Follow
Przemysław Blaskiewicz
Przemysław Blaskiewicz
Verified email at pwr.edu.pl
Title
Cited by
Cited by
Year
Theoretical aspects of distributed computing in sensor networks
S Nikoletseas, JDP Rolim
Springer, 2011
392011
An application of GPU parallel computing to power flow calculation in HVDC networks
P Blaskiewicz, M Zawada, P Balcerek, P Dawidowski
2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015
122015
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress
P Błaśkiewicz, P Kubiak, M Kutyłowski
International Conference on Trusted Systems, 173-188, 2010
102010
Digital signatures for e-government-a long-term security architecture
P Błaśkiewicz, P Kubiak, M Kutyłowski
Forensics in Telecommunications, Information, and Multimedia: Third …, 2011
62011
Advanced electronic signatures and eIDAS–analysis of the concept
M Kutyłowski, P Błaśkiewicz
Computer Standards & Interfaces 83, 103644, 2023
52023
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems
P Blaskiewicz, M Klonowski, K Majcher, P Syga
2013 International Conference on Cyber-Enabled Distributed Computing and …, 2013
52013
Lightweight protocol for trusted spontaneous communication
P Błaśkiewicz, M Klonowski, M Kutyłowski, P Syga
Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015
42015
Technical and legal meaning of “sole control”–towards verifiability in signing systems
M Kutyłowski, P Błaśkiewicz, Ł Krzywiecki, P Kubiak, W Paluszyński, ...
International Conference on Business Information Systems, 270-281, 2011
42011
Pseudonymous signature schemes
P Błaśkiewicz, L Hanzlik, K Kluczniak, Ł Krzywiecki, M Kutyłowski, ...
Advances in Cyber Security: Principles, Techniques, and Applications, 185-255, 2019
32019
Extreme propagation in an ad-hoc radio network-revisited
P Błaśkiewicz, M Kutyłowski, W Wodo, K Wolny
Computational Collective Intelligence. Technologies and Applications: 4th …, 2012
32012
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys-Work in Progress.
P Blaskiewicz, P Kubiak, M Kutylowski
INTRUST 6802, 173-188, 2010
32010
RFID system with allowers
P Blaskiewicz, Z Golebiewski, M Klonowski, K Majcher
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
32009
Chaining Electronic Seals: An eIDAS Compliant Framework for Controlling SSCD
P Błaśkiewicz, M Kutyłowski
Asian Conference on Intelligent Information and Database Systems, 714-732, 2022
22022
Revised Gateway Selection for LoRa Radio Networks
P Błaśkiewicz, J Cichoń, M Kutyłowski, M Zawada
Ad-Hoc, Mobile, and Wireless Networks: 18th International Conference on Ad …, 2019
12019
RFID Tags Batch Authentication Revisited–Communication Overhead and Server Computational Complexity Limits
P Błaśkiewicz, Ł Krzywiecki, P Syga
Information Security Practice and Experience: 12th International Conference …, 2016
12016
Signature-in-signature: the last line of defence in case of signing key compromise
P Błaśkiewicz, M Kutyłowski, M Słowik
ESORICS, Part II. LNCS 12973, 777-782, 0
1
Darknet signatures
P Błaśkiewicz, M Kutyłowski, A Lauks-Dutka
2023 International Conference on Data Security and Privacy Protection (DSPP …, 2023
2023
Analiza ekosystemu tożsamości cyfrowej w Polsce, stopnia jego wdrożenia i zastosowanie dowodów osobistych z warstwą elektroniczną
W Wodo, D Rybak, P Błaśkiewicz
Wydawnictwo Uniwersytetu Przyrodniczego, 2023
2023
RFID Batch Authentication—A Usable Scheme Providing Anonymity
P Błaśkiewicz, B Drzazga, Ł Krzywiecki, D Stygar, P Syga
IEEE Access 10, 85368-85383, 2022
2022
Revised Reliable Transmission with Minimal Delay in Wireless Sensor Networks
P Blaskiewicz, J Cichon, M Gebala, M Zawada
Proceedings of the 2020 9th International Conference on Networks …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20