Practical deniable encryption M Klonowski, P Kubiak, M Kutyłowski SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on …, 2008 | 88 | 2008 |
Kleptographic attacks on e-voting schemes M Gogolewski, M Klonowski, P Kubiak, M Kutyłowski, A Lauks, F Zagórski Emerging Trends in Information and Communication Security: International …, 2006 | 45 | 2006 |
A revocation scheme preserving privacy Ł Krzywiecki, P Kubiak, M Kutyłowski International Conference on Information Security and Cryptology, 130-143, 2006 | 12 | 2006 |
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress P Błaśkiewicz, P Kubiak, M Kutyłowski International Conference on Trusted Systems, 173-188, 2010 | 11 | 2010 |
Preventing a fork in a blockchain-david fighting goliath P Kubiak, M Kutyłowski 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 7 | 2020 |
Supervised usage of signature creation devices P Kubiak, M Kutyłowski International Conference on Information Security and Cryptology, 132-149, 2013 | 7 | 2013 |
Restricted identification scheme and diffie-hellman linking problem M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza International Conference on Trusted Systems, 221-238, 2011 | 7 | 2011 |
Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks M Kutyłowski, J Cichoń, P Kubiak Springer-Verlag, 2007 | 7* | 2007 |
Stamp and extend–instant but undeniable timestamping based on lazy trees Ł Krzywiecki, P Kubiak, M Kutyłowski Trusted Systems: 4th International Conference, INTRUST 2012, London, UK …, 2012 | 6 | 2012 |
Digital signatures for e-government-a long-term security architecture P Błaśkiewicz, P Kubiak, M Kutyłowski Forensics in Telecommunications, Information, and Multimedia: Third …, 2011 | 6 | 2011 |
Restricted identification without group keys L Hanzlik, K Kluczniak, P Kubiak, M Kutylowski 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 5 | 2012 |
Privacy and security analysis of PACE GM protocol MI Kutylowski, P Kubiak 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 4 | 2019 |
Lightweight digital signature with secretly embedded warning M Kutyłowski, P Kubiak Control and Cybernetics 42 (4), 825-827, 2013 | 4 | 2013 |
How to protect a signature from being shown to a third party M Klonowski, P Kubiak, M Kutyłowski, A Lauks Trust and Privacy in Digital Business: Third International Conference …, 2006 | 4 | 2006 |
Anonymous evaluation system K Kluczniak, L Hanzlik, P Kubiak, M Kutyłowski Network and System Security: 9th International Conference, NSS 2015, New …, 2015 | 3 | 2015 |
Attack against Ibrahim's distributed key generation for RSA B Brzeźniak, L Hanzlik, P Kubiak, M Kutyłowski International Journal of Network Security 15 (4), 313-316, 2013 | 3 | 2013 |
Lightweight certificates–towards a practical model for PKI Ł Krzywiecki, P Kubiak, M Kutyłowski, M Tabor, D Wachnik Business Information Systems: 15th International Conference, BIS 2012 …, 2012 | 3 | 2012 |
Technical and legal meaning of “sole control”–towards verifiability in signing systems M Kutyłowski, P Błaśkiewicz, Ł Krzywiecki, P Kubiak, W Paluszyński, ... International Conference on Business Information Systems, 270-281, 2011 | 3 | 2011 |
Polish concepts for securing e-government document flow M Kutyłowski, P Kubiak ISSE 2010 Securing Electronic Business Processes: Highlights of the …, 2011 | 3 | 2011 |
Mediated signatures-towards undeniability of digital data in technical and legal framework P Kubiak, M Kutyłowski, A Lauks-Dutka, M Tabor International Conference on Business Information Systems, 298-309, 2010 | 3 | 2010 |