팔로우
Imed El Fray
제목
인용
인용
연도
Multifactor authentication protocol in a mobile environment
M Bartłomiejczyk, M Kurkowski
IEEE Access 7, 157185-157199, 2019
432019
A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in information systems
I El Fray
Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012
302012
User authentication protocol based on the location Factor for a mobile environment
M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ...
IEEE Access 10, 16439-16455, 2022
112022
Sensitive information protection on mobile devices using general access structures
T Hyla, J Pejaś, I El Fray, W Maćków, W Chocianowicz, M Szulga
structure 16, 17, 2014
112014
A new mathematical model for analytical risk assessment and prediction in IT systems
IE Fray, M Kurkowski, J Pejaś, W Maćków
Control and Cybernetics 41 (1), 241-268, 2012
92012
Verification of mutual authentication protocol for MobInfoSec system
O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś
Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015
72015
Long-term preservation of digital signatures for multiple groups of related documents
T Hyla, I El Fray, W Maćków, J Pejaś
IET Information Security 6 (3), 219-227, 2012
72012
Authentication protocol for software and hardware components in distributed electronic signature creation system
J Pejaś, I El Fray, A Ruciński
Prz Elektrotechniczn, 2012
72012
Securing event logs with blockchain for IoT
M Kłos, I El Fray
International Conference on Computer Information Systems and Industrial …, 2020
62020
New xml signature scheme that is resistant to some attacks
G Wawrzyniak, I El Fray
IEEE Access 8, 35815-35831, 2020
62020
Deniable File System--Application of Deniable Storage to Protection of Private Keys
B Oler, I El Fray
6th International Conference on Computer Information Systems and Industrial …, 2007
62007
Towards Most Efficient Method for Untimed Security Protocols Verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray
42020
Load-balanced Integrated Information Security Monitoring System.
T Klasa, I El Fray
FedCSIS (Communication Papers), 213-221, 2017
42017
Hard and Soft computing for artificial intelligence, multimedia and security
S Kobayashi, A Piegat, J Pejaś, I El Fray, J Kacprzyk
Springer International Publishing, 2017
42017
Practical authentication protocols for protecting and sharing sensitive information on mobile devices
I El Fray, T Hyla, M Kurkowski, W Maćków, J Pejaś
Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014
42014
The implementation of electronic document in transaction execution
G Wawrzyniak, I El Fray
Computer Information Systems and Industrial Management: 16th IFIP TC8 …, 2017
32017
An electronic document for distributed electronic services
G Wawrzyniak, IE Fray
Computer Information Systems and Industrial Management: 15th IFIP TC8 …, 2016
32016
Protection profile for secure sensitive information system on mobile devices
I El Fray, T Hyla, W Chocianowicz
Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014
32014
Trust construction for security functions and mechanisms of IT system using results of risk analysis
I El Fray
Pomiary Automatyka Kontrola 55 (10), 893-843, 2009
32009
About some application of risk analysis and evaluation
I El Fray
Artificial Intelligence and Security in Computing Systems: 9th International …, 2003
32003
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20