Olga Siedlecka-Lamch

Orcid: 0000-0001-9820-6629

According to our database1, Olga Siedlecka-Lamch authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure Medical Data Storage with Blockchain Technology.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2022
User Authentication Protocol Based on the Location Factor for a Mobile Environment.
IEEE Access, 2022

2021
SAT and SMT-Based Verification of Security Protocols Including Time Aspects.
Sensors, 2021

2020
Towards Most Efficient Method for Untimed Security Protocols Verification.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

Probabilistic and Timed Analysis of Security Protocols.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

VerSecTis - An Agent based Model Checker for Security Protocols.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

A Fast Method for Security Protocols Verification.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2018
On Some Time Aspects in Security Protocols Analysis.
Proceedings of the Computer Networks - 25th International Conference, 2018

2016
Timed Analysis of Security Protocols.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

Some Remarks on Security Protocols Verification Tools.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
Verification of Mutual Authentication Protocol for MobInfoSec System.
Proceedings of the Computer Information Systems and Industrial Management, 2015

2013
Parallel Bounded Model Checking of Security Protocols.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

Using Backward Induction Techniques in (Timed) Security Protocols Verification.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Interval Probabilities of State Transitions in Probabilistic Automata.
Proceedings of the Artificial Intelligence and Soft Computing, 2012

A New Effective Approach for Modelling and Verification of Security Protocols.
Proceedings of the 21th International Workshop on Concurrency, 2012

2011
Parallel Quantum Algorithm for Finding the Consistency of Saaty's Matrices.
Proceedings of the Parallel Processing and Applied Mathematics, 2011


  Loading...