Marek Klonowski
Orcid: 0000-0002-3141-8712
According to our database1,
Marek Klonowski
authored at least 102 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Pattern Recognit., 2025
2023
J. Comput. Syst. Sci., December, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
2022
Theor. Comput. Sci., 2022
2021
Proceedings of the 29th International Symposium on Modeling, 2021
2020
Theor. Comput. Sci., 2020
J. Complex Networks, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Int. J. Inf. Sec., 2019
Distributed Comput., 2019
Ad Hoc Networks, 2019
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019
Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Fundamentals of Computation Theory - 22nd International Symposium, 2019
How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019
2018
Pattern Recognit., 2018
Comput. Secur., 2018
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018
2017
Ad Hoc Networks, 2017
How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Structural Information and Communication Complexity, 2017
Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Discret. Math. Theor. Comput. Sci., 2016
Proceedings of the Structural Information and Communication Complexity, 2016
Proceedings of the 10th International Symposium on Communication Systems, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015
J. Cryptol., 2015
Proceedings of the 27th ACM on Symposium on Parallelism in Algorithms and Architectures, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
2014
Int. J. Netw. Comput., 2014
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
Ad Hoc Networks, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the 42nd International Conference on Parallel Processing, 2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Proceedings of the 10th Meeting on Analytic Algorithmics and Combinatorics, 2013
2012
Theor. Comput. Sci., 2012
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Proceedings of the Wireless Sensor Networks - 9th European Conference, 2012
2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
How to Transmit Messages via WSN in a Hostile Environment.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, 2010
Proceedings of the Structural Information and Communication Complexity, 2010
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
Proceedings of the Pervasive Computing, 2008
Proceedings of the Mathematical Foundations of Computer Science 2008, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Approximation, 2007
2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Computer Security, 2005
2004
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Communications and Multimedia Security, 2004
2003
Proceedings of the Computer Security, 2003