Theoretical aspects of distributed computing in sensor networks S Nikoletseas, JDP Rolim Springer, 2011 | 40 | 2011 |
An application of GPU parallel computing to power flow calculation in HVDC networks P Blaskiewicz, M Zawada, P Balcerek, P Dawidowski 2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015 | 12 | 2015 |
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress P Błaśkiewicz, P Kubiak, M Kutyłowski International Conference on Trusted Systems, 173-188, 2010 | 10 | 2010 |
Advanced electronic signatures and eIDAS–analysis of the concept M Kutyłowski, P Błaśkiewicz Computer Standards & Interfaces 83, 103644, 2023 | 9 | 2023 |
Digital signatures for e-government-a long-term security architecture P Błaśkiewicz, P Kubiak, M Kutyłowski Forensics in Telecommunications, Information, and Multimedia: Third …, 2011 | 6 | 2011 |
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems P Blaskiewicz, M Klonowski, K Majcher, P Syga 2013 International Conference on Cyber-Enabled Distributed Computing and …, 2013 | 5 | 2013 |
Lightweight protocol for trusted spontaneous communication P Błaśkiewicz, M Klonowski, M Kutyłowski, P Syga Trusted Systems: 6th International Conference, INTRUST 2014, Beijing, China …, 2015 | 4 | 2015 |
Pseudonymous signature schemes P Błaśkiewicz, L Hanzlik, K Kluczniak, Ł Krzywiecki, M Kutyłowski, ... Advances in Cyber Security: Principles, Techniques, and Applications, 185-255, 2019 | 3 | 2019 |
Extreme propagation in an ad-hoc radio network-revisited P Błaśkiewicz, M Kutyłowski, W Wodo, K Wolny Computational Collective Intelligence. Technologies and Applications: 4th …, 2012 | 3 | 2012 |
Technical and legal meaning of “sole control”–towards verifiability in signing systems M Kutyłowski, P Błaśkiewicz, Ł Krzywiecki, P Kubiak, W Paluszyński, ... International Conference on Business Information Systems, 270-281, 2011 | 3 | 2011 |
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys-Work in Progress. P Blaskiewicz, P Kubiak, M Kutylowski INTRUST 6802, 173-188, 2010 | 3 | 2010 |
RFID system with allowers P Blaskiewicz, Z Golebiewski, M Klonowski, K Majcher 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 3 | 2009 |
Chaining Electronic Seals: An eIDAS Compliant Framework for Controlling SSCD P Błaśkiewicz, M Kutyłowski Asian Conference on Intelligent Information and Database Systems, 714-732, 2022 | 2 | 2022 |
RFID Batch Authentication—A Usable Scheme Providing Anonymity P Błaśkiewicz, B Drzazga, Ł Krzywiecki, D Stygar, P Syga IEEE Access 10, 85368-85383, 2022 | 1 | 2022 |
Revised Gateway Selection for LoRa Radio Networks P Błaśkiewicz, J Cichoń, M Kutyłowski, M Zawada Ad-Hoc, Mobile, and Wireless Networks: 18th International Conference on Ad …, 2019 | 1 | 2019 |
RFID Tags Batch Authentication Revisited–Communication Overhead and Server Computational Complexity Limits P Błaśkiewicz, Ł Krzywiecki, P Syga Information Security Practice and Experience: 12th International Conference …, 2016 | 1 | 2016 |
Signature-in-signature: the last line of defence in case of signing key compromise P Błaśkiewicz, M Kutyłowski, M Słowik ESORICS, Part II. LNCS 12973, 777-782, 0 | 1 | |
Darknet signatures P Błaśkiewicz, M Kutyłowski, A Lauks-Dutka 2023 International Conference on Data Security and Privacy Protection (DSPP …, 2023 | | 2023 |
Analiza ekosystemu tożsamości cyfrowej w Polsce, stopnia jego wdrożenia i zastosowanie dowodów osobistych z warstwą elektroniczną W Wodo, D Rybak, P Błaśkiewicz Wydawnictwo Uniwersytetu Przyrodniczego, 2023 | | 2023 |
Revised Reliable Transmission with Minimal Delay in Wireless Sensor Networks P Blaskiewicz, J Cichon, M Gebala, M Zawada Proceedings of the 2020 9th International Conference on Networks …, 2020 | | 2020 |