default search action
Zbigniew Kotulski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Krzysztof Bocianiak, Tomasz Pawlikowski, Aleksandra Podlasek, Jean-Philippe Wary:
Keeping Verticals' Sovereignty During Application Migration in Continuum. J. Netw. Syst. Manag. 32(4): 67 (2024) - 2023
- [j30]Wojciech Niewolski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Zbigniew Kotulski:
Security architecture for authorized anonymous communication in 5G MEC. J. Netw. Comput. Appl. 218: 103713 (2023) - 2022
- [c31]Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Tomasz Wojciech Nowak:
Low-complexity access control scheme for MEC-based services. FedCSIS 2022: 673-681 - 2021
- [j29]Tomasz Wojciech Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Wojciech Niewolski, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
Verticals in 5G MEC-Use Cases and Security Challenges. IEEE Access 9: 87251-87298 (2021) - 2020
- [j28]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia:
5G networks: Types of isolation and their parameters in RAN and CN slices. Comput. Networks 171: 107135 (2020) - [j27]Fahad Nife, Zbigniew Kotulski:
Application-Aware Firewall Mechanism for Software Defined Networks. J. Netw. Syst. Manag. 28(3): 605-626 (2020) - [c30]Zbigniew Kotulski, Wojciech Niewolski, Tomasz Wojciech Nowak, Mariusz Sepczuk:
New Security Architecture of Access Control in 5G MEC. SSCC 2020: 77-91
2010 – 2019
- 2018
- [j26]Mariusz Sepczuk, Zbigniew Kotulski:
A new risk-based authentication management model oriented on user's experience. Comput. Secur. 73: 17-33 (2018) - [j25]Krzysztof Cabaj, Dulce Domingos, Zbigniew Kotulski, Ana Respício:
Cybersecurity education: Evolution of the discipline and analysis of master programs. Comput. Secur. 75: 24-35 (2018) - [j24]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP J. Inf. Secur. 2018: 2 (2018) - [j23]Albert Sitek, Zbigniew Kotulski:
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions. EURASIP J. Inf. Secur. 2018: 5 (2018) - [j22]Krzysztof Cabaj, Zbigniew Kotulski, Bogdan Ksiezopolski, Wojciech Mazurczyk:
Cybersecurity: trends, issues, and challenges. EURASIP J. Inf. Secur. 2018: 10 (2018) - [c29]Albert Sitek, Zbigniew Kotulski:
On a New Intangible Reward for Card-Linked Loyalty Programs. ACS 2018: 332-345 - [c28]Fahad Nife, Zbigniew Kotulski:
New SDN-Oriented Authentication and Access Control Mechanism. CN 2018: 74-88 - [c27]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia:
Graph-based quantitative description of networks' slices isolation. FedCSIS 2018: 369-379 - 2017
- [c26]Fahad Nife, Zbigniew Kotulski:
Multi-level Stateful Firewall Mechanism for Software Defined Networks. CN 2017: 271-286 - [c25]Zbigniew Kotulski, Tomasz Wojciech Nowak, Mariusz Sepczuk, Marcin Alan Tunia, Rafal Artych, Krzysztof Bocianiak, Tomasz Osko, Jean-Philippe Wary:
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges. FedCSIS 2017: 783-792 - [c24]Jialiang Peng, Ahmed A. Abd El-Latif, Akram Belazi, Zbigniew Kotulski:
Efficient chaotic nonlinear component for secure cryptosystems. ICUFN 2017: 989-993 - [c23]Albert Sitek, Zbigniew Kotulski:
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. MMM-ACNS 2017: 158-170 - 2016
- [c22]Omar Reyad, Zbigniew Kotulski:
Pseudo-random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2. FedCSIS 2016: 991-998 - [c21]Mariusz Sepczuk, Zbigniew Kotulski:
A new authentication management model oriented on user's experience. FedCSIS 2016: 1021-1030 - 2015
- [j21]Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski:
The Robust Measurement Method for Security Metrics Generation. Comput. J. 58(10): 2280-2296 (2015) - [c20]Omar Reyad, Zbigniew Kotulski:
Image Encryption Using Koblitz's Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator. MCSS 2015: 34-45 - 2014
- [j20]Zbigniew Kotulski, Mariusz Sepczuk, Albert Sitek, Marcin Alan Tunia:
Adaptable Context Management Framework for Secure Network Services. Ann. UMCS Informatica 14(2): 7-29 (2014) - [c19]Omar Reyad, Zbigniew Kotulski:
Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators. CSS 2014: 38-48 - [c18]Grzegorz Orynczak, Zbigniew Kotulski:
