Adrian Kapczynski

Orcid: 0000-0002-9299-1467

According to our database1, Adrian Kapczynski authored at least 12 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Compression of Text in Selected Languages - Efficiency, Volume, and Time Comparison.
Sensors, 2022

2020
Generation of Values from discrete Probability distributions with the Use of Chaotic Maps.
Int. J. Comput., 2020

A New Way to Store Simple Text Files.
Algorithms, 2020

2019
The application of modified Chebyshev polynomials in asymmetric cryptography.
Comput. Sci., 2019

2018
Pattern Lock Evaluation Framework for Mobile Devices: Memorizability and Timing Issues.
Proceedings of the Software Engineering and Algorithms in Intelligent Systems, 2018

2017
Pattern Lock Evaluation Framework for Mobile Devices: Human Perception of the Pattern Strength Measure.
Proceedings of the Man-Machine Interactions 5, 2017

2011
Application of quantum cryptography protocols in authentication process.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Biometric logical access control enhanced by use of steganography over secured transmission channel.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Fuzzy evaluation of biometric authentication systems.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2008
Distributed Authentication Systems Enhanced by Quantum Protocols.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems.
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, 2008

2007
User Authentication based on Behavioral Patterns.
Int. J. Comput., 2007


  Loading...