팔로우
Olga Siedlecka-Lamch
Olga Siedlecka-Lamch
icis.pcz.pl의 이메일 확인됨
제목
인용
인용
연도
Timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
212017
Probabilistic model checking of security protocols without perfect cryptography assumption
O Siedlecka-Lamch, M Kurkowski, J Piatkowski
Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland …, 2016
162016
A fast method for security protocols verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski
Computer Information Systems and Industrial Management: 18th International …, 2019
122019
User authentication protocol based on the location Factor for a mobile environment
M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ...
IEEE Access 10, 16439-16455, 2022
112022
Sat and smt-based verification of security protocols including time aspects
S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ...
Sensors 21 (9), 3055, 2021
112021
On some time aspects in security protocols analysis
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018
102018
A new effective approach for modeling and verification of security protocols
M Kurkowski, O Siedlecka-Lamch, H Piech
Proceedings of CS&P 12, 191-202, 2012
92012
Versectis-an agent based model checker for security protocols
AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ...
Proceedings of the 19th International Conference on Autonomous Agents and …, 2020
72020
SAT-based verification of NSPK protocol including delays in the network
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017
72017
Verification of mutual authentication protocol for MobInfoSec system
O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś
Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015
72015
Probabilistic and timed analysis of security protocols
O Siedlecka-Lamch
13th International Conference on Computational Intelligence in Security for …, 2021
62021
Using backward induction techniques in (timed) security protocols verification
M Kurkowski, O Siedlecka-Lamch, P Dudek
IFIP International Conference on Computer Information Systems and Industrial …, 2013
62013
Using probabilistic automata for security protocols verification
O Siedlecka-Lamch, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 15 (2), 2016
52016
Towards Most Efficient Method for Untimed Security Protocols Verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray
42020
Some remarks on security protocols verification tools
M Kurkowski, A Kozakiewicz, O Siedlecka-Lamch
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
42017
Parallel Quantum Algorithm for finding the consistency of Saaty’s matrices
H Piech, O Siedlecka-Lamch
Parallel Processing and Applied Mathematics: 9th International Conference …, 2012
42012
Securing Meetings in D2D IoT Systems
S Szymoniak, O Siedlecka-Lamch
ETHICOMP 2022, 31, 2022
32022
SMT solvers as efficient tools for automatic time properties verification of security protocols
AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski
2019 20th International Conference on Parallel and Distributed Computing …, 2019
32019
Comparative study of relational and graph databases
M Lazarska, O Siedlecka-Lamch
2019 IEEE 15th International Scientific Conference on Informatics, 000363-000370, 2019
32019
Network’s delays in timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 39th …, 2019
32019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20