Marek Klonowski

Orcid: 0000-0002-3141-8712

According to our database1, Marek Klonowski authored at least 101 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Restrained medium access control on adversarial shared channels.
J. Comput. Syst. Sci., December, 2023

Preliminary Report: On Information Hiding in Multi-Hop Radio Networks.
CoRR, 2023

Defending Network IDS against Adversarial Examples with Continual Learning.
Proceedings of the IEEE International Conference on Data Mining, 2023

On Size Hiding Protocols in Beeping Model.
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023

Efficient Protective Jamming in 2D SINR Networks.
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023

Do Not Trust Me: Explainability Against Text Classification.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
Generalized framework for Group Testing: Queries, feedbacks and adversaries.
Theor. Comput. Sci., 2022

2021
New View on Adversarial Queueing on MAC.
IEEE Commun. Lett., 2021

Exact and Efficient Protective Jamming in SINR-based Wireless Networks.
Proceedings of the 29th International Symposium on Modeling, 2021

2020
Fast size approximation of a radio network in beeping model.
Theor. Comput. Sci., 2020

What Our Choices Say About Our Preferences?
CoRR, 2020

Probabilistic Counters for Privacy Preserving Data Aggregation.
CoRR, 2020

Stronger trust and privacy in social networks via local cooperation1.
J. Complex Networks, 2020

Contention resolution on a restrained channel.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Droppix: Towards More Realistic Video Fingerprinting.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
On practical privacy-preserving fault-tolerant data aggregation.
Int. J. Inf. Sec., 2019

Ordered and delayed adversaries and how to work against them on a shared channel.
Distributed Comput., 2019

How to obfuscate execution of protocols in an ad hoc radio network?
Ad Hoc Networks, 2019

Energy Efficient Adversarial Routing in Shared Channels.
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019

Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Universal Encoding for Provably Irreversible Data Erasing.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Fault-Tolerant Parallel Scheduling of Arbitrary Length Jobs on a Shared Channel.
Proceedings of the Fundamentals of Computation Theory - 22nd International Symposium, 2019

How to Save Your Face: a Facial Recognition Method Robust Against Image Reconstruction.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

2018
User authorization based on hand geometry without special equipment.
Pattern Recognit., 2018

Power Constrained Parallel Queuing with Contention.
CoRR, 2018

Light-weight and secure aggregation protocols based on Bloom filters✰.
Comput. Secur., 2018

Brief Announcement: Broadcast in Radio Networks, Time vs. Energy Tradeoffs.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

2017
Broadcast in radio networks: time vs. energy tradeoffs.
CoRR, 2017

Enhancing privacy for ad hoc systems with predeployment key distribution.
Ad Hoc Networks, 2017

How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

On Location Hiding in Distributed Systems.
Proceedings of the Structural Information and Communication Complexity, 2017

Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Distributed Alarming in the On-Duty and Off-Duty Models.
IEEE/ACM Trans. Netw., 2016

Energy-optimal algorithms for computing aggregative functions in random networks.
Discret. Math. Theor. Comput. Sci., 2016

Randomized mutual exclusion on a multiple access channel.
Distributed Comput., 2016

Privacy of Aggregated Data without Noise.
CoRR, 2016

On spreading rumor in heterogeneous systems.
CoRR, 2016

Approximating the Size of a Radio Network in Beeping Model.
Proceedings of the Structural Information and Communication Complexity, 2016

Practical privacy preserving size approximation in distributed systems.
Proceedings of the 10th International Symposium on Communication Systems, 2016

Practical Fault-Tolerant Data Aggregation.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015

Provable Unlinkability Against Traffic Analysis with Low Message Overhead.
J. Cryptol., 2015

On the Dynamics of Systems of Urns.
Discret. Math. Theor. Comput. Sci., 2015

Electing a Leader in Wireless Networks Quickly Despite Jamming.
Proceedings of the 27th ACM on Symposium on Parallelism in Algorithms and Architectures, 2015

