The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Zbigniew Kotulski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bogdan Ksiezopolski, Zbigniew Kotulski
    On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules. [Citation Graph (0, 0)][DBLP]
    ADBIS Research Communications, 2005, pp:- [Conf]
  2. Piotr Kotlarz, Zbigniew Kotulski
    On Application of Neural Networks for S-Boxes Design. [Citation Graph (0, 0)][DBLP]
    AWIC, 2005, pp:243-248 [Conf]
  3. Aneta Zwierko, Zbigniew Kotulski
    Mobile Agents: Preserving Privacy and Anonymity. [Citation Graph (0, 0)][DBLP]
    IMTCI, 2004, pp:246-258 [Conf]
  4. Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
    Authentication with controlled anonymity in P2P systems. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:871-875 [Conf]
  5. Wojciech Mazurczyk, Zbigniew Kotulski
    New VoIP Traffic Security Scheme with Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:170-181 [Conf]
  6. Kamil Kulesza, Zbigniew Kotulski
    Addressing New Challenges by Building Security Protocols Around Graphs. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:301-306 [Conf]
  7. Kamil Kulesza, Zbigniew Kotulski
    On the graph coloring check-digit scheme with applications to verifiable secret sharing [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  8. Kamil Kulesza, Zbigniew Kotulski
    On secret sharing for graphs [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  9. Kamil Kulesza, Zbigniew Kotulski
    Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  10. Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
    On alternative approach for verifiable secret sharing [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  11. Kamil Kulesza, Zbigniew Kotulski
    On ASGS framework: general requirements and an example of implementation [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  12. Kamil Kulesza, Zbigniew Kotulski
    On graph coloring check-digit method [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  13. Kamil Kulesza, Zbigniew Kotulski, Konrad Kulesza
    On Mobile Agents Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:181-193 [Journal]
  14. Aneta Zwierko, Zbigniew Kotulski
    A Light-Weight e-Voting System with Distributed Trust. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:109-126 [Journal]
  15. Wojciech Mazurczyk, Zbigniew Kotulski
    Lightweight security mechanism for PSTN-VoIP cooperation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  16. Tomasz Ciszkowski, Zbigniew Kotulski
    ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  17. Wojciech Mazurczyk, Zbigniew Kotulski
    New security and control protocol for VoIP based on steganography and digital watermarking [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  18. Analysis of different architectures of neural networks for application in Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  19. Adaptable security mechanism for dynamic environments. [Citation Graph (, )][DBLP]


  20. Alternative security architecture for IP Telephony based on digital watermarking [Citation Graph (, )][DBLP]


  21. Security of mobile agents: a new concept of the integrity protection [Citation Graph (, )][DBLP]


  22. A new authentication protocol for revocable anonymity in ad-hoc networks [Citation Graph (, )][DBLP]


  23. SecMon: End-to-End Quality and Security Monitoring System [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002