Journal: Annales UMCS, Informatica

Volume 12, Issue 4

11 -- 22Nicolas Bernard, Franck Leprévost. Hardened Bloom Filters, with an Application to Unobservability
23 -- 37Vaidas Juzonis, Nikolaj Goranin, Antanas Cenys, Dmitrij Olifer. Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting
39 -- 49Franciszek Seredynski, Jaroslaw Skaruz, Adrian Piraszewski. Image reconstruction with the use of evolutionary algorithms and cellular automata
51 -- 67Urszula Krawczyk, Piotr Sapiecha. Automatic detection of DoS vulnerabilities of cryptographic protocols
69 -- 81Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki. On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)
83 -- 96Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer. Energy-aware Key Management in Mobile Wireless Sensor Networks
97 -- 112Grzegorz Orynczak, Zbigniew Kotulski. Notary-based self-healing mechanism for centralized peer-to-peer infrastructures
113 -- 122Marcin Alan Tunia. Distributed Social Network - data security
123 -- 139Wioletta Wójtowicz, Marek R. Ogiela. Security issues on digital watermarking algorithms

Volume 12, Issue 3

11 -- 24Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stoklosa. Parameterized Hash Functions
25 -- 35Mateusz Buczek. Attacks on StreamHash 2
37 -- 53Sébastien Varrette, Jakub Muszynski, Pascal Bouvry. Hash function generation by means of Gene Expression Programming
55 -- 64Renata Kawa, Mieczyslaw Kula. A Remark on Hierarchical Threshold Secret Sharing
65 -- 74Vasyl Ustimenko, Aneta Wróblewska. Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography
75 -- 87Mariusz Borowski, Marek Lesniewicz, Robert Wicik, Marcin Grzonkowski. Generation of random keys for cryptographic systems
89 -- 106Urszula Romanczuk, Vasyl Ustimenko. On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2
107 -- 119Monika Polak, Vasyl Ustimenko. LDPC Codes Based on Algebraic Graphs
121 -- 139Ashraf M. Emam, Mahmoud M. Ouf. Performance Evaluation of Different Universal Steganalysis Techniques in JPG Files

Volume 12, Issue 2

7 -- 18Joanna Kapusta, Ryszard Smarzewski. Fast multidimensional Bernstein-Lagrange algorithms
19 -- 25Wieslawa Kuniszyk-Józkowiak, Janusz Jaszczuk, Tomasz Sacewicz, Ireneusz Codello. Time-frequency Analysis of the EMG Digital Signals
27 -- 37Halina Bielak, Michal Panczyk. A self-stabilizing algorithm for finding weighted centroid in trees
39 -- 48Ireneusz Codello, Wieslawa Kuniszyk-Józkowiak, Elzbieta Smolka, Adam Kobus. Automatic disordered sound repetition recognition in continuous speech using CWT and kohonen network
49 -- 58Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka. Long-range dependencies in reading memory pages in the man-computer system interaction
59 -- 71Pawel Dymora, Miroslaw Mazurek, Slawomir Nieroda. Sensor network infrastructure for intelligent building monitoring and management system
73 -- 85Alina-Mihaela Badescu. A comparison of different modulation techniques performances in an underground multiuser communications scenario
87 -- 92Tomasz Prauzner, Pawel Ptak. The role of standardization in the development of e-learning

Volume 12, Issue 1

7 -- 16Mariusz Maciuk, Wieslawa Kuniszyk-Józkowiak, Anna Doboszynska, Marta Maciuk. Analysis of lung auscultatory phenomena using the Wigner-Ville Distribution
17 -- 29Grzegorz Pawinski, Krzysztof Sapiecha. Resource Allocation Optimization in Critical Chain Method
31 -- 37Tadeusz Zloto, Pawel Ptak, Tomasz Prauzner. Analysis of signals from inductive sensors by means of the DasyLab software
39 -- 45Bartosz Ziólko, Maciej Kruk. Automatic reasoning in the Planet Wars game
47 -- 56Zbigniew Omiotek. A method for QoS differentiation in DiffServ networks based on the long-term properties of a video stream
57 -- 66Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka, Marcin Piekos. Influence of batch structure on cluster computing performance - complex systems approach
67 -- 77Khalil Challita. The Meeting Businessmen Problem: Requirements and Limitations
79 -- 87Artur Kornatka. Generating of Business Database Application Elements