|
Search the dblp DataBase
Zbigniew Kotulski:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bogdan Ksiezopolski, Zbigniew Kotulski
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules. [Citation Graph (0, 0)][DBLP] ADBIS Research Communications, 2005, pp:- [Conf]
- Piotr Kotlarz, Zbigniew Kotulski
On Application of Neural Networks for S-Boxes Design. [Citation Graph (0, 0)][DBLP] AWIC, 2005, pp:243-248 [Conf]
- Aneta Zwierko, Zbigniew Kotulski
Mobile Agents: Preserving Privacy and Anonymity. [Citation Graph (0, 0)][DBLP] IMTCI, 2004, pp:246-258 [Conf]
- Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
Authentication with controlled anonymity in P2P systems. [Citation Graph (0, 0)][DBLP] PDCAT, 2005, pp:871-875 [Conf]
- Wojciech Mazurczyk, Zbigniew Kotulski
New VoIP Traffic Security Scheme with Digital Watermarking. [Citation Graph (0, 0)][DBLP] SAFECOMP, 2006, pp:170-181 [Conf]
- Kamil Kulesza, Zbigniew Kotulski
Addressing New Challenges by Building Security Protocols Around Graphs. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:301-306 [Conf]
- Kamil Kulesza, Zbigniew Kotulski
On the graph coloring check-digit scheme with applications to verifiable secret sharing [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski
On secret sharing for graphs [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski
Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk
On alternative approach for verifiable secret sharing [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski
On ASGS framework: general requirements and an example of implementation [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski
On graph coloring check-digit method [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Kamil Kulesza, Zbigniew Kotulski, Konrad Kulesza
On Mobile Agents Resistance to Traffic Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:181-193 [Journal]
- Aneta Zwierko, Zbigniew Kotulski
A Light-Weight e-Voting System with Distributed Trust. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:109-126 [Journal]
- Wojciech Mazurczyk, Zbigniew Kotulski
Lightweight security mechanism for PSTN-VoIP cooperation [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Tomasz Ciszkowski, Zbigniew Kotulski
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Wojciech Mazurczyk, Zbigniew Kotulski
New security and control protocol for VoIP based on steganography and digital watermarking [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Analysis of different architectures of neural networks for application in Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Adaptable security mechanism for dynamic environments. [Citation Graph (, )][DBLP]
Alternative security architecture for IP Telephony based on digital watermarking [Citation Graph (, )][DBLP]
Security of mobile agents: a new concept of the integrity protection [Citation Graph (, )][DBLP]
A new authentication protocol for revocable anonymity in ad-hoc networks [Citation Graph (, )][DBLP]
SecMon: End-to-End Quality and Security Monitoring System [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|