Biblio

Export 61 results:
Sort by: Author [ Title  (Desc)] Type Year
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
S
Book Chapter, Wilusz, D., and A. Wójtowicz, Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services , in: HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science, vol. 12788, ed. Moallem, A. , Springer, 2021, pp. 103-119, ISBN 978-3-030-77391-5, DOI https://doi.org/10.1007/978-3-030-77392-2_8, PM: 20.
Journal Article, Wójtowicz, A., R. Wojciechowski, D. Rumiński, and K. Walczak, Securing Ubiquitous AR Services , in: Multimedia Tools and Applications, vol. 77, issue 20 , Springer, 2018, pp. 26881–26899, DOI 10.1007/s11042-018-5892-x, IF: 1.541, PM: 30. Abstract
Book Chapter, Wójtowicz, A., J. Flotyński, D. Rumiński, and K. Walczak, Securing Learning Services Accessible with Adaptable User Interfaces , in: Information Systems Architecture and Technology, vol. Service Oriented Networked Systems, ed. Grzech, A., L. Borzemski, J. Świątek, and Z. Wilimowska , Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław, 2011, pp. 109-118, ISBN 978-83-7493-625-5, PM: 5.  Download: ISAT_Best_Paper_Award.jpg (1.75 MB)
Book Chapter, Wilusz, D., and A. Wójtowicz, Securing Cryptoasset Insurance Services with Multisignatures , in: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), Advances in Intelligent Systems and Computing, vol. 1267, ed. Herrero, Á., C. Cambra, D. Urda, J. Sedano, H. Quintián, and E. Corchado , Springer, Cham, 2021, pp. 35-44, ISBN 978-3-030-57804-6, DOI 10.1007/978-3-030-57805-3_4, PM: 70.
Book Chapter, Wójtowicz, A., Secure User-Contributed 3D Virtual Environments , in: Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation, ed. Cellary, W., and K. Walczak , Springer, London, Dordrecht, Heidelberg, New York, 2012, pp. 171-193, ISBN 978-1-4471-2496-2, DOI 10.1007/978-1-4471-2497-9_7, PM: 5.
Journal Article, Wilusz, D., and A. Wójtowicz, Secure protocols for smart contract based insurance services , in: Expert Systems, vol. 39, issue 9 , Wiley, 2022, DOI https://doi.org/10.1111/exsy.12950, IF: 2.812, PM: 70.
Conference Paper, Wiza, W., Search Engines for the Web - the State of the Art , Seminar on Research of Contemporary Economic, Lubniewice, Poland, 05/2001, pp. 333-343.
Conference Paper, Cellary, W., Scheduling Dependent Tasks from an Infinite Stream to Reduce Mean Weighted Flow Time in Systems with Nonpreemptible Resources , in: M.Pelegrin, J. Delmas (eds.), Comparison of Automatic Control and Operational Research Techniques Applied to Large Systems Analysis and Control, Pergamon Press, Oxford, 01/1979, pp. 521-535.
Conference Paper, Cellary, W., Scheduling Dependent Tasks from an Infinite Stream in Systems with Nonpreemptible Resources , in: G. Bracchi, P.C. Lockemann (eds.), Information Systems Methodology, Lecture Notes in Computer Science 65, Springer Verlag, Berlin, Heildelberg, New York, 01/1978, pp. 529-535.
Book Chapter, Strykowski, S., Scenarios for Virtual Management Games , in: Perspectives on Computer Gaming in Higher Education, ed. Wach-Kąkolewicz, A., and R. Muffoletto , Bogucki Wydawnictwo Naukowe, 2016, pp. 125-137, ISBN 978-83-7986-116-3, PM: 5.