Janusz Furtak

Orcid: 0000-0002-4853-7363

According to our database1, Janusz Furtak authored at least 23 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment.
Sensors, 2023

2022
Connecting the Battlespace: C2 and IoT Technical Interoperability in Tactical Federated Environments.
Proceedings of the IEEE Military Communications Conference, 2022

Data Exchange Protocol for Cryptographic Key Distribution System Using MQTT Service.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

2021
Reliability and Fault Tolerance Solutions for MIoT.
IEEE Commun. Mag., 2021

2020
Cryptographic Keys Generating and Renewing System for IoT Network Nodes - A Concept.
Sensors, 2020

Editorial on Innovative Network Systems and Applications together with the Conference on Information Systems Innovations for Community Services.
Concurr. Comput. Pract. Exp., 2020

Procedures for sensor nodes operation in the secured domain.
Concurr. Comput. Pract. Exp., 2020

2019
A Framework for Constructing a Secure Domain of Sensor Nodes.
Sensors, 2019

Security Domain for the Sensor Nodes with Strong Authentication.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

The Procedure of Key Distribution in Military IoT Networks.
Proceedings of the Computer Networks - 26th International Conference, 2019

An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018

Secured Domain of Sensor Nodes - A New Concept.
Proceedings of the Innovations for Community Services - 18th International Conference, 2018

Application of IoT in military operations in a smart city.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

2017
Method for Determining Effective Diagnostic Structures Within the Military IoT Networks.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
Integrating some security and fault tolerant techniques for military applications of Internet of Things.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Security techniques for the WSN link layer within military IoT.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2015
Secure protocol for wireless communication within internet of military things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Fault-tolerant techniques for the Internet of Military Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Securing transmissions between nodes of WSN using TPM.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

2014
The concept of authentication in WSNs using TPM.
Proceedings of the Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
How to use the TPM in the method of secure data exchange using Flash RAM media.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
The method of secure data exchange using Flash RAM media.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012


  Loading...