Przemyslaw Kubiak

Orcid: 0000-0002-1349-093X

Affiliations:
  • Wrocław University of Technology, Poland


According to our database1, Przemyslaw Kubiak authored at least 29 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Poster: eID in Europe - Password Authentication Revisited.
Proceedings of the IFIP Networking Conference, 2021

PACE with Mutual Authentication - Towards an Upgraded eID in Europe.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Preventing a Fork in a Blockchain - David Fighting Goliath.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Privacy and Security Analysis of PACE GM Protocol.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2015
Tracing Attacks on U-Prove with Revocation Mechanism.
IACR Cryptol. ePrint Arch., 2015

Anonymous Evaluation System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014

Stand-by Attacks on E-ID Password Authentication.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Attack against Ibrahim's Distributed Key Generation for RSA.
Int. J. Netw. Secur., 2013

Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees.
IACR Cryptol. ePrint Arch., 2013

Supervised Usage of Signature Creation Devices.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Restricted Identification without Group Keys.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Lightweight Certificates - Towards a Practical Model for PKI.
Proceedings of the Business Information Systems - 15th International Conference, 2012

2011
Restricted Identification Scheme and Diffie-Hellman Linking Problem.
Proceedings of the Trusted Systems - Third International Conference, 2011

Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems.
Proceedings of the Business Information Systems Workshops, 2011

2010
Polish Concepts for Securing E-Government Document Flow.
Proceedings of the ISSE 2010, 2010

Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress.
Proceedings of the Trusted Systems - Second International Conference, 2010

Digital Signatures for e-Government - A Long-Term Security Architecture.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework.
Proceedings of the Business Information Systems Workshops, 2010

How to Construct State Registries-Matching Undeniability with Public Security.
Proceedings of the Intelligent Information and Database Systems, 2010

2008
Practical Deniable Encryption.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

2007
Kleptographic attacks on a cascade of mix servers.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
How to Protect a Signature from Being Shown to a Third Party.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Kleptographic Attacks on E-Voting Schemes.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

A Revocation Scheme Preserving Privacy.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006


  Loading...