Miroslaw Kurkowski
Orcid: 0000-0003-0900-3243
According to our database1,
Miroslaw Kurkowski
authored at least 32 papers
between 2001 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.
Log. J. IGPL, 2022
IEEE Access, 2022
2021
Sensors, 2021
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
2020
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020
2019
SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019
Different Aggregation Modes Applications Within the Framework of Weights Uncertainty.
Proceedings of the Artificial Intelligence and Soft Computing, 2019
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
2018
Proceedings of the Computer Networks - 25th International Conference, 2018
Proceedings of the Advances in Soft and Hard Computing, 2018
2016
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016
Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption.
Proceedings of the Computer Networks - 23rd International Conference, 2016
2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
2014
Using Facial Asymmetry Properties and Hidden Markov Models for Biometric Authentication in Security Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2014
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Soft Computing in Computer and Information Science, 2014
2013
Proceedings of the Parallel Processing and Applied Mathematics, 2013
Proceedings of the Computer Information Systems and Industrial Management, 2013
Springer, ISBN: 978-3-642-41385-8, 2013
2012
Proceedings of the Handbook of Finite State Based Models and Applications., 2012
Proceedings of the 21th International Workshop on Concurrency, 2012
2011
Proceedings of the Parallel Processing and Applied Mathematics, 2011
2009
Fundam. Informaticae, 2009
2007
Fundam. Informaticae, 2007
2006
Fundam. Informaticae, 2006
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata.
Proceedings of the Model Checking and Artificial Intelligence, 4th Workshop, 2006
2001
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001