Suivre
Marek Klonowski
Marek Klonowski
Wrocław University of Science and Technology
Adresse e-mail validée de pwr.edu.pl - Page d'accueil
Titre
Citée par
Citée par
Année
Practical deniable encryption
M Klonowski, P Kubiak, M Kutyłowski
SOFSEM 2008: Theory and Practice of Computer Science: 34th Conference on …, 2008
932008
Extended sanitizable signatures
M Klonowski, A Lauks
International Conference on Information Security and Cryptology, 343-355, 2006
772006
Onions based on universal re-encryption–anonymous communication immune against repetitive attack
M Gomułkiewicz, M Klonowski, M Kutyłowski
Information Security Applications: 5th International Workshop, WISA 2004 …, 2005
452005
Kleptographic attacks on e-voting schemes
M Gogolewski, M Klonowski, P Kubiak, M Kutyłowski, A Lauks, F Zagórski
Emerging Trends in Information and Communication Security: International …, 2006
442006
Rapid mixing and security of Chaum’s visual electronic voting
M Gomułkiewicz, M Klonowski, M Kutyłowski
European Symposium on Research in Computer Security, 132-145, 2003
402003
Energy-efficient leader election protocols for single-hop radio networks
M Kardas, M Klonowski, D Pajak
2013 42nd International Conference on Parallel Processing, 399-408, 2013
322013
User authorization based on hand geometry without special equipment
M Klonowski, M Plata, P Syga
Pattern Recognition 73, 189-201, 2018
312018
Approximating the size of a radio network in beeping model
P Brandes, M Kardas, M Klonowski, D Pająk, R Wattenhofer
Structural Information and Communication Complexity: 23rd International …, 2016
272016
Universal re-encryption of signatures and controlling anonymous information flow
M Klonowski, M Kutylowski, A Lauks, F Zagorski
WARTACRYPT 4, 1-3, 2004
262004
Dynamic sharing of a multiple access channel
M Bienkowski, M Klonowski, M Korzeniowski, DR Kowalski
arXiv preprint arXiv:1001.3044, 2010
242010
Privacy protection for RFID with hidden subset identifiers
J Cichoń, M Klonowski, M Kutyłowski
International Conference on Pervasive Computing, 298-314, 2008
232008
Anonymous communication with on-line and off-line onion encoding
M Klonowski, M Kutyłowski, F Zagórski
SOFSEM 2005: Theory and Practice of Computer Science: 31st Conference on …, 2005
232005
Forward-secure key evolution in wireless sensor networks
M Klonowski, M Kutyłowski, M Ren, K Rybarczyk
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
222007
Provable anonymity for networks of mixes
M Klonowski, M Kutyłowski
International Workshop on Information Hiding, 26-38, 2005
212005
DUO-Onions and Hydra-Onions—failure and adversary resistant onion protocols
J Iwanik, M Klonowski, M Kutyłowski
Communications and Multimedia Security: 8 th IFIP TC-6 TC-11 Conference on …, 2005
212005
Step-out ring signatures
M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks
International symposium on mathematical foundations of computer science, 431-442, 2008
202008
Privacy protection in dynamic systems based on RFID tags
J Cichon, M Klonowski, M Kutylowski
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
202007
Towards fair leader election in wireless networks
Z Gołȩbiewski, M Klonowski, M Koza, M Kutyłowski
International Conference on Ad-Hoc Networks and Wireless, 166-179, 2009
172009
Practical fault-tolerant data aggregation
K Grining, M Klonowski, P Syga
Applied Cryptography and Network Security: 14th International Conference …, 2016
162016
A practical voting scheme with receipts
M Klonowski, M Kutyłowski, A Lauks, F Zagórski
Information Security: 8th International Conference, ISC 2005, Singapore …, 2005
152005
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20