Biblio
Conference Paper, Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control – Computational Evaluation
, Computational Intelligence in Security for Information Systems (CISIS), Springer, 2014, pp. 423-432, ISBN 978-3-319-07994-3, DOI 10.1007/978-3-319-07995-0_42, PM: 15.
Book Chapter, Secure User-Contributed 3D Virtual Environments
, in: Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation
, Springer, London, Dordrecht, Heidelberg, New York, 2012, pp. 171-193, ISBN 978-1-4471-2496-2, DOI 10.1007/978-1-4471-2497-9_7, PM: 5.
Book Chapter, Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce
, in: HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science, vol. 12210
, Springer, Cham, 2020, pp. 271-284, ISBN 978-3-030-50308-6, DOI 10.1007/978-3-030-50309-3_19, PM: 20.
Book Chapter, Securing Learning Services Accessible with Adaptable User Interfaces
, in: Information Systems Architecture and Technology, vol. Service Oriented Networked Systems
, Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław, 2011, pp. 109-118, ISBN 978-83-7493-625-5, PM: 5.
Pobierz: ISAT_Best_Paper_Award.jpg (1.75 MB)
Conference Paper, Face-based Passive Customer Identification Combined with Multimodal Context-aware Payment Authorization: Evaluation at Point of Sale
, in: Proceedings of the 20th International Conference on Enterprise Information Systems
, ICEIS, SCITEPRESS, 2018, pp. 555-566, ISBN 978-989-758-298-1, DOI 10.5220/0006798105550566, PM: 5.
Book Chapter, Representing User Privileges in Object-Oriented Virtual Reality Systems
, in: Emerging Trends in Technological Innovation, vol. 314
, Springer, The first IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2010, Costa de Caparica, Portugal, February 22-24, 2010, 2010, pp. 52-61, ISBN 978-3-642-11627-8, DOI 10.1007/978-3-642-11628-5_6, PM: 15.
Journal Article, Technical Feasibility of Context-Aware Passive Payment Authorization for Physical Points of Sale
, in: Personal and Ubiquitous Computing, vol. 21, issue 6
, Springer London, 2017, pp. 1113–1125, DOI 10.1007/s00779-017-1035-z, IF: 1.924, PM: 30.
Abstract
Conference Paper, Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences
, in: Advances in Intelligent Systems and Computing
, Computational Intelligence in Security for Information Systems, Springer International Publishing, 2015, pp. 285-295, ISBN 978-3-319-19712-8, PM: 15.
Journal Article, Zarządzanie bezpieczeństwem zbiorowego podejmowania decyzji w jednostkach naukowych w okresie postpandemicznym
, in: Nauka, vol. 4
, Biuro Upowszechniania i Promocji Nauki PAN, 2021, pp. 105 - 115, DOI 10.24425/nauka.2021.137645, PM: 20.
Journal Article, Web w łeb. Bezpieczeństwo usług Web 2.0 w edukacji
, in: Uczyć lepiej, issue 4/2011-2012
, Ośrodek Doskonalenia Nauczycieli w Poznaniu, 2012, pp. 5-6.