Zbigniew Kotulski

Orcid: 0000-0002-1149-7863

According to our database1, Zbigniew Kotulski authored at least 75 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security architecture for authorized anonymous communication in 5G MEC.
J. Netw. Comput. Appl., September, 2023

2022
Low-complexity access control scheme for MEC-based services.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

2021
Verticals in 5G MEC-Use Cases and Security Challenges.
IEEE Access, 2021

2020
Application-Aware Firewall Mechanism for Software Defined Networks.
J. Netw. Syst. Manag., 2020

5G networks: Types of isolation and their parameters in RAN and CN slices.
Comput. Networks, 2020

New Security Architecture of Access Control in 5G MEC.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

2018
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions.
EURASIP J. Inf. Secur., 2018

Towards constructive approach to end-to-end slice isolation in 5G networks.
EURASIP J. Inf. Secur., 2018

Cybersecurity: trends, issues, and challenges.
EURASIP J. Inf. Secur., 2018

A new risk-based authentication management model oriented on user's experience.
Comput. Secur., 2018

Cybersecurity education: Evolution of the discipline and analysis of master programs.
Comput. Secur., 2018

Graph-based quantitative description of networks' slices isolation.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

New SDN-Oriented Authentication and Access Control Mechanism.
Proceedings of the Computer Networks - 25th International Conference, 2018

On a New Intangible Reward for Card-Linked Loyalty Programs.
Proceedings of the Advances in Soft and Hard Computing, 2018

2017
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions.
Proceedings of the Computer Network Security, 2017

Efficient chaotic nonlinear component for secure cryptosystems.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

On end-to-end approach for slice isolation in 5G networks. Fundamental challenges.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Multi-level Stateful Firewall Mechanism for Software Defined Networks.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
A new authentication management model oriented on user's experience.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

Pseudo-random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
The Robust Measurement Method for Security Metrics Generation.
Comput. J., 2015

Image Encryption Using Koblitz's Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator.
Proceedings of the Multimedia Communications, Services and Security, 2015

2014
Adaptable Context Management Framework for Secure Network Services.
Ann. UMCS Informatica, 2014

On a mechanism of detection of coalitions for reputation systems in P2P networks.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2014

Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Context-Aware Secure Routing Protocol for Real-Time Services.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

2013
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013

2012
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures.
Ann. UMCS Informatica, 2012

Energy-aware Key Management in Mobile Wireless Sensor Networks.
Ann. UMCS Informatica, 2012

Towards Quality of Experience-based reputation models for future web service provisioning.
Telecommun. Syst., 2012

One-Time Broadcast Encryption Schemes in Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Enhancing the Oakley key agreement protocol with secure time information.
Proceedings of the International Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2012

A Virtualization-Level Future Internet Defense-in-Depth Architecture.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
Secure time information in the internet key exchange protocol.
Ann. UMCS Informatica, 2011

Agent based infrastructure for real-time applications.
Ann. UMCS Informatica, 2011

Non - cryptographic methods for improving real time transmission security and integrity.
Ann. UMCS Informatica, 2011

Mobile identity management system in heterogeneous wireless networks.
Ann. UMCS Informatica, 2011

Secure Position-Based Selecting Scheme for WSN Communication.
Proceedings of the Computer Networks - 18th Conference, 2011

2010
Analysis of neural networks usage for detection of a new attack in IDS.
Ann. UMCS Informatica, 2010

Middleware non-repudiation service for the data warehouse.
Ann. UMCS Informatica, 2010

CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks.
Inf. Process. Lett., 2010

Adaptation of the neural network-based IDS to new attacks detection
CoRR, 2010

On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
Proceedings of the Computer Networks - 17th Conference, 2010

SPOT: Optimization Tool for Network Adaptable Security.
Proceedings of the Computer Networks - 17th Conference, 2010

2009
Optimization of TLS security protocol using the adaptable security model.
Ann. UMCS Informatica, 2009

Adaptive Approach to Network Security.
Proceedings of the Computer Networks - 16th Conference, 2009

2008
SecMon: end-to-end quality and security monitoring system.
Ann. UMCS Informatica, 2008

Analysis of different architectures of neural networks for application in Intrusion Detection Systems.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2007
Integrity of mobile agents: a new approach.
Int. J. Netw. Secur., 2007

Adaptable security mechanism for dynamic environments.
Comput. Secur., 2007

Covert Channel for Improving VoIP Security.
Proceedings of the Advances in Information Processing and Protection., 2007

Neural Network as a Programmable Block Cipher.
Proceedings of the Advances in Information Processing and Protection., 2007

2006
New security and control protocol for VoIP based on steganography and digital watermarking.
Ann. UMCS Informatica, 2006

A Light-Weight e-Voting System with Distributed Trust.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Lightweight security mechanism for PSTN-VoIP cooperation
CoRR, 2006

ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
CoRR, 2006

New VoIP Traffic Security Scheme with Digital Watermarking.
Proceedings of the Computer Safety, 2006

2005
A new authentication protocol for revocable anonymity in ad-hoc networks
CoRR, 2005

Security of mobile agents: a new concept of the integrity protection
CoRR, 2005

Alternative security architecture for IP Telephony based on digital watermarking
CoRR, 2005

Authentication with controlled anonymity in P2P systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

On Application of Neural Networks for S-Boxes Design.
Proceedings of the Advances in Web Intelligence Third International Atlantic Web IntelligenceConference, 2005

On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules.
Proceedings of the ADBIS 2005, 2005

2004
Cryptographic protocol for electronic auctions with extended requirements.
Ann. UMCS Informatica, 2004

On Mobile Agents Resistance to Traffic Analysis.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Mobile Agents: Preserving Privacy and Anonymity.
Proceedings of the Intelligent Media Technology for Communicative Intelligence, 2004

2003
On alternative approach for verifiable secret sharing.
IACR Cryptol. ePrint Arch., 2003

Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography
CoRR, 2003

On secret sharing for graphs
CoRR, 2003

Addressing New Challenges by Building Security Protocols Around Graphs.
Proceedings of the Security Protocols, 2003

2002
On graph coloring check-digit method
CoRR, 2002

On ASGS framework: general requirements and an example of implementation
CoRR, 2002

On the graph coloring check-digit scheme with applications to verifiable secret sharing
CoRR, 2002

2001
Pseudorandom Number Generators Based on Chaotic Dynamical Systems.
Open Syst. Inf. Dyn., 2001

New Experimental Results in Differential - Linear Cryptanalysis of Reduced Variants of DES.
Proceedings of the Advanced Computer Systems, Eighth International Conference, 2001


  Loading...