Adam Wójtowicz

Orcid: 0000-0003-1276-0915

According to our database1, Adam Wójtowicz authored at least 21 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Secure protocols for smart contract based insurance services.
Expert Syst. J. Knowl. Eng., 2022

2021
Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
Multiparty Computation in Practice: Increasing Security of Documents in Enterprise Content Management Systems.
Proceedings of the ICSEB 2020: The 4th International Conference on Software and e-Business, 2020

Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

Securing Cryptoasset Insurance Services with Multisignatures.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

2018
Securing ubiquitous AR services.
Multim. Tools Appl., 2018

Payment Authorization in Smart Environments: Security-Convenience Balance.
Proceedings of the Enterprise Information Systems - 20th International Conference, 2018

Face-based Passive Customer Identification Combined with Multimodal Context-aware Payment Authorization: Evaluation at Point of Sale.
Proceedings of the 20th International Conference on Enterprise Information Systems, 2018

2017
Technical feasibility of context-aware passive payment authorization for physical points of sale.
Pers. Ubiquitous Comput., 2017

Architecture for adaptable smart spaces oriented on user privacy.
Log. J. IGPL, 2017

Semantic Exploration of Distributed AR Services.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2017

2016
Model for adaptable context-based biometric authentication for mobile devices.
Pers. Ubiquitous Comput., 2016

Declarative GUI descriptions for device-independent applications.
Pers. Ubiquitous Comput., 2016

2015
Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences.
Proceedings of the International Joint Conference, 2015

Building Augmented Reality Presentations with Web 2.0 Tools.
Proceedings of the International Joint Conference, 2015

2014
Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control - Computational Evaluation.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

2013
Security Model for Large Scale Content Distribution Applied to Federated Virtual Environments.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Secure User-Contributed 3D Virtual Environments.
Proceedings of the Interactive 3D Multimedia Content, 2012

2010
Representing User Privileges in Object-Oriented Virtual Reality Systems.
Proceedings of the Emerging Trends in Technological Innovation, 2010

2005
RNA tertiary structure determination: NOE pathways construction by tabu search.
Bioinform., 2005

2004
Evolutionary approach to NOE paths assignment in RNA structure elucidation.
Proceedings of the 2004 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2004


  Loading...