|
Search the dblp DataBase
Marek Klonowski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
Local View Attack on Anonymous Communication. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:475-488 [Conf]
- Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
Rapid Mixing and Security of Chaum's Visual Electronic Voting. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:132-145 [Conf]
- Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
Kleptographic Attacks on E-Voting Schemes. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:494-508 [Conf]
- Marek Klonowski, Anna Lauks
Extended Sanitizable Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:343-355 [Conf]
- Marek Klonowski, Miroslaw Kutylowski
Provable Anonymity for Networks of Mixes. [Citation Graph (0, 0)][DBLP] Information Hiding, 2005, pp:26-38 [Conf]
- Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! [Citation Graph (0, 0)][DBLP] ISC, 2004, pp:354-366 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
A Practical Voting Scheme with Receipts. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:490-497 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski
Anonymous Communication with On-line and Off-line Onion Encoding. [Citation Graph (0, 0)][DBLP] SOFSEM, 2005, pp:229-238 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
Conditional Digital Signatures. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:206-215 [Conf]
- Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks
How to Protect a Signature from Being Shown to a Third Party. [Citation Graph (0, 0)][DBLP] TrustBus, 2006, pp:192-202 [Conf]
- Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:400-410 [Conf]
- Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski
Random Subsets of the Interval and P2P Protocols. [Citation Graph (0, 0)][DBLP] APPROX-RANDOM, 2007, pp:409-421 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk
Forward-Secure Key Evolution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:102-120 [Conf]
Distributed Verification of Mixing - Local Forking Proofs Model. [Citation Graph (, )][DBLP]
Repelling Detour Attack Against Onions with Re-encryption. [Citation Graph (, )][DBLP]
Towards Fair Leader Election in Wireless Networks. [Citation Graph (, )][DBLP]
Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. [Citation Graph (, )][DBLP]
Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]
Step-Out Ring Signatures. [Citation Graph (, )][DBLP]
Privacy Protection in Dynamic Systems Based on RFID Tags. [Citation Graph (, )][DBLP]
RFID System with Allowers. [Citation Graph (, )][DBLP]
Privacy Protection for RFID with Hidden Subset Identifiers. [Citation Graph (, )][DBLP]
Event Extent Estimation. [Citation Graph (, )][DBLP]
Practical Deniable Encryption. [Citation Graph (, )][DBLP]
Proofs of Communication and Its Application for Fighting Spam. [Citation Graph (, )][DBLP]
Dynamic Sharing of a Multiple Access Channel. [Citation Graph (, )][DBLP]
Data Deletion with Provable Security. [Citation Graph (, )][DBLP]
Data Deletion with Time-Aware Adversary Model. [Citation Graph (, )][DBLP]
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. [Citation Graph (, )][DBLP]
Step-out group signatures. [Citation Graph (, )][DBLP]
Dynamic sharing of a multiple access channel [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|