Zbigniew Kotulski
Orcid: 0000-0002-1149-7863
According to our database1,
Zbigniew Kotulski
authored at least 76 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
J. Netw. Syst. Manag., October, 2024
2023
J. Netw. Comput. Appl., September, 2023
2022
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022
2021
2020
J. Netw. Syst. Manag., 2020
Comput. Networks, 2020
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
2018
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions.
EURASIP J. Inf. Secur., 2018
EURASIP J. Inf. Secur., 2018
Comput. Secur., 2018
Cybersecurity education: Evolution of the discipline and analysis of master programs.
Comput. Secur., 2018
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
Proceedings of the Computer Networks - 25th International Conference, 2018
Proceedings of the Advances in Soft and Hard Computing, 2018
2017
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions.
Proceedings of the Computer Network Security, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017
Proceedings of the Computer Networks - 24th International Conference, 2017
2016
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
Pseudo-random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
2015
Image Encryption Using Koblitz's Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator.
Proceedings of the Multimedia Communications, Services and Security, 2015
2014
Ann. UMCS Informatica, 2014
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2014
Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
2013
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013
2012
Ann. UMCS Informatica, 2012
Ann. UMCS Informatica, 2012
Towards Quality of Experience-based reputation models for future web service provisioning.
Telecommun. Syst., 2012
Int. J. Distributed Sens. Networks, 2012
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2011
Ann. UMCS Informatica, 2011
Non - cryptographic methods for improving real time transmission security and integrity.
Ann. UMCS Informatica, 2011
Ann. UMCS Informatica, 2011
Proceedings of the Computer Networks - 18th Conference, 2011
2010
Ann. UMCS Informatica, 2010
Ann. UMCS Informatica, 2010
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks.
Inf. Process. Lett., 2010
On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
Proceedings of the Computer Networks - 17th Conference, 2010
Proceedings of the Computer Networks - 17th Conference, 2010
2009
Ann. UMCS Informatica, 2009
Proceedings of the Computer Networks - 16th Conference, 2009
2008
Ann. UMCS Informatica, 2008
Analysis of different architectures of neural networks for application in Intrusion Detection Systems.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
2007
Proceedings of the Advances in Information Processing and Protection., 2007
Proceedings of the Advances in Information Processing and Protection., 2007
2006
New security and control protocol for VoIP based on steganography and digital watermarking.
Ann. UMCS Informatica, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Computer Safety, 2006
2005
CoRR, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules.
Proceedings of the ADBIS 2005, 2005
2004
Ann. UMCS Informatica, 2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the Intelligent Media Technology for Communicative Intelligence, 2004
2003
IACR Cryptol. ePrint Arch., 2003
CoRR, 2003
Proceedings of the Security Protocols, 2003
2002
On the graph coloring check-digit scheme with applications to verifiable secret sharing
CoRR, 2002
2001
Open Syst. Inf. Dyn., 2001
New Experimental Results in Differential - Linear Cryptanalysis of Reduced Variants of DES.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001