Miroslaw Kutylowski
Orcid: 0000-0003-3192-2430Affiliations:
- Wroclaw University of Technology, Department of Computer Science, Poland
- University of Paderborn, Heinz Nixdorf Institute, Germany
- Poznań University, Department of Mathematics and Computer Science, Poland
- University of Wroclaw, Institute of Computer Science, Poland (PhD 1985)
According to our database1,
Miroslaw Kutylowski
authored at least 199 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Veh. Commun., 2024
2023
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography.
Proc. Priv. Enhancing Technol., October, 2023
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023
Comput. Stand. Interfaces, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022
2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the IFIP Networking Conference, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Int. J. Inf. Sec., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
IACR Cryptol. ePrint Arch., 2019
Fundam. Informaticae, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Concurr. Comput. Pract. Exp., 2018
2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the Algorithms for Sensor Systems, 2017
2016
Secur. Commun. Networks, 2016
CoRR, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015
J. Univers. Comput. Sci., 2015
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the Twelfth Workshop on Analytic Algorithmics and Combinatorics, 2015
2014
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
Int. J. Netw. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Theor. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012
Proceedings of the Business Information Systems - 15th International Conference, 2012
2011
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
How to Transmit Messages via WSN in a Hostile Environment.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the Business Information Systems Workshops, 2011
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems.
Proceedings of the Business Information Systems Workshops, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the ISSE 2010, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework.
Proceedings of the Business Information Systems Workshops, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Proceedings of the Intelligent Information and Database Systems, 2010
2009
Proceedings of the Information, Security and Cryptology, 2009
On Optimal One-dimensional Routing Strategies in Sensor Networks.
Proceedings of the Selected Papers on Broadband Communication, 2009
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2009
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009
2008
Theor. Comput. Sci., 2008
IET Inf. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
Proceedings of the Pervasive Computing, 2008
Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks.
Proceedings of the MSN 2008, 2008
Proceedings of the Mathematical Foundations of Computer Science 2008, 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Datenschutz und Datensicherheit, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007
2006
Proceedings of the Experimental Algorithms, 5th International Workshop, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the Complexity of Boolean Functions, 12.03. - 17.03.2006, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
2005
RAIRO Theor. Informatics Appl., 2005
Proceedings of the Experimental and Efficient Algorithms, 4th InternationalWorkshop, 2005
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Proceedings of the Applied Public Key Infrastructure, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Computer Security, 2005
2004
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Optimized UTRAN Topology Planning Including Point-to-Multipoint Equipment.
Proceedings of the MMB & PGTS 2004, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
Proceedings of the Communications and Multimedia Security, 2004
2003
Weak communication in single-hop radio networks: adjusting algorithms to industrial standards.
Concurr. Comput. Pract. Exp., 2003
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003
Proceedings of the Computer Security, 2003
Proceedings of the Algorithms, 2003
2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the Computer Security, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002
2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
2000
Random Struct. Algorithms, 2000
J. ACM, 2000
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000
1999
Delayed Path Coupling and Generating Random Permutations via Distributed Stochastic Processes.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the International Conference on Parallel Processing 1999, 1999
Proceedings of the Computing and Combinatorics, 5th Annual International Conference, 1999
1998
Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures, 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
1997
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997
1996
Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write Parallel Random-Access Machines.
SIAM J. Comput., 1996
Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution.
J. Comput. Syst. Sci., 1996
Proceedings of IPPS '96, 1996
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1996
1995
Electron. Colloquium Comput. Complex., 1995
Comput. Complex., 1995
1994
J. Comput. Syst. Sci., 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
1993
1992
Proceedings of the Data Structures and Efficient Algorithms, 1992
1991
1990
Proceedings of the STACS 90, 1990
Exact Time Bounds for Computing Boolean Functions on PRAMs Without Simultaneous Writes.
Proceedings of the 2nd Annual ACM Symposium on Parallel Algorithms and Architectures, 1990
1988
J. Symb. Log., 1988
1987
Inf. Comput., February, 1987
1986
Math. Log. Q., 1986