Vehicle authentication via monolithically certified public key and attributes

S Dolev, Ł Krzywiecki, N Panwar, M Segal - Wireless Networks, 2016 - Springer
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of
wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless …

Schemes for verification of resources in the cloud: comparison of the cloud technology providers

A Sulich, T Zema, P Zema - Towards Industry 4.0—Current Challenges in …, 2020 - Springer
Cloud technology providers differ from each other not only by the level of their computing
cloud abstraction level but also by different computing environment conditions. The most …

Certificating vehicle public key with vehicle attributes a (periodical) licensing routine, against man-in-the-middle attacks and beyond

S Dolev, L Krzywiecki, N Panwar… - … 2013-Workshop ASCoMS …, 2013 - hal.science
Vehicular networks are used to coordinate actions among vehicles in traffic by the use of
wireless transceivers. Unfortunately, the wireless communication among vehicles is …

Privacy-oriented dependency via deniable SIGMA protocol

Ł Krzywiecki, K Kluczniak, P Kozieł, N Panwar - computers & security, 2018 - Elsevier
The IoT era has led to a complex interplay between the communication security and the
storage service providers. The secure key exchange is crucial from the perspective of …

How to design authenticated key exchange for wearable devices: cryptanalysis of AKE for health monitoring and countermeasures via distinct sms with key split and …

Ł Krzywiecki, H Salin - … Conference on Cryptology and Network Security, 2022 - Springer
We provide a cryptanalysis of a certain type of an authenticated key exchange protocol
(AKE) for wearable devices. Subsequently, we propose a secure construction based on a …

Deniable key establishment resistance against eKCI attacks

Ł Krzywiecki, T Wlisłocki - Security and Communication …, 2017 - Wiley Online Library
In extended Key Compromise Impersonation (eKCI) attack against authenticated key
establishment (AKE) protocols the adversary impersonates one party, having the long term …

Explainable arguments

L Hanzlik, K Kluczniak - … Conference on Financial Cryptography and Data …, 2022 - Springer
We introduce an intriguing new type of argument systems with the additional property of
being explainable. Intuitively by explainable, we mean that given any argument under a …

Chameleon rfid and tracking prevention

M Klonowski, M Kutyłowski… - Radio Frequency …, 2013 - ebooks.iospress.nl
Chameleon RFID and Tracking Prevention Page 1 Chameleon RFID and Tracking Prevention
Marek Klonowski, Mirosław Kutyłowski 1, Piotr Syga 2 Wrocław University of Technology …

[PDF][PDF] Research Article Deniable Key Establishment Resistance against eKCI Attacks

A Krzywiecki, T WlisBocki - academia.edu
In extended Key Compromise Impersonation (eKCI) attack against authenticated key
establishment (AKE) protocols the adversary impersonates one party, having the long term …

[PDF][PDF] Schemes for verification of resources in the cloud: comparison of the cloud technology providers

P Zema - researchgate.net
Cloud technology providers differ from each other not only by the level of their computing
cloud abstraction level but also by different computing environment conditions. The most …