251 results on '"Kotulski, Zbigniew"'
Search Results
2. Security architecture for authorized anonymous communication in 5G MEC
3. New Security Architecture of Access Control in 5G MEC
4. 5G networks: Types of isolation and their parameters in RAN and CN slices
5. State-of-the-Art and New Challenges in 5G Networks with Blockchain Technology
6. Application-Aware Firewall Mechanism for Software Defined Networks
7. On a New Intangible Reward for Card-Linked Loyalty Programs
8. Adaptation of the neural network-based IDS to new attacks detection
9. SecMon: End-to-End Quality and Security Monitoring System
10. New SDN-Oriented Authentication and Access Control Mechanism
11. Lightweight security mechanism for PSTN-VoIP cooperation
12. ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
13. New security and control protocol for VoIP based on steganography and digital watermarking
14. A new authentication protocol for revocable anonymity in ad-hoc networks
15. Security of mobile agents: a new concept of the integrity protection
16. Alternative security architecture for IP Telephony based on digital watermarking
17. Cybersecurity education: Evolution of the discipline and analysis of master programs
18. A new risk-based authentication management model oriented on user's experience
19. The upper bound on number of graphs, with fixed number of vertices, that vertices can be colored with n colors
20. Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography
21. On secret sharing for graphs
22. On graph coloring check-digit method
23. On ASGS framework: general requirements and an example of implementation
24. On alternative approach for verifiable secret sharing
25. On the graph coloring check-digit scheme with applications to verifiable secret sharing
26. Multi-level Stateful Firewall Mechanism for Software Defined Networks
27. Cardholder’s Reputation System for Contextual Risk Management in Payment Transactions
28. Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators
29. Context-Aware Secure Routing Protocol for Real-Time Services
30. Improving security of lightweith SHA-3 against preimage attacks
31. Problems Described by Implicit Equations
32. Three-dimensional Functions of Independent Random Variables
33. Two-dimensional Distributions
34. Functions of Independent Random Variables
35. Probability Distributions and Their Characterizations
36. Random Variables and Probability; Normal Distribution
37. Basic Characteristics of Error Distribution; Histograms
38. Useful Definitions and Facts of Probability Theory for Further Reading
39. Image Encryption Using Koblitz’s Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator
40. On a New Intangible Reward for Card-Linked Loyalty Programs
41. A Virtualization-Level Future Internet Defense-in-Depth Architecture
42. Secure Position-Based Selecting Scheme for WSN Communication
43. On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks
44. SPOT: Optimization Tool for Network Adaptable Security
45. Adaptive Approach to Network Security
46. New SDN-Oriented Authentication and Access Control Mechanism
47. Covert Channel for Improving VoIP Security
48. Neural Network as a Programmable Block Cipher
49. Cybersecurity: trends, issues, and challenges
50. POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.