Browse Title Index

Issue Title
Vol 12, No 4 (2012) On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) Abstract   PDF
Bogdan Księżopolski, Damian Rusinek, Adam Wierzbicki
Vol 15, No 1 (2015) On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction Abstract   PDF
Kamel Mohammed Faraoun
Vol 14, No 2 (2014) One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions Abstract   PDF
Albert Sitek
Vol 4, No 1 (2006) ontext-aware security and secure context-awareness in ubiquitous computing environments Abstract   PDF
Konrad Wrona, Laurent Gomez
Vol 11, No 1 (2011) Ontology of e-learning applications Abstract   PDF
Tomasz Ordysiński
Vol 4, No 1 (2006) Ontology-based stereotyping in a travel support system Abstract   PDF
Maciej Gawinecki, Mateusz Kruszyk, Marcin Paprzycki
Vol 2, No 1 (2004) OpenMP parser for Ada Abstract   PDF
Rafał Henryk Kartaszyński, Przemysław Stpiczyński
Vol 14, No 3 (2014) Operating system efficiency evaluation on the base of measurements analysis with the use of non-extensive statistics elements Abstract   PDF
Paweł Dymora, Mirosław Mazurek, Kamil Zelazny
Vol 5, No 1 (2006) Optical communication multibus systems Abstract   PDF
Mirosław Hajder, Marek Bolanowski
Vol 9, No 1 (2009) Optimization of TLS security protocol using the adaptable security model Abstract   PDF
Paweł Szałachowski, Bogdan Księżopolski, Zbigniew Kotulski
Vol 2, No 1 (2004) Parallel implementation of the k-connectivity test algorithm Abstract   PDF
Przemysław Sokołowski, Paweł Konieczka, Jakub Sochacki, Marcin Paprzycki
Vol 9, No 1 (2009) Parallelization methodology and analysis of benefits from the TRQR program with parallel computing Abstract   PDF
Marcin Brzuszek, Anna Sasak, Marcin Turek
Vol 5, No 1 (2006) Parallelization of the Tarticle-in-CelP (PIC) density calculations in plasma computer simulations Abstract   PDF
Marcin Brzuszek, Marcin Turek, Juliusz Sielanko
Vol 10, No 2 (2010) Parallelizing a new algorithm for the set partition problem Abstract   PDF
Hoang Chi Thanh
Vol 12, No 3 (2012) Parameterized Hash Functions Abstract   PDF
Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czury
Vol 3, No 1 (2005) Partial shape matching using convex hull and Fourier descriptors Abstract   PDF
Krzysztof Kocjan
Vol 4, No 1 (2006) pecification of dependency areas in UML designs Abstract   PDF
Anna Derezińska
Vol 14, No 3 (2014) Performance Analysis of VPN Remote Access Tunnels Abstract   PDF
Paweł Dymora, Mirosław Mazurek, Tomasz Pilecki
Vol 12, No 3 (2012) Performance Evaluation of Different Universal Steganalysis Techniques in JPG Files Abstract   PDF
Ashraf M. Emam, Mahmoud M. Ouf
Vol 11, No 2 (2011) Performance of algebraic graphs based stream-ciphers using large finite fields Abstract   PDF
Abderezak Touzene, Vasyl Ustimenko, Marwa Alraissi, Imene Boudelioua
Vol 13, No 1 (2013) Performance test of network devices Abstract   PDF
Marek Bolanowski, Andrzej Paszkiewicz
Vol 8, No 1 (2008) Perspectives for using software agents in e-Government applications Abstract   PDF
Zbigniew Piotrowski
Vol 8, No 2 (2008) Perspectives for using software agents in e-Government applications Abstract   PDF
Zbigniew Piotrowski
Vol 5, No 1 (2006) Phase diagram for mixed ternary alloy from evolutionary optimization Abstract   PDF
Tomasz Gwizdałła
Vol 8, No 1 (2008) Photography image enhancement by image fusion Abstract   PDF
Marcin Denkowski, Paweł Mikołajczak
276 - 300 of 449 Items << < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 > >>