Adam Czubak

Orcid: 0000-0003-1336-2839

According to our database1, Adam Czubak authored at least 11 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
The Dangers of Key Reuse: Practical Attacks on IPsec IKE.
Proceedings of the 27th USENIX Security Symposium, 2018

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels.
Proceedings of the Computer Networks - 25th International Conference, 2018

2016
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

2014
Approximate Algorithm for Fast Capacity Provisioning in WANs with Trade-Off between Performance and Cost under Budget Constraint.
Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30, 2014

2013
Designing Frame Relay WAN Networks with Trade-Off between Link Cost and Performance.
Proceedings of the Man-Machine Interactions 3, 2013

Virtual Environment for Implementation and Testing Private Wide Area Network Solutions.
Proceedings of the New Results in Dependability and Computer Systems, 2013

A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms.
Proceedings of the New Results in Dependability and Computer Systems, 2013

A Note on the Local Minimum Problem in Wireless Sensor Networks.
Proceedings of the Computer Networks, 20th International Conference, 2013

2011
The Network Balance Realized by Routing Organization System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2011

2010
Lifespan-Aware Routing for Wireless Sensor Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2010

2009
Minimal Büchi Automata for Certain Classes of LTL Formulas.
Proceedings of the Fourth International Conference on Dependability of Computer Systems, 2009


  Loading...