Staalduinen, Pawel Szalachowski:
Rethinking Blockchain Security: Position Paper. CoRR abs/1806.04358 (2018) - [i13]Juan Guarnizo, Pawel Szalachowski:
PDFS: Practical Data Feed Service for Smart Contracts. CoRR abs/1808.06641 (2018) - [i12]Eman Salem Alashwali, Pawel Szalachowski:
DSTC: DNS-based Strict TLS Configurations. CoRR abs/1809.05674 (2018) - [i11]Lukasz Dykcik, Laurent Chuat, Pawel Szalachowski, Adrian Perrig:
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure. CoRR abs/1809.09544 (2018) - [i10]Ivan Homoliak, Dominik Breitenbacher, Alexander Binder, Pawel Szalachowski:
An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. CoRR abs/1812.03598 (2018) - 2017
- [b1]Adrian Perrig
, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat:
SCION: A Secure Internet Architecture. Information Security and Cryptography, Springer 2017, ISBN 978-3-319-67079-9, pp. 3-386 - [j10]David Barrera, Laurent Chuat, Adrian Perrig
, Raphael M. Reischuk, Pawel Szalachowski:
The SCION internet architecture. Commun. ACM 60(6): 56-65 (2017) - [j9]Stephanos Matsumoto
, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Authentication Challenges in a Global Environment. ACM Trans. Priv. Secur. 20(1): 1:1-1:34 (2017) - [c17]Pawel Szalachowski, Adrian Perrig:
Short Paper: On Deployment of DNS-Based Security Enhancements. Financial Cryptography 2017: 424-433 - [i9]Pawel Szalachowski, Adrian Perrig:
Short Paper: On Deployment of DNS-based Security Enhancements. CoRR abs/1702.05311 (2017) - 2016
- [j8]Yao Zhang, Zhiming Zheng, Pawel Szalachowski, Qi Wang
:
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees. Secur. Commun. Networks 9(16): 3633-3645 (2016) - [c16]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoNEXT 2016: 345-358 - [c15]Pawel Szalachowski, Laurent Chuat, Adrian Perrig
:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. EuroS&P 2016: 407-422 - [c14]Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig
:
RITM: Revocation in the Middle. ICDCS 2016: 189-200 - [c13]Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Communication based on per-packet One-Time Addresses. ICNP 2016: 1-10 - [c12]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. NDSS 2016 - [i8]Pawel Szalachowski, Laurent Chuat, Adrian Perrig:
PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem. CoRR abs/1601.03874 (2016) - [i7]Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig:
RITM: Revocation in the Middle. CoRR abs/1604.08490 (2016) - [i6]Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig:
Source Accountability with Domain-brokered Privacy. CoRR abs/1610.00461 (2016) - 2015
- [j7]Pawel Szalachowski, Tiffany Hyun-Jin Kim:
Secure broadcast in distributed networks with strong adversaries. Secur. Commun. Networks 8(18): 3739-3750 (2015) - [c11]Pawel Szalachowski, Adrian Perrig
:
Lightweight Protection of Group Content Distribution. IoTPTS@AsiaCCS 2015: 35-42 - [c10]Laurent Chuat, Pawel Szalachowski, Adrian Perrig
, Ben Laurie, Eran Messeri:
Efficient gossip protocols for verifying the consistency of Certificate logs. CNS 2015: 415-423 - [c9]Stephanos Matsumoto, Pawel Szalachowski, Adrian Perrig:
Deployment challenges in log-based PKI enhancements. EUROSEC 2015: 1:1-1:7 - [i5]Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Designing a Global Authentication Infrastructure. CoRR abs/1506.03392 (2015) - [i4]David Barrera, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig:
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks. CoRR abs/1508.01651 (2015) - [i3]Taeho Lee, Pawel Szalachowski, David Barrera, Adrian Perrig, Heejo Lee, David Watrin:
Bootstrapping Real-world Deployment of Future Internet Architectures. CoRR abs/1508.02240 (2015) - [i2]Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota, Jumpei Urakawa:
SIBRA: Scalable Internet Bandwidth Reservation Architecture. CoRR abs/1510.02696 (2015) - [i1]Laurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri:
Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs. CoRR abs/1511.01514 (2015) - 2014
- [c8]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig
, Ralf Sasse
, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - [c7]Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig
:
PoliCert: Secure and Flexible TLS Certificate Management. CCS 2014: 406-417 - 2013
- [j6]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski
, Krzysztof Cabaj
, Pawel Szalachowski:
Theory and implementation of a virtualisation level Future Internet defence in depth architecture. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 274-299 (2013) - 2012
- [j5]Pawel Szalachowski, Zbigniew Kotulski
:
One-Time Broadcast Encryption Schemes in Distributed Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j4]Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski
, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer:
Energy-aware Key Management in Mobile Wireless Sensor Networks. Ann. UMCS Informatica 12(4): 83-96 (2012) - [c6]Jerzy Konorski
, Piotr Pacyna, Grzegorz Kolaczek
, Zbigniew Kotulski
, Krzysztof Cabaj
, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. SNDS 2012: 283-292 - [c5]Pawel Szalachowski, Zbigniew Kotulski:
Enhancing the Oakley key agreement protocol with secure time information. SPECTS 2012: 1-8 - 2011
- [j3]Pawel Szalachowski, Zbigniew Kotulski
:
Secure time information in the internet key exchange protocol. Ann. UMCS Informatica 11(3): 41-56 (2011) - [c4]Pawel Szalachowski, Zbigniew Kotulski
, Bogdan Ksiezopolski
:
Secure Position-Based Selecting Scheme for WSN Communication. CN 2011: 386-397 - 2010
- [j2]Pawel Szalachowski, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett. 110(7): 247-251 (2010) - [c3]Bogdan Ksiezopolski
, Pawel Szalachowski, Zbigniew Kotulski
:
SPOT: Optimization Tool for Network Adaptable Security. CN 2010: 269-279 - [c2]Pawel Szalachowski, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks. CN 2010: 280-289
2000 – 2009
- 2009
- [j1]Pawel Szalachowski, Bogdan Ksiezopolski
, Zbigniew Kotulski
:
Optimization of TLS security protocol using the adaptable security model. Ann. UMCS Informatica 9(1): 59-75 (2009) - [c1]Bogdan Ksiezopolski
, Zbigniew Kotulski
, Pawel Szalachowski:
Adaptive Approach to Network Security. CN 2009: 233-241
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint