Practical deniable encryption M Klonowski, P Kubiak, M Kutyłowski SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on …, 2008 | 92 | 2008 |
Extended sanitizable signatures M Klonowski, A Lauks International Conference on Information Security and Cryptology, 343-355, 2006 | 80 | 2006 |
Onions based on universal re-encryption–anonymous communication immune against repetitive attack M Gomułkiewicz, M Klonowski, M Kutyłowski Information Security Applications: 5th International Workshop, WISA 2004 …, 2005 | 48 | 2005 |
Kleptographic attacks on e-voting schemes M Gogolewski, M Klonowski, P Kubiak, M Kutyłowski, A Lauks, F Zagórski Emerging Trends in Information and Communication Security: International …, 2006 | 46 | 2006 |
Rapid mixing and security of Chaum’s visual electronic voting M Gomułkiewicz, M Klonowski, M Kutyłowski European Symposium on Research in Computer Security, 132-145, 2003 | 41 | 2003 |
Energy-efficient leader election protocols for single-hop radio networks M Kardas, M Klonowski, D Pajak 2013 42nd International Conference on Parallel Processing, 399-408, 2013 | 33 | 2013 |
User authorization based on hand geometry without special equipment M Klonowski, M Plata, P Syga Pattern Recognition 73, 189-201, 2018 | 31 | 2018 |
Approximating the size of a radio network in beeping model P Brandes, M Kardas, M Klonowski, D Paj±k, R Wattenhofer Structural Information and Communication Complexity: 23rd International …, 2016 | 27 | 2016 |
Universal re-encryption of signatures and controlling anonymous information flow M Klonowski, M Kutylowski, A Lauks, F Zagorski WARTACRYPT 4, 1-3, 2004 | 27 | 2004 |
Anonymous communication with on-line and off-line onion encoding M Klonowski, M Kutyłowski, F Zagórski SOFSEM 2005: Theory and Practice of Computer Science: 31st Conference on …, 2005 | 26 | 2005 |
Dynamic sharing of a multiple access channel M Bienkowski, M Klonowski, M Korzeniowski, DR Kowalski arXiv preprint arXiv:1001.3044, 2010 | 24 | 2010 |
Privacy protection for RFID with hidden subset identifiers J Cichoń, M Klonowski, M Kutyłowski International Conference on Pervasive Computing, 298-314, 2008 | 23 | 2008 |
Forward-secure key evolution in wireless sensor networks M Klonowski, M Kutyłowski, M Ren, K Rybarczyk Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007 | 22 | 2007 |
DUO-Onions and Hydra-Onions—failure and adversary resistant onion protocols J Iwanik, M Klonowski, M Kutyłowski Communications and Multimedia Security: 8 th IFIP TC-6 TC-11 Conference on …, 2005 | 22 | 2005 |
Provable anonymity for networks of mixes M Klonowski, M Kutyłowski International Workshop on Information Hiding, 26-38, 2005 | 21 | 2005 |
Step-out ring signatures M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks International symposium on mathematical foundations of computer science, 431-442, 2008 | 20 | 2008 |
Privacy protection in dynamic systems based on RFID tags J Cichon, M Klonowski, M Kutylowski Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 19 | 2007 |
Towards fair leader election in wireless networks Z Gołȩbiewski, M Klonowski, M Koza, M Kutyłowski International Conference on Ad-Hoc Networks and Wireless, 166-179, 2009 | 17 | 2009 |
Practical fault-tolerant data aggregation K Grining, M Klonowski, P Syga Applied Cryptography and Network Security: 14th International Conference …, 2016 | 16 | 2016 |
Provable Unlinkability Against Traffic Analysis Already After Steps! M Gomułkiewicz, M Klonowski, M Kutyłowski International Conference on Information Security, 354-366, 2004 | 16 | 2004 |