Tomasz Hyla

Orcid: 0000-0003-2115-5338

According to our database1, Tomasz Hyla authored at least 24 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Revocable Signature Scheme with Implicit and Explicit Certificates.
Entropy, September, 2023

Source code protection against unauthorised copying and analysis in IoT devices.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2021
Identification of Vessels on Inland Waters Using Low-Quality Video Streams.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Anonymous Group Signature Scheme with Publicly Verifiable General Access Structure.
Proceedings of the Computer Information Systems and Industrial Management, 2021

2020
Long-term verification of signatures based on a blockchain.
Comput. Electr. Eng., 2020

Measuring Cyber Security Awareness within Groups of Medical Professionals in Poland.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Vessel Detection and Tracking Method Based on Video Surveillance.
Sensors, 2019

eHealth Integrity Model Based on Permissioned Blockchain.
Future Internet, 2019

Mobile River Navigation for Smart Cities.
Proceedings of the Information and Software Technologies - 25th International Conference, 2019

Ships Detection on Inland Waters Using Video Surveillance System.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2018
Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack.
IEEE Access, 2018

2017
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates.
Comput. J., 2017

A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack.
Proceedings of the Computer Information Systems and Industrial Management, 2017

2016
Secure Outsourced Bilinear Pairings Computation for Mobile Devices.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy.
Proceedings of the Computer Information Systems and Industrial Management, 2016

Non-standard Certification Models for Pairing Based Cryptography.
Proceedings of the Hard and Soft Computing for Artificial Intelligence, 2016

2014
Managing Depth Information Uncertainty in Inland Mobile Navigation Systems.
Proceedings of the Rough Sets and Intelligent Systems Paradigms, 2014

Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Implicit and Explicit Certificates-Based Encryption Scheme.
Proceedings of the Computer Information Systems and Industrial Management, 2014

Protection Profile for Secure Sensitive Information System on Mobile Devices.
Proceedings of the Computer Information Systems and Industrial Management, 2014

Model of Collaborative Data Exchange for Inland Mobile Navigation.
Proceedings of the Soft Computing in Computer and Information Science, 2014

2013
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture.
Proceedings of the Computer Information Systems and Industrial Management, 2013

2012
Long-term preservation of digital signatures for multiple groups of related documents.
IET Inf. Secur., 2012

Certificate-Based Encryption Scheme with General Access Structure.
Proceedings of the Computer Information Systems and Industrial Management, 2012


  Loading...