researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Annales UMCS, Informatica
Home
Index
Info
Volume
Volume
11
, Issue
4
1
--
10
Michal Luczaj
.
Cryptographic software: vulnerabilities in implementations
11
--
19
Urszula Romanczuk
,
Vasyl Ustimenko
.
On the key exchange with new cubical maps based on graphs
21
--
32
Marek Grzegorz Stochel
.
Reliability of feedback fechanism based on root cause defect analysis - case study
33
--
47
Grzegorz Orynczak
,
Zbigniew Kotulski
.
Agent based infrastructure for real-time applications
49
--
60
Lukasz Radlinski
.
A conceptual Bayesian net model for integrated software quality prediction
61
--
75
Bartosz Borucki
,
Krzysztof Nowinski
,
Michal Chlebiej
,
Andrzej Rutkowski
,
Pawel Adamczyk
,
Jacek Laskowski
.
Automated geometric features evaluation method for normal foot skeleton model
77
--
88
Marcin W. Mastalerz
.
Models of analysis for enterprise information technology strategy
89
--
101
Karolina Muszynska
.
Communication management in Polish IT Companies
103
--
113
Tomasz Komorowski
.
Identification of e-learning services in higher education
Volume
11
, Issue
3
9
--
25
Marek Klonowski
.
Security problems of systems of extremely weak devices
27
--
40
Urszula Krawczyk
,
Piotr Sapiecha
.
Effective reduction of cryptographic protocols specification for model-checking with Spin
41
--
56
Pawel Szalachowski
,
Zbigniew Kotulski
.
Secure time information in the internet key exchange protocol
57
--
70
Jaroslaw Wojtun
,
Zbigniew Piotrowski
,
Piotr Gajewski
.
Implementation of the DSSS method in watermarking digital audio objects
71
--
86
Grzegorz Orynczak
,
Zbigniew Kotulski
.
Non - cryptographic methods for improving real time transmission security and integrity
87
--
100
Dariusz Rzonca
,
Andrzej Stec
.
Small prototype acquisition system with secure remote data access
101
--
115
Krystian Baniak
.
Group signature revocable anonymity scheme for network monitoring
117
--
127
Damian Rusinek
,
Bogdan Ksiezopolski
.
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2
129
--
139
Lukasz Papiez
.
The security of the multi-application public transport card
141
--
152
Lukasz Kucharzewski
,
Zbigniew Kotulski
.
Mobile identity management system in heterogeneous wireless networks
Volume
11
, Issue
2
9
--
24
Michal Misztal
.
Differential cryptanalysis of PP-1 cipher
25
--
36
Michal Trojnara
.
Evolution of the StreamHash hash function family
37
--
48
Anna Grocholewska-Czurylo
.
Cryptographic properties of modified AES-like S-boxes
49
--
60
Jakub Derbisz
.
Methods of encrypting monotonic access structures
61
--
79
Wojciech Oszywa
,
Rafal Gliwa
.
Combining message encryption and authentication
81
--
93
Abderezak Touzene
,
Vasyl Ustimenko
,
Marwa AlRaissi
,
Imene Boudelioua
.
Performance of algebraic graphs based stream-ciphers using large finite fields
95
--
111
Vasyl Ustimenko
,
Aneta Wróblewska
.
n, K)-based cryptographical algorithm
113
--
125
Maciej Grzeskowiak
.
p ± 1
127
--
141
Michal Klisowski
,
Urszula Romanczuk
,
Vasyl Ustimenko
.
The implementation of cubic public keys based on a new family of algebraic graphs
143
--
152
Monika Polak
,
Vasyl Ustimenko
.
On LDPC codes corresponding to affine parts of generalized polygons
Volume
11
, Issue
1
7
--
13
Damian Borycki
.
A strategy in sports betting with the nearest neighbours search and genetic algorithms
15
--
22
Przemyslaw Krysztowiak
.
The database of interval orders difficult for the jump number minimizing algorithms
23
--
31
Agnieszka Polak
.
A mesh algorithm for principal quadratic forms
33
--
41
Jakub Swacha
.
Comparative evaluation of performance-boosting tools for Python
43
--
54
Miroslaw Zajac
.
Use of convolution and filtration to extract information from the DCM graphic files
55
--
65
Aliaksandr Chychuryn
.
Simulation of the algorithms and their visualization forthe solutions to the restricted problems of the cosmic dynamics of the fourteen bodies with three rings
67
--
77
Miroslaw Hajder
,
Pawel Dymora
.
A novel approach to fault tolerant multichannel networks designing problems
79
--
87
Tomasz Ordysinski
.
Ontology of e-learning applications
89
--
101
Jakub Swacha
,
Karolina Muszynska
.
Python and C#: a comparative analysis fromsStudents' perspective