Handbook of finite state based models and applications J Wang CRC press, 2012 | 48 | 2012 |
Modern Cryptography Primer C Kościelny, M Kurkowski, M Srebrny Springer Verlag, 2013 | 36 | 2013 |
Multifactor authentication protocol in a mobile environment M Bart©©omiejczyk, M Kurkowski IEEE Access 7, 157185-157199, 2019 | 31 | 2019 |
Applying timed automata to model checking of security protocols M Kurkowski, W Penczek Handbook of Finite State Based Models and Applications, 235-266, 2016 | 25 | 2016 |
Verifying security protocols modelled by networks of automata M Kurkowski, W Penczek Fundamenta Informaticae 79 (3-4), 453-471, 2007 | 22 | 2007 |
Timed analysis of security protocols S Szymoniak, O Siedlecka-Lamch, M Kurkowski Information Systems Architecture and Technology: Proceedings of 37th ¡¦, 2017 | 19 | 2017 |
Probabilistic model checking of security protocols without perfect cryptography assumption O Siedlecka-Lamch, M Kurkowski, J Piatkowski Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland ¡¦, 2016 | 16 | 2016 |
Timed models of security protocols including delays in the network S Szymoniak, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015 | 13 | 2015 |
Formalne metody weryfikacji w©©asności protoko©©ów zabezpieczających w sieciach komputerowych M Kurkowski Akademicka Oficyna Wydawnicza Exit, 2013 | 12 | 2013 |
A quantifier-free first-order knowledge logic of authentication M Kurkowski, M Srebrny Fundamenta Informaticae 72 (1-3), 263-282, 2006 | 12 | 2006 |
Sat-based verification of security protocols via translation to networks of automata M Kurkowski, W Penczek, A Zbrzezny Model Checking and Artificial Intelligence: 4th Workshop, MoChArt IV, Riva ¡¦, 2007 | 11 | 2007 |
Towards parallel direct SAT-based cryptanalysis P Dudek, M Kurkowski, M Srebrny Parallel Processing and Applied Mathematics: 9th International Conference ¡¦, 2012 | 10 | 2012 |
On some time aspects in security protocols analysis S Szymoniak, O Siedlecka-Lamch, M Kurkowski Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland ¡¦, 2018 | 9 | 2018 |
A new effective approach for modeling and verification of security protocols M Kurkowski, O Siedlecka-Lamch, H Piech Proceedings of CS&P 12, 191-202, 2012 | 9 | 2012 |
Verifying timed security protocols via translation to timed automata M Kurkowski, W Penczek This three-volume booklet contains the papers presented at CS&P¡¯08, the 17th ¡¦, 2009 | 9 | 2009 |
Efficient verification of security protocols time properties using smt solvers AM Zbrzezny, S Szymoniak, M Kurkowski International Joint Conference: 12th International Conference on ¡¦, 2020 | 7 | 2020 |
A fast method for security protocols verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski Computer Information Systems and Industrial Management: 18th International ¡¦, 2019 | 7 | 2019 |
SAT-based verification of NSPK protocol including delays in the network S Szymoniak, O Siedlecka-Lamch, M Kurkowski 2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017 | 7 | 2017 |
ProToc—an universal language for security protocols specifications A Grosser, M Kurkowski, J Piątkowski, S Szymoniak Soft Computing in Computer and Information Science, 237-248, 2015 | 7 | 2015 |
ProToc-an universal language for security protocols specification,[in:] Advances in Intelligent Systems and Computing, eds. A. Wiliński, IE Fray, J. Pejas M Kurkowski, A Grosser, J Piątkowski, S Szymoniak Springer Verlag 342, 237-248, 2015 | 7 | 2015 |