default search action
Przemyslaw Kubiak 0001
Person information
- affiliation: Wrocław University of Technology, Poland
Other persons with the same name
- Przemyslaw Kubiak 0002 — Łódź University of Technology, Poland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c26]Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski:
PACE with Mutual Authentication - Towards an Upgraded eID in Europe. ESORICS (2) 2021: 501-519 - [c25]Miroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao:
Poster: eID in Europe - Password Authentication Revisited. Networking 2021: 1-3 - 2020
- [c24]Przemyslaw Kubiak, Miroslaw Kutylowski:
Preventing a Fork in a Blockchain - David Fighting Goliath. TrustCom 2020: 1044-1051
2010 – 2019
- 2019
- [c23]Miroslaw Kutylowski, Przemyslaw Kubiak:
Privacy and Security Analysis of PACE GM Protocol. TrustCom/BigDataSE 2019: 763-768 - 2015
- [c22]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. AsiaCCS 2015: 603-608 - [c21]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Anonymous Evaluation System. NSS 2015: 283-299 - [i2]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. IACR Cryptol. ePrint Arch. 2015: 108 (2015) - 2014
- [c20]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. Inscrypt 2014: 475-495 - [c19]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c18]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406 - 2013
- [j1]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Attack against Ibrahim's Distributed Key Generation for RSA. Int. J. Netw. Secur. 15(4): 313-316 (2013) - [c17]Przemyslaw Kubiak, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. Inscrypt 2013: 132-149 - [i1]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptol. ePrint Arch. 2013: 730 (2013) - 2012
- [c16]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307 - [c15]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24 - [c14]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski:
Restricted Identification without Group Keys. TrustCom 2012: 1194-1199 - 2011
- [c13]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Przemyslaw Kubiak, Wieslaw Paluszynski, Michal Tabor:
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281 - [c12]Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238 - 2010
- [c11]Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao:
How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73 - [c10]Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks-Dutka, Michal Tabor:
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309 - [c9]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270 - [c8]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188 - [c7]Miroslaw Kutylowski, Przemyslaw Kubiak:
Polish Concepts for Securing E-Government Document Flow. ISSE 2010: 399-407
2000 – 2009
- 2008
- [c6]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
Practical Deniable Encryption. SOFSEM 2008: 599-609 - [e1]Miroslaw Kutylowski, Jacek Cichon, Przemyslaw Kubiak:
Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4837, Springer 2008, ISBN 978-3-540-77870-7 [contents] - 2007
- [c5]Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62 - 2006
- [c4]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143 - [c3]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508 - [c2]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26 - [c1]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks:
How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint