Miroslaw Kurkowski

Orcid: 0000-0003-0900-3243

According to our database1, Miroslaw Kurkowski authored at least 32 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.
Log. J. IGPL, 2022

User Authentication Protocol Based on the Location Factor for a Mobile Environment.
IEEE Access, 2022

2021
SAT and SMT-Based Verification of Security Protocols Including Time Aspects.
Sensors, 2021

SAT vs. Substitution Boxes of DES like Ciphers.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

SAT-Based Cryptanalysis of Salsa20 Cipher.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

2020
Towards Most Efficient Method for Untimed Security Protocols Verification.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

VerSecTis - An Agent based Model Checker for Security Protocols.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Multifactor Authentication Protocol in a Mobile Environment.
IEEE Access, 2019

SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Different Aggregation Modes Applications Within the Framework of Weights Uncertainty.
Proceedings of the Artificial Intelligence and Soft Computing, 2019

Efficient Verification of Security Protocols Time Properties Using SMT Solvers.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

A Fast Method for Security Protocols Verification.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2018
On Some Time Aspects in Security Protocols Analysis.
Proceedings of the Computer Networks - 25th International Conference, 2018

New Results in Direct SAT-Based Cryptanalysis of DES-Like Ciphers.
Proceedings of the Advances in Soft and Hard Computing, 2018

2016
Timed Analysis of Security Protocols.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

Some Remarks on Security Protocols Verification Tools.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
Verification of Mutual Authentication Protocol for MobInfoSec System.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2014
Using Facial Asymmetry Properties and Hidden Markov Models for Biometric Authentication in Security Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2014

Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

ProToc - An Universal Language for Security Protocols Specifications.
Proceedings of the Soft Computing in Computer and Information Science, 2014

2013
Parallel Bounded Model Checking of Security Protocols.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

Using Backward Induction Techniques in (Timed) Security Protocols Verification.
Proceedings of the Computer Information Systems and Industrial Management, 2013

Modern Cryptography Primer - Theoretical Foundations and Practical Applications.
Springer, ISBN: 978-3-642-41385-8, 2013

2012
Applying Timed Automata to Model Checking of Security Protocols.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

A New Effective Approach for Modelling and Verification of Security Protocols.
Proceedings of the 21th International Workshop on Concurrency, 2012

2011
Towards Parallel Direct SAT-Based Cryptanalysis.
Proceedings of the Parallel Processing and Applied Mathematics, 2011

2009
Timed Automata Based Model Checking of Timed Security Protocols.
Fundam. Informaticae, 2009

2007
Verifying Security Protocols Modelled by Networks of Automata.
Fundam. Informaticae, 2007

2006
A Quantifier-free First-order Knowledge Logic of Authentication.
Fundam. Informaticae, 2006

SAT-Based Verification of Security Protocols Via Translation to Networks of Automata.
Proceedings of the Model Checking and Artificial Intelligence, 4th Workshop, 2006

2001
A Complete Logic of Authentication.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001


  Loading...