BibTeX records: Miroslaw Kutylowski

download as .bib file

@article{DBLP:journals/csi/KutylowskiB23,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Blaskiewicz},
  title        = {Advanced Electronic Signatures and eIDAS - Analysis of the Concept},
  journal      = {Comput. Stand. Interfaces},
  volume       = {83},
  pages        = {103644},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103644},
  doi          = {10.1016/J.CSI.2022.103644},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KutylowskiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of
                  Anamorphic Cryptography},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {170--183},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0104},
  doi          = {10.56553/POPETS-2023-0104},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TianWKSHC23,
  author       = {Guohua Tian and
                  Jianghong Wei and
                  Miroslaw Kutylowski and
                  Willy Susilo and
                  Xinyi Huang and
                  Xiaofeng Chen},
  title        = {{VRBC:} {A} Verifiable Redactable Blockchain With Efficient Query
                  and Integrity Auditing},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {7},
  pages        = {1928--1942},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3230900},
  doi          = {10.1109/TC.2022.3230900},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TianWKSHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {759--790},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_25},
  doi          = {10.1007/978-3-031-38545-2\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/BojkoCK23,
  author       = {Dominik Bojko and
                  Jacek Cichon and
                  Miroslaw Kutylowski},
  title        = {Sliding Window Sampling over Data Stream - a Solution Based on Devil's
                  Staircases},
  booktitle    = {10th {IEEE} International Conference on Data Science and Advanced
                  Analytics, {DSAA} 2023, Thessaloniki, Greece, October 9-13, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSAA60987.2023.10302599},
  doi          = {10.1109/DSAA60987.2023.10302599},
  timestamp    = {Thu, 16 Nov 2023 09:03:43 +0100},
  biburl       = {https://dblp.org/rec/conf/dsaa/BojkoCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/BlaskiewiczK22,
  author       = {Przemyslaw Blaskiewicz and
                  Miroslaw Kutylowski},
  editor       = {Ngoc Thanh Nguyen and
                  Tien Khoa Tran and
                  Ualsher Tukeyev and
                  Tzung{-}Pei Hong and
                  Bogdan Trawinski and
                  Edward Szczerbicki},
  title        = {Chaining Electronic Seals - An eIDAS Compliant Framework for Controlling
                  {SSCD}},
  booktitle    = {Intelligent Information and Database Systems - 14th Asian Conference,
                  {ACIIDS} 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13758},
  pages        = {714--732},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21967-2\_57},
  doi          = {10.1007/978-3-031-21967-2\_57},
  timestamp    = {Thu, 16 Mar 2023 20:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/BlaskiewiczK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialsec/2022,
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3},
  doi          = {10.1007/978-981-19-7242-3},
  isbn         = {978-981-19-7241-6},
  timestamp    = {Mon, 17 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KrzywieckiKRD21,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Rafal Rothenberger and
                  Bartosz Drzazga},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Hierarchical Ring Signatures Immune to Randomness Injection Attacks},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_13},
  doi          = {10.1007/978-3-030-78086-9\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/KrzywieckiKRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KozielKK21,
  author       = {Patryk Koziel and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {{PACE} with Mutual Authentication - Towards an Upgraded eID in Europe},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {501--519},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_25},
  doi          = {10.1007/978-3-030-88428-4\_25},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KozielKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KutylowskiKKC21,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Kubiak and
                  Patryk Koziel and
                  Yanmei Cao},
  editor       = {Zheng Yan and
                  Gareth Tyson and
                  Dimitrios Koutsonikolas},
  title        = {Poster: eID in Europe - Password Authentication Revisited},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2021, Espoo and Helsinki,
                  Finland, June 21-24, 2021},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/IFIPNetworking52078.2021.9472856},
  doi          = {10.23919/IFIPNETWORKING52078.2021.9472856},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/KutylowskiKKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CichonMK21,
  author       = {Jacek Cichon and
                  Krzysztof Majcher and
                  Miroslaw Kutylowski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Fair Mutual Authentication},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {754--759},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010579507540759},
  doi          = {10.5220/0010579507540759},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CichonMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/KutylowskiSY21,
  author       = {Miroslaw Kutylowski and
                  Piotr Syga and
                  Moti Yung},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {Emerging Security Challenges for Ubiquitous Devices},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {3--18},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_1},