Some Remarks and Ideas About Monetization of Sensitive Data.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
k-Selection Protocols from Energetic Complexity Perspective.
Int. J. Netw. Comput., 2014

A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
Ad Hoc Networks, 2014

Lightweight Protocol for Trusted Spontaneous Communication.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
On Flooding in the Presence of Random Faults.
Fundam. Informaticae, 2013

Countermeasures against sybil attacks in WSN based on proofs-of-work.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient and robust data aggregation using untrusted infrastructure.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Chameleon RFID and Tracking Prevention.
Proceedings of the Radio Frequency Identification System Security, 2013

Energy-Efficient Leader Election Protocols for Single-Hop Radio Networks.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

On Delta-Method of Moments and Probabilistic Sums.
Proceedings of the 10th Meeting on Analytic Algorithmics and Combinatorics, 2013

2012
Energy efficient alert in single-hop networks of extremely weak devices.
Theor. Comput. Sci., 2012

Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures.
Proceedings of the SECRYPT 2012, 2012

Hidden Bits Approach for Authentication in RFID Systems.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012

On λ-Alert Problem.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium, 2012

Obfuscated Counting in Single-Hop Radio Network.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Immune Size Approximation Algorithms in Ad Hoc Radio Network.
Proceedings of the Wireless Sensor Networks - 9th European Conference, 2012

2011
Security problems of systems of extremely weak devices.
Ann. UMCS Informatica, 2011

Self-keying Identification Mechanism for Small Devices.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

How to Transmit Messages via WSN in a Hostile Environment.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach.
KSII Trans. Internet Inf. Syst., 2010

Dynamic Sharing of a Multiple Access Channel.
Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, 2010

Event Extent Estimation.
Proceedings of the Structural Information and Communication Complexity, 2010

SkewCCC+: A Heterogeneous Distributed Hash Table.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

Practical Universal Random Sampling.
Proceedings of the Advances in Information and Computer Security, 2010

Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Security Challenges for Wireless Sensor Networks.
ERCIM News, 2009

Step-out group signatures.
Computing, 2009

RFID System with Allowers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Attacking and Repairing the Improved ModOnions Protocol.
Proceedings of the Information, Security and Cryptology, 2009

Data Deletion with Time-Aware Adversary Model.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Towards Fair Leader Election in Wireless Networks.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
Data Deletion with Provable Security.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Proofs of Communication and Its Application for Fighting Spam.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Practical Deniable Encryption.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Privacy Protection for RFID with Hidden Subset Identifiers.
Proceedings of the Pervasive Computing, 2008

Step-Out Ring Signatures.
Proceedings of the Mathematical Foundations of Computer Science 2008, 2008

Repelling Detour Attack Against Onions with Re-encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

Distributed Verification of Mixing - Local Forking Proofs Model.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Forward-secure Key Evolution in Wireless Sensor Networks.
IACR Cryptol. ePrint Arch., 2007

Privacy Protection in Dynamic Systems Based on RFID Tags.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Random Subsets of the Interval and P2P Protocols.
Proceedings of the Approximation, 2007

2006
How to Protect a Signature from Being Shown to a Third Party.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Extended Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Kleptographic Attacks on E-Voting Schemes.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Conditional Digital Signatures.
Proceedings of the Trust, 2005

Anonymous Communication with On-line and Off-line Onion Encoding.
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005

Hiding Data Sources in P2P Networks.
Proceedings of the Applied Public Key Infrastructure, 2005

A Practical Voting Scheme with Receipts.
Proceedings of the Information Security, 8th International Conference, 2005

Provable Anonymity for Networks of Mixes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Local View Attack on Anonymous Communication.
Proceedings of the Computer Security, 2005

2004
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps!
Proceedings of the Information Security, 7th International Conference, 2004

Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols.
Proceedings of the Communications and Multimedia Security, 2004

2003
Rapid Mixing and Security of Chaum's Visual Electronic Voting.
Proceedings of the Computer Security, 2003


  Loading...