Certificating vehicle public key with vehicle attributes S Dolev, N Panwar, M Segal, L Krzywiecki US Patent 9,769,658, 2017 | 66 | 2017 |
Vehicle authentication via monolithically certified public key and attributes S Dolev, Ł Krzywiecki, N Panwar, M Segal Wireless Networks 22, 879-896, 2016 | 34 | 2016 |
Smart home survey on security and privacy N Panwar, S Sharma, S Mehrotra, Ł Krzywiecki, N Venkatasubramanian arXiv preprint arXiv:1904.05476, 2019 | 28 | 2019 |
Optical PUF for non-forwardable vehicle authentication S Dolev, Ł Krzywiecki, N Panwar, M Segal Computer Communications 93, 52-67, 2016 | 27 | 2016 |
Dynamic attribute based vehicle authentication S Dolev, Ł Krzywiecki, N Panwar, M Segal Wireless Networks 23, 1045-1062, 2017 | 23 | 2017 |
Simplified PACE| AA Protocol L Hanzlik, Ł Krzywiecki, M Kutyłowski International Conference on Information Security Practice and Experience …, 2013 | 21 | 2013 |
Step-out ring signatures M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks International symposium on mathematical foundations of computer science, 431-442, 2008 | 20 | 2008 |
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret Ł Krzywiecki International Conference for Information Technology and Communications, 137-148, 2016 | 19 | 2016 |
Proof of possession for cloud storage via lagrangian interpolation techniques Ł Krzywiecki, M Kutyłowski International Conference on Network and System Security, 305-319, 2012 | 19 | 2012 |
Certificating vehicle public key with vehicle attributes a (periodical) licensing routine, against man-in-the-middle attacks and beyond S Dolev, L Krzywiecki, N Panwar, M Segal SAFECOMP 2013-Workshop ASCoMS (Architecting Safety in Collaborative Mobile …, 2013 | 16 | 2013 |
A revocation scheme preserving privacy Ł Krzywiecki, P Kubiak, M Kutyłowski International Conference on Information Security and Cryptology, 130-143, 2006 | 12 | 2006 |
Security of okamoto identification scheme: a defense against ephemeral key leakage and setup L Krzywiecki, M Kutylowski Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017 | 11 | 2017 |
Mutual restricted identification L Hanzlik, K Kluczniak, M Kutyłowski, Ł Krzywiecki Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 11 | 2014 |
Coalition resistant anonymous broadcast encryption scheme based on PUF Ł Krzywiecki, M Kutyłowski International Conference on Trust and Trustworthy Computing, 48-62, 2011 | 9 | 2011 |
Random Subsets of the Interval and p2p Protocols J Cichoń, M Klonowski, Ł Krzywiecki, B Różański, P Zieliński International Workshop on Approximation Algorithms for Combinatorial …, 2007 | 9 | 2007 |
Mutual chip authentication L Hanzlik, K Kluczniak, L Krzywiecki, M Kutylowski 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 8 | 2013 |
Restricted identification scheme and diffie-hellman linking problem M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza International Conference on Trusted Systems, 221-238, 2011 | 7 | 2011 |
Optical puf for vehicles non-forwardable authentication S Dolev, Ł Krzywiecki, N Panwar, M Segal Dept. Comput. Sci., Ben-Gurion Univ. Negev, Beersheba, Israel, 15-02, 2015 | 6 | 2015 |
Stamp and extend–instant but undeniable timestamping based on lazy trees Ł Krzywiecki, P Kubiak, M Kutyłowski Trusted Systems: 4th International Conference, INTRUST 2012, London, UK …, 2012 | 6 | 2012 |
Anonymous distribution of encryption keys in cellular broadcast systems J Cichoń, Ł Krzywiecki, M Kutyłowski, P Wlaź Secure Mobile Ad-hoc Networks and Sensors: First International Workshop …, 2006 | 6 | 2006 |