Search


 
Issue Title
 
Vol 38, No 3 (2017) Use of probabilistic timed automata for security protocols modeling Abstract  PDF (Polski)
Olga Siedlecka-Lamch
 
Vol 38, No 2 (2017) Analysis and simulations of timed security protocols Abstract  PDF (Polski)
Sabina Szymoniak
 
Vol 29, No 2B (2008): Semiformal Common Criteria compliant it security development framework Semiformal Common Criteria compliant it security development framework Abstract  PDF
Andrzej Białas
 
Vol 37, No 2 (2016) The Method for Quality of Experience Evaluation of IT Services Abstract  PDF
Mikhail Mokkas, Bogdan Księżopolski
 
Vol 37, No 1 (2016) Verification of security protocols including delays in the network Abstract  PDF (Polski)
Sabina Szymoniak
 
Vol 25, No 1 (2004) Optimization of a join operation in implementation of a data warehouse security system Abstract
Jacek Frączek
 
Vol 31, No 2B (2010) Mobile databases security Abstract  PDF (Polski)
Katarzyna Harężlak
 
Vol 25, No 1 (2004) The implementation of security polices in data warehouse Abstract
Marcin Gorawski, Jacek Frączek
 
Vol 32, No 2B (2011) Some remarks on optimization impact on database security Abstract  PDF
Krzysztof Miodek, Krzysztof Podlaski, Ścibór Sobieski, Bartosz Zieliński
 
Vol 26, No 2 (2005) Efficiency of association rules mining algorithms with preserving data privicy Abstract  PDF (Polski)
Marcin Gorawski, Karol Stachurski
 
Vol 32, No 3A (2011) Traffic analysis based on IP packet size Abstract  PDF (Polski)
Tomasz Bilski
 
Vol 27, No 4 (2006) Smart cards in user authentication process on Windows operating systems Abstract  PDF (Polski)
Michał Lewandowski
 
Vol 32, No 3A (2011) The problem of mobile devices security Abstract  PDF (Polski)
Teresa Mendyk-Krajewska, Zygmunt Mazur
 
Vol 33, No 2B (2012) The development of automatic object identification systems Abstract  PDF (Polski)
Zygmunt Mazur, Hanna Mazur
 
Vol 29, No 4B (2008) Hashing algorithms – a way to secure your application Abstract  PDF
Wiktor A Fryze, Ireneusz J Jóźwiak, Andrzej M Kałuża
 
Vol 33, No 2B (2012) The issue of confidentiality, authentication, integrity and data non-repudiation in the multiagent systems Abstract  PDF (Polski)
Marcin Strzalek, Piotr Palka
 
Vol 29, No 4B (2008) The VoIP communication security protocols Abstract  PDF
Piotr Zawadzki
 
Vol 33, No 3A (2012) Adaptation of honeypot solutions for WSN Abstract  PDF (Polski)
Krzysztof Lasota, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz
 
Vol 30, No 2B (2009) Lateral SQL injection Abstract  PDF (Polski)
Anna Kotulla
 
Vol 33, No 3A (2012) Trust management in WSN – a case study Abstract  PDF (Polski)
Janusz Górski, Alan Turower
 
Vol 30, No 2B (2009) Digital identity in Internet basing on OpenID protocol Abstract  PDF (Polski)
Marcin Gorawski, Marcin Flasiński
 
Vol 34, No 3 (2013) CoRBAC – context-oriented role based access control Abstract  PDF (Polski)
Henryk Krawczyk, Paweł Lubomski
 
Vol 31, No 2B (2010) Enabling remote statistical calculation services by using the multilayer ServeR system Abstract  PDF (Polski)
Dariusz R Augustyn, Łukasz Warchał
 
Vol 36, No 3 (2015) Cryptoanalysis of HPM14 encryption algorithm Abstract  PDF (Polski)
Dariusz Rzońca
 
Vol 31, No 2B (2010) Security problem in chosen a cryptografic methods Abstract  PDF (Polski)
Wojciech Ambrozik, Romuald Błaszczyk
 
1 - 25 of 25 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"