Volgen
Przemyslaw Kubiak
Przemyslaw Kubiak
NASK – NATIONAL RESEARCH INSTITUTE
Geverifieerd e-mailadres voor nask.pl
Titel
Geciteerd door
Geciteerd door
Jaar
Practical deniable encryption
M Klonowski, P Kubiak, M Kutyłowski
SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on …, 2008
882008
Kleptographic attacks on e-voting schemes
M Gogolewski, M Klonowski, P Kubiak, M Kutyłowski, A Lauks, F Zagórski
Emerging Trends in Information and Communication Security: International …, 2006
452006
A revocation scheme preserving privacy
Ł Krzywiecki, P Kubiak, M Kutyłowski
International Conference on Information Security and Cryptology, 130-143, 2006
122006
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys: Work in Progress
P Błaśkiewicz, P Kubiak, M Kutyłowski
International Conference on Trusted Systems, 173-188, 2010
112010
Preventing a fork in a blockchain-david fighting goliath
P Kubiak, M Kutyłowski
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
72020
Supervised usage of signature creation devices
P Kubiak, M Kutyłowski
International Conference on Information Security and Cryptology, 132-149, 2013
72013
Restricted identification scheme and diffie-hellman linking problem
M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza
International Conference on Trusted Systems, 221-238, 2011
72011
Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks
M Kutyłowski, J Cichoń, P Kubiak
Springer-Verlag, 2007
7*2007
Stamp and extend–instant but undeniable timestamping based on lazy trees
Ł Krzywiecki, P Kubiak, M Kutyłowski
Trusted Systems: 4th International Conference, INTRUST 2012, London, UK …, 2012
62012
Digital signatures for e-government-a long-term security architecture
P Błaśkiewicz, P Kubiak, M Kutyłowski
Forensics in Telecommunications, Information, and Multimedia: Third …, 2011
62011
Restricted identification without group keys
L Hanzlik, K Kluczniak, P Kubiak, M Kutylowski
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
52012
Privacy and security analysis of PACE GM protocol
MI Kutylowski, P Kubiak
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
42019
Lightweight digital signature with secretly embedded warning
M Kutyłowski, P Kubiak
Control and Cybernetics 42 (4), 825-827, 2013
42013
How to protect a signature from being shown to a third party
M Klonowski, P Kubiak, M Kutyłowski, A Lauks
Trust and Privacy in Digital Business: Third International Conference …, 2006
42006
Anonymous evaluation system
K Kluczniak, L Hanzlik, P Kubiak, M Kutyłowski
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
32015
Attack against Ibrahim's distributed key generation for RSA
B Brzeźniak, L Hanzlik, P Kubiak, M Kutyłowski
International Journal of Network Security 15 (4), 313-316, 2013
32013
Lightweight certificates–towards a practical model for PKI
Ł Krzywiecki, P Kubiak, M Kutyłowski, M Tabor, D Wachnik
Business Information Systems: 15th International Conference, BIS 2012 …, 2012
32012
Technical and legal meaning of “sole control”–towards verifiability in signing systems
M Kutyłowski, P Błaśkiewicz, Ł Krzywiecki, P Kubiak, W Paluszyński, ...
International Conference on Business Information Systems, 270-281, 2011
32011
Polish concepts for securing e-government document flow
M Kutyłowski, P Kubiak
ISSE 2010 Securing Electronic Business Processes: Highlights of the …, 2011
32011
Mediated signatures-towards undeniability of digital data in technical and legal framework
P Kubiak, M Kutyłowski, A Lauks-Dutka, M Tabor
International Conference on Business Information Systems, 298-309, 2010
32010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20