Sabina Szymoniak

Orcid: 0000-0003-1148-5691

According to our database1, Sabina Szymoniak authored at least 21 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey.
ACM Comput. Surv., June, 2024

An IoT System for Air Pollution Monitoring with Safe Data Transmission.
Sensors, January, 2024

2023
Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

Air Pollution Monitoring and Information Distribution System.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

Safe data transmission in IoT system for air pollution monitoring.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories.
Log. J. IGPL, 2022

User Authentication Protocol Based on the Location Factor for a Mobile Environment.
IEEE Access, 2022

2021
SAT and SMT-Based Verification of Security Protocols Including Time Aspects.
Sensors, 2021

Amelia - A new security protocol for protection against false links.
Comput. Commun., 2021

Time Influence on Security Protocol.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

2020
Towards Most Efficient Method for Untimed Security Protocols Verification.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

VerSecTis - An Agent based Model Checker for Security Protocols.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Efficient Verification of Security Protocols Time Properties Using SMT Solvers.
Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), 2019

A Fast Method for Security Protocols Verification.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2018
On Some Time Aspects in Security Protocols Analysis.
Proceedings of the Computer Networks - 25th International Conference, 2018

The Impact of Time Parameters on the Security Protocols Correctness.
Proceedings of the Computer Networks - 25th International Conference, 2018

KaoChow Protocol Timed Analysis.
Proceedings of the Advances in Soft and Hard Computing, 2018

2016
Timed Analysis of Security Protocols.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

2014
ProToc - An Universal Language for Security Protocols Specifications.
Proceedings of the Soft Computing in Computer and Information Science, 2014

2013
Parallel Bounded Model Checking of Security Protocols.
Proceedings of the Parallel Processing and Applied Mathematics, 2013


  Loading...