Kotulski, Zbigniew
-
Vol 2, No 1 (2004) - Articles
Cryptographic protocol for electronic auctions with extended requirements
Abstract PDF -
Vol 5, No 1 (2006) - Articles
New security and control protocol for VoIP based on steganography and digital watermarking
Abstract PDF -
Vol 8, No 1 (2008) - Articles
SecMon: end-to-end quality and security monitoring system
Abstract PDF -
Vol 8, No 2 (2008) - Articles
SecMon: end-to-end quality and security monitoring system
Abstract PDF -
Vol 9, No 1 (2009) - Articles
Optimization of TLS security protocol using the adaptable security model
Abstract PDF -
Vol 10, No 1 (2010) - Articles
Analysis of neural networks usage for detection of a new attack in IDS
Abstract PDF -
Vol 10, No 1 (2010) - Articles
Middleware non-repudiation service for the data warehouse
Abstract PDF -
Vol 10, No 2 (2010) - Articles
WiMAX Networks – architecture and data security
Abstract PDF -
Vol 11, No 3 (2011) - Articles
Secure time information in the internet key exchange protocol
Abstract PDF -
Vol 11, No 3 (2011) - Articles
Non—cryptographic methods for improving real time transmission security and integrity
Abstract PDF -
Vol 11, No 3 (2011) - Articles
Mobile identity management system in heterogeneous wireless networks
Abstract PDF -
Vol 11, No 4 (2011) - Articles
Agent based infrastructure for real-time applications
Abstract PDF -
Vol 12, No 4 (2012) - Articles
Energy-aware Key Management in Mobile Wireless Sensor Networks
Abstract PDF -
Vol 12, No 4 (2012) - Articles
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures
Abstract PDF -
Vol 14, No 1 (2014) - Articles
Przedmowa - Kryptografia Preface - Cryptography
Abstract PDF -
Vol 14, No 2 (2014) - Articles
Przedmowa - Systemy zabezpieczeń Preface - Security Systems
Abstract PDF -
Vol 14, No 2 (2014) - Articles
Adaptable Context Management Framework for Secure Network Services
Abstract PDF
ISSN: 2083-3628