The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marek Klonowski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
    Local View Attack on Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:475-488 [Conf]
  2. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
    Rapid Mixing and Security of Chaum's Visual Electronic Voting. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:132-145 [Conf]
  3. Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    Kleptographic Attacks on E-Voting Schemes. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:494-508 [Conf]
  4. Marek Klonowski, Anna Lauks
    Extended Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:343-355 [Conf]
  5. Marek Klonowski, Miroslaw Kutylowski
    Provable Anonymity for Networks of Mixes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:26-38 [Conf]
  6. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
    Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:354-366 [Conf]
  7. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    A Practical Voting Scheme with Receipts. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:490-497 [Conf]
  8. Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski
    Anonymous Communication with On-line and Off-line Onion Encoding. [Citation Graph (0, 0)][DBLP]
    SOFSEM, 2005, pp:229-238 [Conf]
  9. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    Conditional Digital Signatures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:206-215 [Conf]
  10. Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks
    How to Protect a Signature from Being Shown to a Third Party. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:192-202 [Conf]
  11. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
    Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:400-410 [Conf]
  12. Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski
    Random Subsets of the Interval and P2P Protocols. [Citation Graph (0, 0)][DBLP]
    APPROX-RANDOM, 2007, pp:409-421 [Conf]
  13. Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk
    Forward-Secure Key Evolution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:102-120 [Conf]

  14. Distributed Verification of Mixing - Local Forking Proofs Model. [Citation Graph (, )][DBLP]


  15. Repelling Detour Attack Against Onions with Re-encryption. [Citation Graph (, )][DBLP]


  16. Towards Fair Leader Election in Wireless Networks. [Citation Graph (, )][DBLP]


  17. Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. [Citation Graph (, )][DBLP]


  18. Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]


  19. Step-Out Ring Signatures. [Citation Graph (, )][DBLP]


  20. Privacy Protection in Dynamic Systems Based on RFID Tags. [Citation Graph (, )][DBLP]


  21. RFID System with Allowers. [Citation Graph (, )][DBLP]


  22. Privacy Protection for RFID with Hidden Subset Identifiers. [Citation Graph (, )][DBLP]


  23. Event Extent Estimation. [Citation Graph (, )][DBLP]


  24. Practical Deniable Encryption. [Citation Graph (, )][DBLP]


  25. Proofs of Communication and Its Application for Fighting Spam. [Citation Graph (, )][DBLP]


  26. Dynamic Sharing of a Multiple Access Channel. [Citation Graph (, )][DBLP]


  27. Data Deletion with Provable Security. [Citation Graph (, )][DBLP]


  28. Data Deletion with Time-Aware Adversary Model. [Citation Graph (, )][DBLP]


  29. Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. [Citation Graph (, )][DBLP]


  30. Step-out group signatures. [Citation Graph (, )][DBLP]


  31. Dynamic sharing of a multiple access channel [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002