Publikacje w dziedzinie cyberbezpieczeństwa i prywatności

  1. Wójtowicz, A., and J. Chmielewski, Payment Authorization in Smart Environments: Security-Convenience Balance , in: Enterprise Information Systems. Lecture Notes in Business Information Processing, vol. 363, ed. Hammoudi, S., M. Śmiałek, O. Camp, and J. Filipe , Springer, 2019, pp. 58-81, ISBN 978-3-030-26168-9, DOI 10.1007/978-3-030-26169-6_4.
  2. Wójtowicz, A., and J. Chmielewski, Face-based Passive Customer Identification Combined with Multimodal Context-aware Payment Authorization: Evaluation at Point of Sale , in: Proceedings of the 20th International Conference on Enterprise Information Systems , ICEIS, SCITEPRESS, 2018, pp. 555-566, ISBN 978-989-758-298-1, DOI 10.5220/0006798105550566.
  3. Wójtowicz, A., and W. Cellary, New Challenges for User Privacy in Cyberspace , in: Human Computer Interaction and Cyber-Security. Handbook, ed. Moallem, A. , CRC Press - Taylor and Francis, 2018, pp. 77-98, ISBN 9781138739161, PM: 5.
  4. Wójtowicz, A., R. Wojciechowski, D. Rumiński, and K. Walczak, Securing Ubiquitous AR Services , in: Multimedia Tools and Applications, vol. 77, issue 20 , Springer, 2018, pp. 26881–26899, DOI https://doi.org/10.1007/s11042-018-5892-x, IF: 1.530, PM: 30. 
  5. Wójtowicz, A., and D. Wilusz, Architecture for Adaptable Smart Spaces Oriented on User Privacy , in: Logic Journal of the IGPL, vol. 25, issue 1 , Oxford University Press, 2017, pp. 3-17, DOI 10.1093/jigpal/jzw039, IF: 0.575, PM: 30. 
  6. Wójtowicz, A., and J. Chmielewski, Technical Feasibility of Context-Aware Passive Payment Authorization for Physical Points of Sale , in: Personal and Ubiquitous Computing, vol. 21, issue 6 , Springer London, 2017, pp. 1113–1125, DOI 10.1007/s00779-017-1035-z, IF: 2.395, PM: 30. 
  7. Wójtowicz, A., and K. Joachimiak, Model for Adaptable Context-Based Biometric Authentication for Mobile Devices , in: Personal and Ubiquitous Computing, vol. 20, issue 2 , Springer, 2016, pp. 195-207, DOI 10.1007/s00779-016-0905-0, IF: 2.395, PM: 30. 
  8. Wójtowicz, A., and D. Wilusz, Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences , in: Advances in Intelligent Systems and Computing, ed. Herrero, Á., B. Baruque, J. Sedano, H. Quintián, and E. Corchado , Computational Intelligence in Security for Information Systems, Springer International Publishing, 2015, pp. 285-295, ISBN 978-3-319-19712-8, PM: 15.
  9. Wójtowicz, A., Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control – Computational Evaluation , ed. de la Puerta , Computational Intelligence in Security for Information Systems (CISIS), Springer, 2014, pp. 423-432, ISBN 978-3-319-07994-3, DOI 10.1007/978-3-319-07995-0_42, PM: 15.
  10. Wójtowicz, A., Security Model for Large Scale Content Distribution Applied to Federated Virtual Environments , in: Lecture Notes in Business Information Processing, ed. Franch, X., and P. Soffer , Conference on Advanced Information Systems Engineering Workshops: CAiSE 2013 International Workshops, Valencia (Spain), June 17 -21, 2013, Springer Verlag, Heidelberg, 2013, pp. 502--511, ISBN 978-3-642-38489-9, DOI 10.1007/978-3-642-38490-5_45, PM: 15.
  11. Wójtowicz, A., Secure User-Contributed 3D Virtual Environments , in: Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation, ed. Cellary, W., and K. Walczak , Springer, London, Dordrecht, Heidelberg, New York, 2012, pp. 171-193, ISBN 978-1-4471-2496-2, DOI 10.1007/978-1-4471-2497-9, PM: 5.
  12. Wójtowicz, A., Web w łeb. Bezpieczeństwo usług Web 2.0 w edukacji , in: Uczyć lepiej, issue 4/2011-2012 , Ośrodek Doskonalenia Nauczycieli w Poznaniu, 2012, pp. 5-6.
  13. Wójtowicz, A., and W. Cellary, Access Control Model for Dynamic VR Applications , in: Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management, ed. Rea, A. , IGI Global, 2011, pp. 284-305, ISBN 9781615208913 , PM: 5.
  14. Wójtowicz, A., J. Flotyński, D. Rumiński, and K. Walczak, Securing Learning Services Accessible with Adaptable User Interfaces , in: Information Systems Architecture and Technology, vol. Service Oriented Networked Systems, ed. Grzech, A., L. Borzemski, J. Świątek, and Z. Wilimowska , Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław, 2011, pp. 109-118, ISBN 978-83-7493-625-5, PM: 5.
  15. Wójtowicz, A., K. Walczak, W. Wiza, and D. Rumiński, Web Platform with Role-based Security for Decentralized Creation of Web 2.0 Learning Content , in: Proceedings of the 7th International Conference on Next Generation Web Services Practices (NWeSP), 19–21 October 2011, Salamanca, Spain , IEEE, 2011, pp. 523-529, ISBN 9781457711251, DOI 10.1109/nwesp.2011.6088234.
  16. Wójtowicz, A., and W. Cellary, Representing User Privileges in Object-Oriented Virtual Reality Systems , in: Emerging Trends in Technological Innovation, vol. 314, ed. Camarinha-Matos, L. M., P. Pereira, and L. Ribeiro , Springer, The first IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2010, Costa de Caparica, Portugal, February 22-24, 2010, 2010, pp. 52-61, ISBN 978-3-642-11627-8, DOI 10.1007/978-3-642-11628-5_6, PM: 10.