팔로우
Sabina Szymoniak
Sabina Szymoniak
icis.pcz.pl의 이메일 확인됨
제목
인용
인용
연도
Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar
Applied Sciences 13 (1), 404, 2022
212022
Security protocols analysis including various time parameters
S Szymoniak
Mathematical Biosciences and Engineering 18 (2), 1136-1153, 2021
212021
Timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
212017
Amelia—A new security protocol for protection against false links
S Szymoniak
Computer Communications 179, 73-81, 2021
152021
ProToc—An universal language for security protocols specifications
A Grosser, M Kurkowski, J Piątkowski, S Szymoniak
Soft Computing in Computer and Information Science, 237-248, 2015
15*2015
User authentication protocol based on the location factor for a mobile environment
M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ...
IEEE Access 10, 16439-16455, 2022
142022
Timed models of security protocols including delays in the network
S Szymoniak, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015
132015
Sat and smt-based verification of security protocols including time aspects
S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ...
Sensors 21 (9), 3055, 2021
122021
A fast method for security protocols verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski
Computer Information Systems and Industrial Management: 18th International …, 2019
122019
On some time aspects in security protocols analysis
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018
112018
Versectis-an agent based model checker for security protocols
AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ...
Proceedings of the 19th International Conference on Autonomous Agents and …, 2020
72020
Efficient verification of security protocols time properties using SMT solvers
AM Zbrzezny, S Szymoniak, M Kurkowski
International Joint Conference: 12th International Conference on …, 2020
72020
SAT-based verification of NSPK protocol including delays in the network
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017
72017
Using a security protocol to protect against false links
S Szymoniak
Moving technology ethics at the forefront of society, organisations and …, 2021
62021
Practical approach in verification of security systems using satisfiability modulo theories
AM Zbrzezny, S Szymoniak, M Kurkowski
Logic Journal of the IGPL 30 (2), 289-300, 2022
42022
Towards Most Efficient Method for Untimed Security Protocols Verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray
42020
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
S Szymoniak
ACM Computing Surveys 56 (6), 1–31, 2024
32024
Securing Meetings in D2D IoT Systems
S Szymoniak, O Siedlecka-Lamch
ETHICOMP 2022 31, 2022
32022
How to Be on Time with Security Protocol?
S Szymoniak
Societal Challenges in the Smart Society, 225-238, 2020
32020
SMT solvers as efficient tools for automatic time properties verification of security protocols
AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski
2019 20th International Conference on Parallel and Distributed Computing …, 2019
32019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20