ติดตาม
Jacek Piątkowski
Jacek Piątkowski
Institute of Computer and Information Sciences, Czestochowa University of Technology Częstochowa
ยืนยันอีเมลแล้วที่ icis.pcz.pl
ชื่อ
อ้างโดย
อ้างโดย
ปี
PET waste classification method and plastic waste DataBase-WaDaBa
J Bobulski, J Piatkowski
Image Processing and Communications Challenges 9: 9th International …, 2018
492018
Information Technologies supporting students’ mobility
T Walasek, J Piątkowski, D Morawska-Walasek
Journal of Achievements in Materials and Manufacturing Engineering 25 (1), 83-86, 2007
162007
Timed models of security protocols including delays in the network
S Szymoniak, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 14 (3), 2015
142015
ProToc—An universal language for security protocols specifications
A Grosser, M Kurkowski, J Piątkowski, S Szymoniak
Soft Computing in Computer and Information Science, 237-248, 2015
82015
ProToc-an universal language for security protocols specification,[in:] Advances in Intelligent Systems and Computing, eds. A. Wiliński, IE Fray, J. Pejas
M Kurkowski, A Grosser, J Piątkowski, S Szymoniak
Springer Verlag 342, 237-248, 2015
72015
Using probabilistic automata for security protocols verification
O Siedlecka-Lamch, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 15 (2), 2016
52016
Defense and Security Mechanisms in the Internet of Things: A Review.
S Szymoniak, J Piątkowski, M Kurkowski
Applied Sciences (2076-3417) 15 (2), 2025
32025
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
J Piątkowski, S Szymoniak
Applied Sciences 13 (23), 12668, 2023
22023
The visualization of shaft vibration using the algorithm of phase-amplitude data interpolation
J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 15 (1), 2016
22016
On-line support of students mobility
T Walasek, J Piatkowski, O Stawska, D Morawska-Walasek
Proceedings of the 2nd WSEAS/IASME International Conference on Educational …, 2006
12006
Trivializing verification of cryptographic protocols
J Piątkowski, S Szymoniak
Computer Assisted Methods in Engineering and Science 30 (4), 389-406, 2023
2023
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–11