Journal: Annales UMCS, Informatica

Volume 11, Issue 4

1 -- 10Michal Luczaj. Cryptographic software: vulnerabilities in implementations
11 -- 19Urszula Romanczuk, Vasyl Ustimenko. On the key exchange with new cubical maps based on graphs
21 -- 32Marek Grzegorz Stochel. Reliability of feedback fechanism based on root cause defect analysis - case study
33 -- 47Grzegorz Orynczak, Zbigniew Kotulski. Agent based infrastructure for real-time applications
49 -- 60Lukasz Radlinski. A conceptual Bayesian net model for integrated software quality prediction
61 -- 75Bartosz Borucki, Krzysztof Nowinski, Michal Chlebiej, Andrzej Rutkowski, Pawel Adamczyk, Jacek Laskowski. Automated geometric features evaluation method for normal foot skeleton model
77 -- 88Marcin W. Mastalerz. Models of analysis for enterprise information technology strategy
89 -- 101Karolina Muszynska. Communication management in Polish IT Companies
103 -- 113Tomasz Komorowski. Identification of e-learning services in higher education

Volume 11, Issue 3

9 -- 25Marek Klonowski. Security problems of systems of extremely weak devices
27 -- 40Urszula Krawczyk, Piotr Sapiecha. Effective reduction of cryptographic protocols specification for model-checking with Spin
41 -- 56Pawel Szalachowski, Zbigniew Kotulski. Secure time information in the internet key exchange protocol
57 -- 70Jaroslaw Wojtun, Zbigniew Piotrowski, Piotr Gajewski. Implementation of the DSSS method in watermarking digital audio objects
71 -- 86Grzegorz Orynczak, Zbigniew Kotulski. Non - cryptographic methods for improving real time transmission security and integrity
87 -- 100Dariusz Rzonca, Andrzej Stec. Small prototype acquisition system with secure remote data access
101 -- 115Krystian Baniak. Group signature revocable anonymity scheme for network monitoring
117 -- 127Damian Rusinek, Bogdan Ksiezopolski. Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2
129 -- 139Lukasz Papiez. The security of the multi-application public transport card
141 -- 152Lukasz Kucharzewski, Zbigniew Kotulski. Mobile identity management system in heterogeneous wireless networks

Volume 11, Issue 2

9 -- 24Michal Misztal. Differential cryptanalysis of PP-1 cipher
25 -- 36Michal Trojnara. Evolution of the StreamHash hash function family
37 -- 48Anna Grocholewska-Czurylo. Cryptographic properties of modified AES-like S-boxes
49 -- 60Jakub Derbisz. Methods of encrypting monotonic access structures
61 -- 79Wojciech Oszywa, Rafal Gliwa. Combining message encryption and authentication
81 -- 93Abderezak Touzene, Vasyl Ustimenko, Marwa AlRaissi, Imene Boudelioua. Performance of algebraic graphs based stream-ciphers using large finite fields
95 -- 111Vasyl Ustimenko, Aneta Wróblewska. n, K)-based cryptographical algorithm
113 -- 125Maciej Grzeskowiak. p ± 1
127 -- 141Michal Klisowski, Urszula Romanczuk, Vasyl Ustimenko. The implementation of cubic public keys based on a new family of algebraic graphs
143 -- 152Monika Polak, Vasyl Ustimenko. On LDPC codes corresponding to affine parts of generalized polygons

Volume 11, Issue 1

7 -- 13Damian Borycki. A strategy in sports betting with the nearest neighbours search and genetic algorithms
15 -- 22Przemyslaw Krysztowiak. The database of interval orders difficult for the jump number minimizing algorithms
23 -- 31Agnieszka Polak. A mesh algorithm for principal quadratic forms
33 -- 41Jakub Swacha. Comparative evaluation of performance-boosting tools for Python
43 -- 54Miroslaw Zajac. Use of convolution and filtration to extract information from the DCM graphic files
55 -- 65Aliaksandr Chychuryn. Simulation of the algorithms and their visualization forthe solutions to the restricted problems of the cosmic dynamics of the fourteen bodies with three rings
67 -- 77Miroslaw Hajder, Pawel Dymora. A novel approach to fault tolerant multichannel networks designing problems
79 -- 87Tomasz Ordysinski. Ontology of e-learning applications
89 -- 101Jakub Swacha, Karolina Muszynska. Python and C#: a comparative analysis fromsStudents' perspective