Abstract is missing.
- How can we justify trust in software based systems?Janusz Górski. 3-12 [doi]
- The capacity of ciphers fulfilling the accessibility of cryptogramsTomasz Hebisz, Eugeniusz Kuriata. 13-22 [doi]
- Parallelization of the Data Encryption Standard (DES) algorithmVolodymyr Beletskyy, D. Burak. 23-33 [doi]
- Linked authenticated dictionaries for certificate status verificationWitold Macków. 35-46 [doi]
- Integrated Payment System for Public Key Infrastructure ServicesImed El Fray, Jerzy Pejas. 47-59 [doi]
- Some methods of the analysis and risk assessment in the PKI system services providersJerzy Pejas, Imed El Fray. 61-70 [doi]
- VAST: Versatile Anonymous System for Web UsersIgor Margasinski, Krzysztof Szczypiorski. 71-82 [doi]
- Cryptography and Steganography: teaching experienceBartosz Sokol, V. N. Yarmolik. 83-92 [doi]
- Analysis of non-linear pseudo-noise sequencesMarek Jackiewicz, Eugeniusz Kuriata. 93-102 [doi]
- Tool support for detecting defects in object-oriented modelsJanusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski. 103-112 [doi]
- The Proposal of Protocol for Electronic Signature Creation in Public EnvironmentWlodzimierz Chocianowicz, Jerzy Pejas, Andrzej Rucinski. 113-124 [doi]
- On Arithmetic Subtraction Linear ApproximationKrzysztof Chmiel. 125-134 [doi]
- Secure Data Transmission via Modulation of the Chaotic Sequence ParametersS. Berczynski, Yu. A. Kravtsov, Jerzy Pejas, E. D. Surovyatkina. 135-142 [doi]
- Some Advances and Challenges in Live Biometrics, Personnel Management, and Other "Human Being" ApplicationsLeonid Kompanets. 145-156 [doi]
- An environment for recognition systems modelingGeorgy Kukharev, Adam Kuzminski. 157-164 [doi]
- Modified Gradient Method for Face LocalizationGeorgy Kukharev, Pawel Masicz, Piotr Masicz. 165-176 [doi]
- Three stage face recognition algorithm for visitor identification systemAdam Nowosielski. 177-184 [doi]
- A New Approach for Hand-Palm RecognitionKhalid Saeed 0001, Marcin Werdoni. 185-194 [doi]
- An Experimental Criterion for Face ClassificationKhalid Saeed 0001, Piotr Charkiewicz. 195-202 [doi]
- Contour Objects Recognition Based On UNL-Fourier DescriptorsDariusz Frejlichowski. 203-208 [doi]
- Sonar Image Simulation by Means of Ray Tracing and Image ProcessingMariusz Borawski, Pawel Forczmanski. 209-214 [doi]
- The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition SystemsLiming Chen 0002, Georgy Kukharev, Tomasz Ponikowski. 215-227 [doi]
- Investigation of fingerprint verification algorithm based on local centers methodEdward Pólrolniczak. 229-238 [doi]
- Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm SketchLeonid Kompanets, Mariusz Kubanek, Szymon Rydzek. 239-251 [doi]
- A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sitesGisella Facchinetti, Ilda Mannino, Giovanni Mastroleo, Stefano Soriani. 255-265 [doi]
- Training assisting program with hybrid decision supporting systemPawel Banás. 267-272 [doi]
- Numerical problems with evaluating the fractal dimension of real dataAdam Szustalewicz. 273-283 [doi]
- Multi-stage ship control in a fuzzy environmentZbigniew Pietrzykowski. 285-299 [doi]
- Informative value of the possibilistic extension principleAndrzej Piegat. 301-310 [doi]
- Intelligent Marine Control SystemsRoman Smierzchalski. 311-319 [doi]
- How to deal with the data in a bankruptcy modellingIzabela Rejer. 321-328 [doi]
- Dependency Mining in Large Sets of Stock Market Trading RulesPiotr Lipinski. 329-336 [doi]
- Choosing representative data items: Kohonen, Neural Gas or Mixture Model?Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou, Andreas Vassilopoulos. 337-344 [doi]
- Application of the Ant Colony Algorithm for the Path PlanningMarcin Plucinski. 345-352 [doi]
- Application of fuzzy logic for track corrector formation into flight simulatorVictor J. Mamaev, Dmitry A. Judin. 353-359 [doi]
- Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional SpacePrzemyslaw Klesk. 361-370 [doi]
- Adaptive simulation of separable dynamical systems in the neural network basisWalery Rogoza. 371-386 [doi]
- Improvement of the processors operating ratio in task scheduling using the deadline methodKoichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi. 387-394 [doi]