Bogdan Ksiezopolski

According to our database1, Bogdan Ksiezopolski authored at least 41 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cryptographic keys management system based on DNA strands.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Cybersecurity: trends, issues, and challenges.
EURASIP J. Inf. Secur., 2018

A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2017
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Sensors, 2017

On Data Flow Management: the Multilevel Analysis of Data Center Total Cost.
CoRR, 2017

How to Train People to Increase Their Security Awareness in IT.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
On the Modelling of Context-Aware Security for Mobile Devices.
Mob. Inf. Syst., 2016

Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks.
J. Sensors, 2016

2015
Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

The Robust Measurement Method for Security Metrics Generation.
Comput. J., 2015

On the Modelling of the Influence of Access Control Management to the System Security and Performance.
Proceedings of the ICEIS 2015, 2015

On the Balancing Security Against Performance in Database Systems.
Proceedings of the Computer Networks - 22nd International Conference, 2015

AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2014
The Concept and Security Analysis of Wireless Sensor Network for Gas Lift in Oilwells.
Ann. UMCS Informatica, 2014

On the Effect of Security and Communication Factors in the Reliability of Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014

Motivation-Based Risk Analysis Process for IT Systems.
Proceedings of the Information and Communication Technology, 2014

On the Modelling of the Computer Security Impact on the Reputation Systems.
Proceedings of the Information and Communication Technology, 2014

Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Multihop Node Authentication Mechanisms for Wireless Sensor Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Surprising Consequences of Simple Privacy Protection Method.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML).
Ann. UMCS Informatica, 2012

QoP-ML: Quality of protection modelling language for cryptographic protocols.
Comput. Secur., 2012

2011
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2.
Ann. UMCS Informatica, 2011

Secure Position-Based Selecting Scheme for WSN Communication.
Proceedings of the Computer Networks - 18th Conference, 2011

On Scalable Security Audit for Web Application According to ISO 27002.
Proceedings of the Computer Networks - 18th Conference, 2011

2010
Middleware non-repudiation service for the data warehouse.
Ann. UMCS Informatica, 2010

CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks.
Inf. Process. Lett., 2010

On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
Proceedings of the Computer Networks - 17th Conference, 2010

SPOT: Optimization Tool for Network Adaptable Security.
Proceedings of the Computer Networks - 17th Conference, 2010

2009
Optimization of TLS security protocol using the adaptable security model.
Ann. UMCS Informatica, 2009

Voter non-repudiation oriented scheme for the medium scale e-voting protocol.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009

Adaptive Approach to Network Security.
Proceedings of the Computer Networks - 16th Conference, 2009

2007
Attack and revison of an electronic auction protocol using OFMC.
Ann. UMCS Informatica, 2007

Adaptable security mechanism for dynamic environments.
Comput. Secur., 2007

2005
Implementation of certification subprotocol for electronic auction.
Ann. UMCS Informatica, 2005

On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules.
Proceedings of the ADBIS 2005, 2005

2004
Cryptographic protocol for electronic auctions with extended requirements.
Ann. UMCS Informatica, 2004

2003
Using PHP and HTML languages to create graphical interfaces and to remote control of programs.
Ann. UMCS Informatica, 2003

Using PHP and HTML languages and MySQL databases to create servers of scientific information.
Ann. UMCS Informatica, 2003


  Loading...