  doi          = {10.1007/978-3-030-10591-4\_1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/KutylowskiSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/HanzlikK21,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {ePassport and eID Technologies},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {81--97},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_5},
  doi          = {10.1007/978-3-030-10591-4\_5},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/21/HanzlikK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YehSDYK20,
  author       = {Kuo{-}Hui Yeh and
                  Chunhua Su and
                  Robert H. Deng and
                  Moti Yung and
                  Miroslaw Kutylowski},
  title        = {Special issue on security and privacy of blockchain technologies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {19},
  number       = {3},
  pages        = {243--244},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10207-020-00496-6},
  doi          = {10.1007/S10207-020-00496-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YehSDYK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KutylowskiLY20,
  author       = {Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka and
                  Moti Yung},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{GDPR} - Challenges for Reconciling Legal Rules with Technical Reality},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {736--755},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_36},
  doi          = {10.1007/978-3-030-58951-6\_36},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KutylowskiLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KubiakK20,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Preventing a Fork in a Blockchain - David Fighting Goliath},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1044--1051},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00139},
  doi          = {10.1109/TRUSTCOM50675.2020.00139},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KubiakK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2020,
  editor       = {Miroslaw Kutylowski and
                  Jun Zhang and
                  Chao Chen},
  title        = {Network and System Security - 14th International Conference, {NSS}
                  2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12570},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65745-1},
  doi          = {10.1007/978-3-030-65745-1},
  isbn         = {978-3-030-65744-4},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/HanzlikKK19,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  title        = {{CTRL-PACE:} Controlled Randomness for e-Passport Password Authentication},
  journal      = {Fundam. Informaticae},
  volume       = {169},
  number       = {4},
  pages        = {295--330},
  year         = {2019},
  url          = {https://doi.org/10.3233/FI-2019-1849},
  doi          = {10.3233/FI-2019-1849},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/HanzlikKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KluczniakWCK19,
  author       = {Kamil Kluczniak and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Miroslaw Kutylowski},
  title        = {Multi-device anonymous authentication},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {2},
  pages        = {181--197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0406-4},
  doi          = {10.1007/S10207-018-0406-4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KluczniakWCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/BlaskiewiczCKZ19,
  author       = {Przemyslaw Blaskiewicz and
                  Jacek Cichon and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  editor       = {Maria Rita Palattella and
                  Stefano Scanzio and
                  Sinem Coleri Ergen},
  title        = {Revised Gateway Selection for LoRa Radio Networks},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks - 18th International Conference
                  on Ad-Hoc Networks and Wireless, {ADHOC-NOW} 2019, Luxembourg, Luxembourg,
                  October 1-3, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11803},
  pages        = {228--240},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31831-4\_16},
  doi          = {10.1007/978-3-030-31831-4\_16},
  timestamp    = {Thu, 14 Oct 2021 09:45:57 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/BlaskiewiczCKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KutylowskiK019,
  author       = {Miroslaw Kutylowski and
                  Lukasz Krzywiecki and
                  Xiaofeng Chen},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Rethinking Identification Protocols from the Point of View of the
                  {GDPR}},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  pages        = {296--315},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_25},
  doi          = {10.1007/978-3-030-20951-3\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/KutylowskiK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KrzywieckiKPS19,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Jakub Pezda and
                  Marcin Slowik},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios
                  (Brief Announcement)},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  pages        = {320--323},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_27},
  doi          = {10.1007/978-3-030-20951-3\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/KrzywieckiKPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KutylowskiLSSKG19,
  author       = {Miroslaw Kutylowski and
                  Jakub Lemiesz and
                  Marta Slowik and
                  Marcin Slowik and
                  Kamil Kluczniak and
                  Maciej Gebala},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {341--361},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_19},
  doi          = {10.1007/978-3-030-34339-2\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KutylowskiLSSKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BobowskiK19,
