Jerzy Pejas
Orcid: 0000-0002-4783-1114Affiliations:
- West Pomeranian University of Technology, Szczecin, Poland
According to our database1,
Jerzy Pejas
authored at least 29 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Entropy, September, 2023
Proceedings of the Computer Information Systems and Industrial Management, 2023
2022
A Systematic Review of Highly Transparent Steganographic Methods for the Digital Audio.
Proceedings of the Computer Information Systems and Industrial Management, 2022
2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the Computer Information Systems and Industrial Management, 2021
2020
Comput. Electr. Eng., 2020
2019
2018
IEEE Access, 2018
2017
Comput. J., 2017
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack.
Proceedings of the Computer Information Systems and Industrial Management, 2017
2016
Proceedings of the Network and System Security - 10th International Conference, 2016
A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy.
Proceedings of the Computer Information Systems and Industrial Management, 2016
Proceedings of the Hard and Soft Computing for Artificial Intelligence, 2016
2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
2014
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Computer Information Systems and Industrial Management, 2014
2013
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture.
Proceedings of the Computer Information Systems and Industrial Management, 2013
2012
Long-term preservation of digital signatures for multiple groups of related documents.
IET Inf. Secur., 2012
Proceedings of the Computer Information Systems and Industrial Management, 2012
2010
Proceedings of the Handbook of Information and Communication Security, 2010
2007
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.
Proceedings of the Advances in Information Processing and Protection., 2007
2005
Proceedings of the Information Processing and Security Systems., 2005
Some methods of the analysis and risk assessment in the PKI system services providers.
Proceedings of the Enhanced Methods in Computer Security, 2005
Proceedings of the Information Processing and Security Systems., 2005
Proceedings of the Enhanced Methods in Computer Security, 2005
Proceedings of the Enhanced Methods in Computer Security, 2005
Proceedings of the Enhanced Methods in Computer Security, 2005
Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters.
Proceedings of the Information Processing and Security Systems., 2005
2001
Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001