Context-Aware Secure Routing Protocol for Real-Time Services. CSS 2014: 193-207 - [c17]Grzegorz Orynczak, Zbigniew Kotulski:
On a mechanism of detection of coalitions for reputation systems in P2P networks. SPECTS 2014: 578-584 - [e1]Zbigniew Kotulski, Bogdan Ksiezopolski, Katarzyna Mazur:
Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings. Communications in Computer and Information Science 448, Springer 2014, ISBN 978-3-662-44892-2 [contents] - 2013
- [j19]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
Theory and implementation of a virtualisation level Future Internet defence in depth architecture. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 274-299 (2013) - 2012
- [j18]Pawel Szalachowski, Zbigniew Kotulski:
One-Time Broadcast Encryption Schemes in Distributed Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j17]Tomasz Ciszkowski, Wojciech Mazurczyk, Zbigniew Kotulski, Tobias Hoßfeld, Markus Fiedler, Denis Collange:
Towards Quality of Experience-based reputation models for future web service provisioning. Telecommun. Syst. 51(4): 283-295 (2012) - [j16]Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer:
Energy-aware Key Management in Mobile Wireless Sensor Networks. Ann. UMCS Informatica 12(4): 83-96 (2012) - [j15]Grzegorz Orynczak, Zbigniew Kotulski:
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures. Ann. UMCS Informatica 12(4): 97-112 (2012) - [c16]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. SNDS 2012: 283-292 - [c15]Pawel Szalachowski, Zbigniew Kotulski:
Enhancing the Oakley key agreement protocol with secure time information. SPECTS 2012: 1-8 - 2011
- [j14]Pawel Szalachowski, Zbigniew Kotulski:
Secure time information in the internet key exchange protocol. Ann. UMCS Informatica 11(3): 41-56 (2011) - [j13]Grzegorz Orynczak, Zbigniew Kotulski:
Non - cryptographic methods for improving real time transmission security and integrity. Ann. UMCS Informatica 11(3): 71-86 (2011) - [j12]Lukasz Kucharzewski, Zbigniew Kotulski:
Mobile identity management system in heterogeneous wireless networks. Ann. UMCS Informatica 11(3): 141-152 (2011) - [j11]Grzegorz Orynczak, Zbigniew Kotulski:
Agent based infrastructure for real-time applications. Ann. UMCS Informatica 11(4): 33-47 (2011) - [c14]Pawel Szalachowski, Zbigniew Kotulski, Bogdan Ksiezopolski:
Secure Position-Based Selecting Scheme for WSN Communication. CN 2011: 386-397 - 2010
- [j10]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett. 110(7): 247-251 (2010) - [j9]Przemyslaw Kukielka, Zbigniew Kotulski:
Analysis of neural networks usage for detection of a new attack in IDS. Ann. UMCS Informatica 10(1): 51-59 (2010) - [j8]Bogdan Ksiezopolski, Zbigniew Kotulski:
Middleware non-repudiation service for the data warehouse. Ann. UMCS Informatica 10(1): 131-144 (2010) - [c13]Bogdan Ksiezopolski, Pawel Szalachowski, Zbigniew Kotulski:
SPOT: Optimization Tool for Network Adaptable Security. CN 2010: 269-279 - [c12]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks. CN 2010: 280-289 - [i15]Przemyslaw Kukielka, Zbigniew Kotulski:
Adaptation of the neural network-based IDS to new attacks detection. CoRR abs/1009.2406 (2010)
2000 – 2009
- 2009
- [j7]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
Optimization of TLS security protocol using the adaptable security model. Ann. UMCS Informatica 9(1): 59-75 (2009) - [c11]Bogdan Ksiezopolski, Zbigniew Kotulski, Pawel Szalachowski:
Adaptive Approach to Network Security. CN 2009: 233-241 - 2008
- [j6]Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk:
SecMon: end-to-end quality and security monitoring system. Ann. UMCS Informatica 8(1): 185-201 (2008) - [c10]Przemyslaw Kukielka, Zbigniew Kotulski:
Analysis of different architectures of neural networks for application in Intrusion Detection Systems. IMCSIT 2008: 807-811 - [i14]Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk:
SecMon: End-to-End Quality and Security Monitoring System. CoRR abs/0804.0134 (2008) - 2007
- [j5]Bogdan Ksiezopolski, Zbigniew Kotulski:
