Search

Your search keyword '"Zbigniew Kotulski"' showing total 99 results

Search Constraints

Start Over You searched for: Author "Zbigniew Kotulski" Remove constraint Author: "Zbigniew Kotulski" Language undetermined Remove constraint Language: undetermined
99 results on '"Zbigniew Kotulski"'

Search Results

3. Application-Aware Firewall Mechanism for Software Defined Networks

4. New Security Architecture of Access Control in 5G MEC

5. New SDN-Oriented Distributed Network Security System

6. Cybersecurity education: Evolution of the discipline and analysis of master programs

7. A new risk-based authentication management model oriented on user's experience

8. On a New Intangible Reward for Card-Linked Loyalty Programs

9. Image Encryption using Chaos-Driven Elliptic Curve Pseudo-Random Number Generators

10. 5G networks: Types of isolation and their parameters in RAN and CN slices

11. Graph-based quantitative description of networks' slices isolation

12. Towards constructive approach to end-to-end slice isolation in 5G networks

13. New SDN-Oriented Authentication and Access Control Mechanism

15. On Pseudo-Random Number Generators Using Elliptic Curves and Chaotic Systems

16. On end-to-end approach for slice isolation in 5G networks. Fundamental challenges

17. Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions

18. Multi-level Stateful Firewall Mechanism for Software Defined Networks

21. Reputation as optimality measure in Wireless Sensor Network-based monitoring systems

22. Preface

23. CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks

24. Adaptable security mechanism for dynamic environments

25. On ASGS framework: general requirements and an example of implementation

26. Image Encryption Using Koblitz’s Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator

27. On Mobile Agents Resistance to Traffic Analysis

28. On a mechanism of detection of coalitions for reputation systems in P2P networks

30. Adaptable Context Management Framework for Secure Network Services

31. Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators

32. Context-Aware Secure Routing Protocol for Real-Time Services

33. Cryptography and Security Systems

34. Pseudorandom Number Generators Based on Chaotic Dynamical Systems

35. APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD

36. Effective transmission properties of a randomly segmented elastic bar

37. A Virtualization-Level Future Internet Defense-in-Depth Architecture

40. Mobile identity management system in heterogeneous wireless networks

41. Agent based infrastructure for real-time applications

42. Secure time information in the internet key exchange protocol

43. Non—cryptographic methods for improving real time transmission security and integrity

44. Comparative evaluation of performance-boosting tools for Python

45. Middleware non-repudiation service for the data warehouse

46. SPOT: Optimization Tool for Network Adaptable Security

47. On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks

48. Analysis of neural networks usage for detection of a new attack in IDS

49. Adaptation of the neural network-based IDS to new attacks detection

50. Wave propagation in randomly stratified media and the law of large numbers

Catalog

Books, media, physical & digital resources