Pawel Szalachowski

Orcid: 0000-0003-0871-3729

According to our database1, Pawel Szalachowski authored at least 85 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Decentralized Identity Authentication with Auditability and Privacy.
Algorithms, January, 2023

BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Challenges of post-quantum digital signing in real-world applications: a survey.
Int. J. Inf. Sec., 2022

ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret.
IACR Cryptol. ePrint Arch., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

Maximal Extractable Value (MEV) Protection on a DAG.
Proceedings of the 4th International Conference on Blockchain Economics, 2022

Securing Password Authentication for Web-based Applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Evaluating Blockchain Protocols with Abusive Modeling.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains.
IEEE Trans. Netw. Serv. Manag., 2021

Password-Authenticated Decentralized Identities.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things.
IEEE Internet Things J., 2021

Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
IEEE Commun. Surv. Tutorials, 2021

LaKSA: A Probabilistic Proof-of-Stake Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

A First Look into DeFi Oracles.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021

2020
Formalizing Bitcoin Crashes with Universally Composable Security.
IACR Cryptol. ePrint Arch., 2020

Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective.
IACR Cryptol. ePrint Arch., 2020

BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting.
CoRR, 2020

ProPoS: A Probabilistic Proof-of-Stake Protocol.
CoRR, 2020

Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing.
CoRR, 2020

A First Look into DeFi Oracles.
CoRR, 2020

SmartCert: Redesigning Digital Certificates with Smart Contracts.
CoRR, 2020

SMACS: Smart Contract Access Control Service.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Fail-safe Watchtowers and Short-lived Assertions for Payment Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

SmartWitness: A Proactive Software Transparency System using Smart Contracts.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients.
Proceedings of the IEEE International Conference on Blockchain, 2020

SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Network Transparency for Better Internet Security.
IEEE/ACM Trans. Netw., 2019

Does "www." Mean Better Transport Layer Security?
IACR Cryptol. ePrint Arch., 2019

Towards Forward Secure Internet Traffic.
IACR Cryptol. ePrint Arch., 2019

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
CoRR, 2019

Permissionless Blockchains and Secure Logging.
CoRR, 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

StrongChain: Transparent and Collaborative Proof-of-Work Consensus.
Proceedings of the 28th USENIX Security Symposium, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate.
Proceedings of the Information Security - 22nd International Conference, 2019

PADVA: A Blockchain-Based TLS Notary Service.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

Permission less Block chains and Secure Logging.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

PDFS: Practical Data Feed Service for Smart Contracts.
Proceedings of the Computer Security - ESORICS 2019, 2019

EVLA: Extended-Validation Certificates with Location Assurance.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

A Security Reference Architecture for Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018

An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets.
CoRR, 2018

Blockchain-based TLS Notary Service.
CoRR, 2018

Towards More Reliable Bitcoin Timestamps.
CoRR, 2018

A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet.
Proceedings of the Security and Privacy in Communication Networks, 2018

Rethinking Blockchain Security: Position Paper.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

(Short Paper) Towards More Reliable Bitcoin Timestamps.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

DSTC: DNS-Based Strict TLS Configurations.
Proceedings of the Risks and Security of Internet and Systems, 2018

Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
SCION: A Secure Internet Architecture
Information Security and Cryptography, Springer, ISBN: 978-3-319-67079-9, 2017

Authentication Challenges in a Global Environment.
ACM Trans. Priv. Secur., 2017

The SCION internet architecture.
Commun. ACM, 2017

Short Paper: On Deployment of DNS-Based Security Enhancements.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees.
Secur. Commun. Networks, 2016

SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Communication based on per-packet One-Time Addresses.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

RITM: Revocation in the Middle.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Source Accountability with Domain-brokered Privacy.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

2015
Secure broadcast in distributed networks with strong adversaries.
Secur. Commun. Networks, 2015

Designing a Global Authentication Infrastructure.
CoRR, 2015

Bootstrapping Real-world Deployment of Future Internet Architectures.
CoRR, 2015

SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks.
CoRR, 2015

Deployment challenges in log-based PKI enhancements.
Proceedings of the Eighth European Workshop on System Security, 2015

Efficient gossip protocols for verifying the consistency of Certificate logs.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Lightweight Protection of Group Content Distribution.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

2014
PoliCert: Secure and Flexible TLS Certificate Management.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013

2012
Energy-aware Key Management in Mobile Wireless Sensor Networks.
Ann. UMCS Informatica, 2012

One-Time Broadcast Encryption Schemes in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Enhancing the Oakley key agreement protocol with secure time information.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

A Virtualization-Level Future Internet Defense-in-Depth Architecture.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
Secure time information in the internet key exchange protocol.
Ann. UMCS Informatica, 2011

Secure Position-Based Selecting Scheme for WSN Communication.
Proceedings of the Computer Networks - 18th Conference, 2011

2010
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks.
Inf. Process. Lett., 2010

On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
Proceedings of the Computer Networks - 17th Conference, 2010

SPOT: Optimization Tool for Network Adaptable Security.
Proceedings of the Computer Networks - 17th Conference, 2010

2009
Optimization of TLS security protocol using the adaptable security model.
Ann. UMCS Informatica, 2009

Adaptive Approach to Network Security.
Proceedings of the Computer Networks - 16th Conference, 2009


  Loading...