Æȷοì
Olga Siedlecka-Lamch
Olga Siedlecka-Lamch
icis.pcz.plÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 37th ¡¦, 2017
212017
Probabilistic model checking of security protocols without perfect cryptography assumption
O Siedlecka-Lamch, M Kurkowski, J Piatkowski
Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland ¡¦, 2016
162016
A fast method for security protocols verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski
Computer Information Systems and Industrial Management: 18th International ¡¦, 2019
122019
User authentication protocol based on the location Factor for a mobile environment
M Bart©©omiejczyk, I El Fray, M Kurkowski, S Szymoniak, ...
IEEE Access 10, 16439-16455, 2022
112022
Sat and smt-based verification of security protocols including time aspects
S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ...
Sensors 21 (9), 3055, 2021
112021
On some time aspects in security protocols analysis
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland ¡¦, 2018
102018
A new effective approach for modeling and verification of security protocols
M Kurkowski, O Siedlecka-Lamch, H Piech
Proceedings of CS&P 12, 191-202, 2012
92012
Versectis-an agent based model checker for security protocols
AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ...
Proceedings of the 19th International Conference on Autonomous Agents and ¡¦, 2020
72020
SAT-based verification of NSPK protocol including delays in the network
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017
72017
Verification of mutual authentication protocol for MobInfoSec system
O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś
Computer Information Systems and Industrial Management: 14th IFIP TC 8 ¡¦, 2015
72015
Probabilistic and timed analysis of security protocols
O Siedlecka-Lamch
13th International Conference on Computational Intelligence in Security for ¡¦, 2021
62021
Using backward induction techniques in (timed) security protocols verification
M Kurkowski, O Siedlecka-Lamch, P Dudek
IFIP International Conference on Computer Information Systems and Industrial ¡¦, 2013
62013
Using probabilistic automata for security protocols verification
O Siedlecka-Lamch, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 15 (2), 2016
52016
Towards Most Efficient Method for Untimed Security Protocols Verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray
42020
Some remarks on security protocols verification tools
M Kurkowski, A Kozakiewicz, O Siedlecka-Lamch
Information Systems Architecture and Technology: Proceedings of 37th ¡¦, 2017
42017
Parallel Quantum Algorithm for finding the consistency of Saaty¡¯s matrices
H Piech, O Siedlecka-Lamch
Parallel Processing and Applied Mathematics: 9th International Conference ¡¦, 2012
42012
Securing Meetings in D2D IoT Systems
S Szymoniak, O Siedlecka-Lamch
ETHICOMP 2022, 31, 2022
32022
SMT solvers as efficient tools for automatic time properties verification of security protocols
AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski
2019 20th International Conference on Parallel and Distributed Computing ¡¦, 2019
32019
Comparative study of relational and graph databases
M Lazarska, O Siedlecka-Lamch
2019 IEEE 15th International Scientific Conference on Informatics, 000363-000370, 2019
32019
Network¡¯s delays in timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 39th ¡¦, 2019
32019
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20