Zbigniew Golebiewski

According to our database1, Zbigniew Golebiewski authored at least 17 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Counting Embeddings of Rooted Trees into Families of Rooted Trees.
Electron. J. Comb., 2022

2019
Entropy and Optimal Compression of Some General Plane Trees.
ACM Trans. Algorithms, 2019

Protection Number of Recursive Trees.
Proceedings of the Sixteenth Workshop on Analytic Algorithmics and Combinatorics, 2019

2018
Enumerating lambda terms by weighted length of their De Bruijn representation.
Discret. Appl. Math., 2018

2017
Entropy of some general plane trees.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

On structural entropy of uniform random intersection graphs.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
On spreading rumor in heterogeneous systems.
CoRR, 2016

On the Number of Lambda Terms With Prescribed Size of Their De Bruijn Representation.
Proceedings of the 33rd Symposium on Theoretical Aspects of Computer Science, 2016

2013
On Delta-Method of Moments and Probabilistic Sums.
Proceedings of the 10th Meeting on Analytic Algorithmics and Combinatorics, 2013

2012
From key predistribution to key redistribution.
Theor. Comput. Sci., 2012

2009
RFID System with Allowers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Towards Fair Leader Election in Wireless Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
Practical Attacks on HB and HB+ Protocols.
IACR Cryptol. ePrint Arch., 2008

Self-stabilizing population of mobile agents.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Attacks on CKK Family of RFID Authentication Protocols.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2006
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...