Jerzy Pejas

Orcid: 0000-0002-4783-1114

Affiliations:
  • West Pomeranian University of Technology, Szczecin, Poland


According to our database1, Jerzy Pejas authored at least 29 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revocable Signature Scheme with Implicit and Explicit Certificates.
Entropy, September, 2023

A New Approach to the Architecture of Hybrid and Multilayer Steganographic Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2023

2022
A Systematic Review of Highly Transparent Steganographic Methods for the Digital Audio.
Proceedings of the Computer Information Systems and Industrial Management, 2022

2021
Reversible Data Hiding Scheme for Images Using Gray Code Pixel Value Optimization.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Anonymous Group Signature Scheme with Publicly Verifiable General Access Structure.
Proceedings of the Computer Information Systems and Industrial Management, 2021

2020
Long-term verification of signatures based on a blockchain.
Comput. Electr. Eng., 2020

2019
eHealth Integrity Model Based on Permissioned Blockchain.
Future Internet, 2019

2018
Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack.
IEEE Access, 2018

2017
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates.
Comput. J., 2017

A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
Secure Outsourced Bilinear Pairings Computation for Mobile Devices.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy.
Proceedings of the Computer Information Systems and Industrial Management, 2016

Non-standard Certification Models for Pairing Based Cryptography.
Proceedings of the Hard and Soft Computing for Artificial Intelligence, 2016

2015
Verification of Mutual Authentication Protocol for MobInfoSec System.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2014
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Implicit and Explicit Certificates-Based Encryption Scheme.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Long-term preservation of digital signatures for multiple groups of related documents.
IET Inf. Secur., 2012

Certificate-Based Encryption Scheme with General Access Structure.
Proceedings of the Computer Information Systems and Industrial Management, 2012

2010
Chaos-Based Information Security.
Proceedings of the Handbook of Information and Communication Security, 2010

2007
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems.
Proceedings of the Advances in Information Processing and Protection., 2007

2005
Protocol for Certificate Based Access Control Policies Description Language.
Proceedings of the Information Processing and Security Systems., 2005

Some methods of the analysis and risk assessment in the PKI system services providers.
Proceedings of the Enhanced Methods in Computer Security, 2005

Unauthorized servers for online certificates status verification.
Proceedings of the Information Processing and Security Systems., 2005

Integrated Payment System for Public Key Infrastructure Services.
Proceedings of the Enhanced Methods in Computer Security, 2005

The Proposal of Protocol for Electronic Signature Creation in Public Environment.
Proceedings of the Enhanced Methods in Computer Security, 2005

Secure Data Transmission via Modulation of the Chaotic Sequence Parameters.
Proceedings of the Enhanced Methods in Computer Security, 2005

Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters.
Proceedings of the Information Processing and Security Systems., 2005

2001
Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001


  Loading...