Marek Klonowski
Marek Klonowski
Wrocław University of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Practical deniable encryption
M Klonowski, P Kubiak, M Kutyłowski
SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on …, 2008
Extended sanitizable signatures
M Klonowski, A Lauks
International Conference on Information Security and Cryptology, 343-355, 2006
Onions based on universal re-encryption–anonymous communication immune against repetitive attack
M Gomułkiewicz, M Klonowski, M Kutyłowski
Information Security Applications: 5th International Workshop, WISA 2004 …, 2005
Kleptographic attacks on e-voting schemes
M Gogolewski, M Klonowski, P Kubiak, M Kutyłowski, A Lauks, F Zagórski
Emerging Trends in Information and Communication Security: International …, 2006
Rapid mixing and security of Chaum’s visual electronic voting
M Gomułkiewicz, M Klonowski, M Kutyłowski
European Symposium on Research in Computer Security, 132-145, 2003
Energy-efficient leader election protocols for single-hop radio networks
M Kardas, M Klonowski, D Pajak
2013 42nd International Conference on Parallel Processing, 399-408, 2013
User authorization based on hand geometry without special equipment
M Klonowski, M Plata, P Syga
Pattern Recognition 73, 189-201, 2018
Approximating the size of a radio network in beeping model
P Brandes, M Kardas, M Klonowski, D Paj±k, R Wattenhofer
Structural Information and Communication Complexity: 23rd International …, 2016
Universal re-encryption of signatures and controlling anonymous information flow
M Klonowski, M Kutylowski, A Lauks, F Zagorski
WARTACRYPT 4, 1-3, 2004
Dynamic sharing of a multiple access channel
M Bienkowski, M Klonowski, M Korzeniowski, DR Kowalski
arXiv preprint arXiv:1001.3044, 2010
Privacy protection for RFID with hidden subset identifiers
J Cichoń, M Klonowski, M Kutyłowski
International Conference on Pervasive Computing, 298-314, 2008
Anonymous communication with on-line and off-line onion encoding
M Klonowski, M Kutyłowski, F Zagórski
SOFSEM 2005: Theory and Practice of Computer Science: 31st Conference on …, 2005
Forward-secure key evolution in wireless sensor networks
M Klonowski, M Kutyłowski, M Ren, K Rybarczyk
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
Provable anonymity for networks of mixes
M Klonowski, M Kutyłowski
International Workshop on Information Hiding, 26-38, 2005
DUO-Onions and Hydra-Onions—failure and adversary resistant onion protocols
J Iwanik, M Klonowski, M Kutyłowski
Communications and Multimedia Security: 8 th IFIP TC-6 TC-11 Conference on …, 2005
Step-out ring signatures
M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks
International symposium on mathematical foundations of computer science, 431-442, 2008
Privacy protection in dynamic systems based on RFID tags
J Cichon, M Klonowski, M Kutylowski
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
Towards fair leader election in wireless networks
Z Gołȩbiewski, M Klonowski, M Koza, M Kutyłowski
International Conference on Ad-Hoc Networks and Wireless, 166-179, 2009
Practical fault-tolerant data aggregation
K Grining, M Klonowski, P Syga
Applied Cryptography and Network Security: 14th International Conference …, 2016
A practical voting scheme with receipts
M Klonowski, M Kutyłowski, A Lauks, F Zagórski
Information Security: 8th International Conference, ISC 2005, Singapore …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20