Page Header

User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Font Size

Deklaracja dostępności
  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Announcements
Home > Archives > Vol 11, No 3 (2011)

Vol 11, No 3 (2011)

Table of Contents

Security problems of systems of extremely weak devices
Marek Klonowski
PDF
9-26
Effective reduction of cryptographic protocols specification for model-checking with Spin
Piotr Sapiecha, Urszula Krawczyk
PDF
27-40
Secure time information in the internet key exchange protocol
Zbigniew Kotulski, Paweł Szałachowski
PDF
41-56
Implementation of the DSSS method in watermarking digital audio objects
Piotr Gajewski, Zbigniew Piotrowski, Jarosław Wojtuń
PDF
57-70
Non—cryptographic methods for improving real time transmission security and integrity
Zbigniew Kotulski, Grzegorz Oryńczak
PDF
71-86
Small prototype acquisition system with secure remote data access
Andrzej Stec, Dariusz Rzońca
PDF
87-100
Group signature revocable anonymity scheme for network monitoring
Krystian Baniak
PDF
101-116
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2
Bogdan Księżopolski, Damian Rusinek
PDF
117-128
The security of the multi-application public transport card
Łukasz Papież
PDF
129-140
Mobile identity management system in heterogeneous wireless networks
Zbigniew Kotulski, Łukasz Kucharzewski
PDF
141-152


ISSN: 2083-3628