ÆÈ·Î¿ì
Miros©©aw Kurkowski
Miros©©aw Kurkowski
Associate Professor at Institute of Computer Science, St. Card. Wyszynski University, Warsaw
uksw.edu.plÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Handbook of finite state based models and applications
J Wang
CRC press, 2012
482012
Modern Cryptography Primer
C Kościelny, M Kurkowski, M Srebrny
Springer Verlag, 2013
362013
Multifactor authentication protocol in a mobile environment
M Bart©©omiejczyk, M Kurkowski
IEEE Access 7, 157185-157199, 2019
312019
Applying timed automata to model checking of security protocols
M Kurkowski, W Penczek
Handbook of Finite State Based Models and Applications, 235-266, 2016
252016
Verifying security protocols modelled by networks of automata
M Kurkowski, W Penczek
Fundamenta Informaticae 79 (3-4), 453-471, 2007
222007
Timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 37th ¡¦, 2017
192017
Probabilistic model checking of security protocols without perfect cryptography assumption
O Siedlecka-Lamch, M Kurkowski, J Piatkowski
Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland ¡¦, 2016
162016
Timed models of security protocols including delays in the network
S Szymoniak, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015
132015
Formalne metody weryfikacji w©©asności protoko©©ów zabezpieczających w sieciach komputerowych
M Kurkowski
Akademicka Oficyna Wydawnicza Exit, 2013
122013
A quantifier-free first-order knowledge logic of authentication
M Kurkowski, M Srebrny
Fundamenta Informaticae 72 (1-3), 263-282, 2006
122006
Sat-based verification of security protocols via translation to networks of automata
M Kurkowski, W Penczek, A Zbrzezny
Model Checking and Artificial Intelligence: 4th Workshop, MoChArt IV, Riva ¡¦, 2007
112007
Towards parallel direct SAT-based cryptanalysis
P Dudek, M Kurkowski, M Srebrny
Parallel Processing and Applied Mathematics: 9th International Conference ¡¦, 2012
102012
On some time aspects in security protocols analysis
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland ¡¦, 2018
92018
A new effective approach for modeling and verification of security protocols
M Kurkowski, O Siedlecka-Lamch, H Piech
Proceedings of CS&P 12, 191-202, 2012
92012
Verifying timed security protocols via translation to timed automata
M Kurkowski, W Penczek
This three-volume booklet contains the papers presented at CS&P¡¯08, the 17th ¡¦, 2009
92009
Efficient verification of security protocols time properties using smt solvers
AM Zbrzezny, S Szymoniak, M Kurkowski
International Joint Conference: 12th International Conference on ¡¦, 2020
72020
A fast method for security protocols verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski
Computer Information Systems and Industrial Management: 18th International ¡¦, 2019
72019
SAT-based verification of NSPK protocol including delays in the network
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017
72017
ProToc—an universal language for security protocols specifications
A Grosser, M Kurkowski, J Piątkowski, S Szymoniak
Soft Computing in Computer and Information Science, 237-248, 2015
72015
ProToc-an universal language for security protocols specification,[in:] Advances in Intelligent Systems and Computing, eds. A. Wiliński, IE Fray, J. Pejas
M Kurkowski, A Grosser, J Piątkowski, S Szymoniak
Springer Verlag 342, 237-248, 2015
72015
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20