Przemyslaw Blaskiewicz

According to our database1, Przemyslaw Blaskiewicz authored at least 14 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Aware Identity Management.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Pseudonymous Signature Schemes.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2016
Ghost Train for Anonymous Communication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits.
Proceedings of the Information Security Practice and Experience, 2016

2015
An Application of GPU Parallel Computing to Power Flow Calculation in HVDC Networks.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

2014
Lightweight Protocol for Trusted Spontaneous Communication.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Extreme Propagation in an Ad-Hoc Radio Network - Revisited.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

2011
Security and Trust in Sensor Networks.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011

Self-keying Identification Mechanism for Small Devices.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems.
Proceedings of the Business Information Systems Workshops, 2011

2010
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress.
Proceedings of the Trusted Systems - Second International Conference, 2010

Digital Signatures for e-Government - A Long-Term Security Architecture.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
RFID System with Allowers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009


  Loading...