Marcin Niemiec

Orcid: 0000-0002-3909-9592

According to our database1, Marcin Niemiec authored at least 39 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synchronization of Tree Parity Machines Using Nonbinary Input Vectors.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

2023
Secure Synchronization of Artificial Neural Networks Used to Correct Errors in Quantum Cryptography.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Workflow management system with smart procedures.
Multim. Tools Appl., 2022

Oxford-style Debates in Telecommunication and Computer Science Education.
CoRR, 2022

Impact of Nonbinary Input Vectors on Security of Tree Parity Machine.
Proceedings of the Multimedia Communications, Services and Security, 2022

Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities.
Proceedings of the Multimedia Communications, Services and Security, 2022

2021
Multivariable Heuristic Approach to Intrusion Detection in Network Environments.
Entropy, 2021

Quantum Key Distribution: A Networking Perspective.
ACM Comput. Surv., 2021

Synchronization of Tree Parity Machines using non-binary input vectors.
CoRR, 2021

Oxford-style Debates for IT Students.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

2020
Error Reconciliation in Quantum Key Distribution Protocols.
Proceedings of the Reversible Computation: Extending Horizons of Computing, 2020

A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks.
IEEE/ACM Trans. Netw., 2020

Multi-sector Assessment Framework - a New Approach to Analyse Cybersecurity Challenges and Opportunities.
Proceedings of the Multimedia Communications, Services and Security, 2020

Impact of Bloom Filters on Security and Efficiency of SecaaS Services.
Proceedings of the Multimedia Communications, Services and Security, 2020

2019
Error correction in quantum cryptography based on artificial neural networks.
Quantum Inf. Process., 2019

Risk Assessment Approach to Secure Northbound Interface of SDN Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2017
Universal privacy-preserving platform for SecaaS services.
Int. J. Netw. Manag., 2017

Security Assessment of Cryptographic Algorithms.
Proceedings of the Computer Network Security, 2017

Intrusion Prevention System Decision Diagram in Security-as-a-Service Solutions.
Proceedings of the Multimedia Communications, Services and Security, 2017

SDNRoute: Integrated system supporting routing in Software Defined Networks.
Proceedings of the 2017 19th International Conference on Transparent Optical Networks (ICTON), 2017

2016
Security architecture for law enforcement agencies.
Multim. Tools Appl., 2016

Authentication in virtual private networks based on quantum key distribution methods.
Multim. Tools Appl., 2016

Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality.
Int. J. Inf. Sec., 2016

Lightweight compression with encryption based on Asymmetric Numeral Systems.
CoRR, 2016

2015
First step towards preserving the privacy of cloud-based IDS security policies.
Secur. Commun. Networks, 2015

Integrated security infrastructures for law enforcement agencies.
Multim. Tools Appl., 2015

GDC 2: Compression of large collections of genomes.
CoRR, 2015

Book reviews [Two books reviewed].
IEEE Commun. Mag., 2015

Federated identity in real-life applications.
Proceedings of the 2015 European Conference on Networks and Communications, 2015

2013
Management of security in quantum cryptography.
IEEE Commun. Mag., 2013

INDECT Security Architecture.
Proceedings of the Multimedia Communications, Services and Security, 2013

2012
Security Infrastructures: Towards the INDECT System Security.
Proceedings of the Multimedia Communications, Services and Security, 2012

Towards Hardware Implementation of INDECT Block Cipher.
Proceedings of the Multimedia Communications, Services and Security, 2012

A new symmetric block cipher based on key-dependent S-boxes.
Proceedings of the 4th International Congress on Ultra Modern Telecommunications and Control Systems, 2012

The measure of security in quantum cryptography.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Overview of the Security Components of INDECT Project.
Proceedings of the Multimedia Communications, Services and Security, 2011

Quantum Cryptography Protocol Simulator.
Proceedings of the Multimedia Communications, Services and Security, 2011

2010
INDECT Advanced Security Requirements
CoRR, 2010

2008
Reviews of [( "Security for Mobile Networks and Platforms", Aissi, S., et al) and (Cooperation in Wireless Networks: Principles and Applications, Fitzek, H.P. and Katz, M.D., Eds.; 2006)].
IEEE Commun. Mag., 2008


  Loading...