Timed analysis of security protocols S Szymoniak, O Siedlecka-Lamch, M Kurkowski Information Systems Architecture and Technology: Proceedings of 37th …, 2017 | 21 | 2017 |
Probabilistic model checking of security protocols without perfect cryptography assumption O Siedlecka-Lamch, M Kurkowski, J Piatkowski Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland …, 2016 | 16 | 2016 |
User authentication protocol based on the location Factor for a mobile environment M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ... IEEE Access 10, 16439-16455, 2022 | 12 | 2022 |
A fast method for security protocols verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski Computer Information Systems and Industrial Management: 18th International …, 2019 | 12 | 2019 |
Sat and smt-based verification of security protocols including time aspects S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ... Sensors 21 (9), 3055, 2021 | 11 | 2021 |
On some time aspects in security protocols analysis S Szymoniak, O Siedlecka-Lamch, M Kurkowski Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018 | 10 | 2018 |
A new effective approach for modeling and verification of security protocols M Kurkowski, O Siedlecka-Lamch, H Piech Proceedings of CS&P 12, 191-202, 2012 | 9 | 2012 |
Versectis-an agent based model checker for security protocols AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ... Proceedings of the 19th International Conference on Autonomous Agents and …, 2020 | 7 | 2020 |
SAT-based verification of NSPK protocol including delays in the network S Szymoniak, O Siedlecka-Lamch, M Kurkowski 2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017 | 7 | 2017 |
Verification of mutual authentication protocol for MobInfoSec system O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015 | 7 | 2015 |
Probabilistic and timed analysis of security protocols O Siedlecka-Lamch 13th International Conference on Computational Intelligence in Security for …, 2021 | 6 | 2021 |
Using backward induction techniques in (timed) security protocols verification M Kurkowski, O Siedlecka-Lamch, P Dudek IFIP International Conference on Computer Information Systems and Industrial …, 2013 | 6 | 2013 |
Comparative study of relational and graph databases M Lazarska, O Siedlecka-Lamch 2019 IEEE 15th International Scientific Conference on Informatics, 000363-000370, 2019 | 5 | 2019 |
Using probabilistic automata for security protocols verification O Siedlecka-Lamch, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 15 (2), 2016 | 5 | 2016 |
Towards Most Efficient Method for Untimed Security Protocols Verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray | 4 | 2020 |
Some remarks on security protocols verification tools M Kurkowski, A Kozakiewicz, O Siedlecka-Lamch Information Systems Architecture and Technology: Proceedings of 37th …, 2017 | 4 | 2017 |
Parallel Quantum Algorithm for finding the consistency of Saaty’s matrices H Piech, O Siedlecka-Lamch Parallel Processing and Applied Mathematics: 9th International Conference …, 2012 | 4 | 2012 |
Securing Meetings in D2D IoT Systems S Szymoniak, O Siedlecka-Lamch ETHICOMP 2022, 31, 2022 | 3 | 2022 |
SMT solvers as efficient tools for automatic time properties verification of security protocols AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski 2019 20th International Conference on Parallel and Distributed Computing …, 2019 | 3 | 2019 |
Network’s delays in timed analysis of security protocols S Szymoniak, O Siedlecka-Lamch, M Kurkowski Information Systems Architecture and Technology: Proceedings of 39th …, 2019 | 3 | 2019 |