Adaptable security mechanism for dynamic environments. Comput. Secur. 26(3): 246-255 (2007) - [j4]Aneta Zwierko, Zbigniew Kotulski:
Integrity of mobile agents: a new approach. Int. J. Netw. Secur. 4(2): 201-211 (2007) - [p2]Piotr Kotlarz, Zbigniew Kotulski:
Neural Network as a Programmable Block Cipher. Advances in Information Processing and Protection 2007: 241-250 - [p1]Wojciech Mazurczyk, Zbigniew Kotulski:
Covert Channel for Improving VoIP Security. Advances in Information Processing and Protection 2007: 271-280 - 2006
- [j3]Wojciech Mazurczyk, Zbigniew Kotulski:
New security and control protocol for VoIP based on steganography and digital watermarking. Ann. UMCS Informatica 5(1): 417-426 (2006) - [c9]Wojciech Mazurczyk, Zbigniew Kotulski:
New VoIP Traffic Security Scheme with Digital Watermarking. SAFECOMP 2006: 170-181 - [c8]Aneta Zwierko, Zbigniew Kotulski:
A Light-Weight e-Voting System with Distributed Trust. VODCA@FOSAD 2006: 109-126 - [i13]Wojciech Mazurczyk, Zbigniew Kotulski:
New security and control protocol for VoIP based on steganography and digital watermarking. CoRR abs/cs/0602042 (2006) - [i12]Tomasz Ciszkowski, Zbigniew Kotulski:
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks. CoRR abs/cs/0609016 (2006) - [i11]Wojciech Mazurczyk, Zbigniew Kotulski:
Lightweight security mechanism for PSTN-VoIP cooperation. CoRR abs/cs/0612054 (2006) - 2005
- [c7]Bogdan Ksiezopolski, Zbigniew Kotulski:
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules. ADBIS Research Communications 2005 - [c6]Piotr Kotlarz, Zbigniew Kotulski:
On Application of Neural Networks for S-Boxes Design. AWIC 2005: 243-248 - [c5]Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski:
Authentication with controlled anonymity in P2P systems. PDCAT 2005: 871-875 - [i10]Wojciech Mazurczyk, Zbigniew Kotulski:
Alternative security architecture for IP Telephony based on digital watermarking. CoRR abs/cs/0506076 (2005) - [i9]Aneta Zwierko, Zbigniew Kotulski:
Security of mobile agents: a new concept of the integrity protection. CoRR abs/cs/0506103 (2005) - [i8]Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski:
A new authentication protocol for revocable anonymity in ad-hoc networks. CoRR abs/cs/0510065 (2005) - 2004
- [j2]Bogdan Ksiezopolski, Zbigniew Kotulski:
Cryptographic protocol for electronic auctions with extended requirements. Ann. UMCS Informatica 2(1): 391-400 (2004) - [c4]Aneta Zwierko, Zbigniew Kotulski:
Mobile Agents: Preserving Privacy and Anonymity. IMTCI 2004: 246-258 - [c3]Kamil Kulesza, Zbigniew Kotulski, Konrad Kulesza:
On Mobile Agents Resistance to Traffic Analysis. VODCA@FOSAD 2004: 181-193 - 2003
- [c2]Kamil Kulesza, Zbigniew Kotulski:
Addressing New Challenges by Building Security Protocols Around Graphs. Security Protocols Workshop 2003: 301-306 - [i7]Kamil Kulesza, Zbigniew Kotulski:
On secret sharing for graphs. CoRR cs.CR/0310052 (2003) - [i6]Kamil Kulesza, Zbigniew Kotulski:
Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography. CoRR cs.CR/0310053 (2003) - [i5]Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk:
On alternative approach for verifiable secret sharing. IACR Cryptol. ePrint Arch. 2003: 35 (2003) - 2002
- [i4]Kamil Kulesza, Zbigniew Kotulski:
On the graph coloring check-digit scheme with applications to verifiable secret sharing. CoRR cs.CR/0208007 (2002) - [i3]Kamil Kulesza, Zbigniew Kotulski, Josef Pieprzyk:
On alternative approach for verifiable secret sharing. CoRR math.CO/0211267 (2002) - [i2]Kamil Kulesza, Zbigniew Kotulski:
On ASGS framework: general requirements and an example of implementation. CoRR math.CO/0211269 (2002) - [i1]Kamil Kulesza, Zbigniew Kotulski:
On graph coloring check-digit method. CoRR math.CO/0211317 (2002) - 2001
- [j1]Janusz Szczepanski, Zbigniew Kotulski:
Pseudorandom Number Generators Based on Chaotic Dynamical Systems. Open Syst. Inf. Dyn. 8(2): 137-146 (2001) - [c1]Anna Górska, Karol Górski, Zbigniew Kotulski, Andrzej Paszkiewicz, Janusz Szczepanski:
New Experimental Results in Differential - Linear Cryptanalysis of Reduced Variants of DES. ACS 2001: 335-348
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint