Biblio
Journal Article, Securing Ubiquitous AR Services
, in: Multimedia Tools and Applications, vol. 77, issue 20
, Springer, 2018, pp. 26881–26899, DOI 10.1007/s11042-018-5892-x, IF: 1.541, PM: 30.
Abstract
Book Chapter, New Challenges for User Privacy in Cyberspace
, in: Human Computer Interaction and Cybersecurity. Handbook
, CRC Press - Taylor and Francis, Boca Raton, USA, 2019, pp. 77-98, ISBN 9781138739161, PM: 20.
Book Chapter, Payment Authorization in Smart Environments: Security-Convenience Balance
, in: Enterprise Information Systems. Lecture Notes in Business Information Processing, vol. 363
, Springer, 2019, pp. 58-81, ISBN 978-3-030-26168-9, DOI 10.1007/978-3-030-26169-6_4, PM: 20.
Book Chapter, Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce
, in: HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science, vol. 12210
, Springer, Cham, 2020, pp. 271-284, ISBN 978-3-030-50308-6, DOI 10.1007/978-3-030-50309-3_19, PM: 20.
Book Chapter, Multiparty Computation in Practice: Increasing Security of Documents in Enterprise Content Management Systems
, in: ICSEB 2020: 2020 The 4th International Conference on Software and e-Business
, Association for Computing Machinery (ACM), New York, NY, USA, 2020, pp. 1–6, ISBN 9781450388849, DOI 10.1145/3446569.3446586, PM: 20.
Abstract
Book Chapter, Securing Cryptoasset Insurance Services with Multisignatures
, in: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), Advances in Intelligent Systems and Computing, vol. 1267
, Springer, Cham, 2021, pp. 35-44, ISBN 978-3-030-57804-6, DOI 10.1007/978-3-030-57805-3_4, PM: 70.
Book Chapter, Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services
, in: HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science, vol. 12788
, Springer, 2021, pp. 103-119, ISBN 978-3-030-77391-5, DOI https://doi.org/10.1007/978-3-030-77392-2_8, PM: 20.
Journal Article, Zarządzanie bezpieczeństwem zbiorowego podejmowania decyzji w jednostkach naukowych w okresie postpandemicznym
, in: Nauka, vol. 4
, Biuro Upowszechniania i Promocji Nauki PAN, 2021, pp. 105 - 115, DOI 10.24425/nauka.2021.137645, PM: 20.
Journal Article, Secure protocols for smart contract based insurance services
, in: Expert Systems, vol. 39, issue 9
, Wiley, 2022, DOI https://doi.org/10.1111/exsy.12950, IF: 2.812, PM: 70.
Book Chapter, Long Tail of Security Vulnerabilities and Nation State APT Actors.
, in: Challenges and Reality of the IT-space: Software Engineering and Cybersecurity. International Conference SECS-2022, October 25-26th, 2022, Proceedings Book
, Institute of Bioorganic Chemistry, Polish Academy of Sciences, Scientific Publishers OWN, Poznań, 2023, pp. 3-15, ISBN 978-83-7712-049-1, PM: 20.
Abstract
Pobierz: SECS_2022_Long_tail_manuscript.pdf (802.95 KB)
Book, Challenges and Reality of the IT-space: Software Engineering and Cybersecurity.
, in: International Conference SECS-2022, October 25-26th, 2022, Proceedings Book
, Institute of Bioorganic Chemistry, Polish Academy of Sciences, Scientific Publishers OWN, Poznań, 03/2023, pp. 132, ISBN 978-83-7712-049-1, PM: 20.