  author       = {Adam Bobowski and
                  Miroslaw Kutylowski},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Derandomized {PACE} with Mutual Authentication},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {697--705},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_44},
  doi          = {10.1007/978-3-030-36938-5\_44},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BobowskiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KutylowskiK19,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Kubiak},
  title        = {Privacy and Security Analysis of {PACE} {GM} Protocol},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {763--768},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00110},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00110},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KutylowskiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/BlaskiewiczHKKKSW19,
  author       = {Przemyslaw Blaskiewicz and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Marcin Slowik and
                  Marta Wszola},
  editor       = {Kuan{-}Ching Li and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {Pseudonymous Signature Schemes},
  booktitle    = {Advances in Cyber Security: Principles, Techniques, and Applications},
  pages        = {185--255},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1483-4\_8},
  doi          = {10.1007/978-981-13-1483-4\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/BlaskiewiczHKKKSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/bdt/KutylowskiB19,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Blaskiewicz},
  editor       = {Sherif Sakr and
                  Albert Y. Zomaya},
  title        = {Privacy-Aware Identity Management},
  booktitle    = {Encyclopedia of Big Data Technologies},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-63962-8\_241-1},
  doi          = {10.1007/978-3-319-63962-8\_241-1},
  timestamp    = {Thu, 14 Feb 2019 16:03:55 +0100},
  biburl       = {https://dblp.org/rec/reference/bdt/KutylowskiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrzywieckiKPS19,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Jakub Pezda and
                  Marcin Slowik},
  title        = {Anonymous Deniable Identification in Ephemeral Setup {\&} Leakage
                  Scenarios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/337},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KrzywieckiKPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KutylowskiWXY18,
  author       = {Miroslaw Kutylowski and
                  Yu Wang and
                  Shouhuai Xu and
                  Laurence T. Yang},
  title        = {Special issue on social network security and privacy},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {30},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/cpe.4414},
  doi          = {10.1002/CPE.4414},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/KutylowskiWXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2018,
  editor       = {Lech Jan Janczewski and
                  Miroslaw Kutylowski},
  title        = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11
                  International Conference, {SEC} 2018, Held at the 24th {IFIP} World
                  Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {529},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99828-2},
  doi          = {10.1007/978-3-319-99828-2},
  isbn         = {978-3-319-99827-5},
  timestamp    = {Tue, 11 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiHK18,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  title        = {Towards Practical Security of Pseudonymous Signature on the {BSI}
                  eIDAS Token},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XiangBK17,
  author       = {Yang Xiang and
                  Elisa Bertino and
                  Miroslaw Kutylowski},
  title        = {Security and privacy in social networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4093},
  doi          = {10.1002/CPE.4093},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/XiangBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/WangCLKK17,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  title        = {TrDup: enhancing secure data deduplication with user traceability
                  in cloud computing},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {13},
  number       = {3},
  pages        = {270--289},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJWGS.2017.10006054},
  doi          = {10.1504/IJWGS.2017.10006054},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwgs/WangCLKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/CichonKW17,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Kamil Wolny},
  editor       = {Antonio Fern{\'{a}}ndez Anta and
                  Tomasz Jurdzinski and
                  Miguel A. Mosteiro and
                  Yanyong Zhang},
  title        = {Braid Chain Radio Communication},
  booktitle    = {Algorithms for Sensor Systems - 13th International Symposium on Algorithms
                  and Experiments for Wireless Sensor Networks, {ALGOSENSORS} 2017,
                  Vienna, Austria, September 7-8, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10718},
  pages        = {223--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72751-6\_17},
  doi          = {10.1007/978-3-319-72751-6\_17},
  timestamp    = {Sun, 25 Jul 2021 11:45:10 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/CichonKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrzywieckiK17,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Cong Wang and
                  Murat Kantarcioglu},
  title        = {Security of Okamoto Identification Scheme: a Defense against Ephemeral
                  Key Leakage and Setup},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Security
                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055259.3055267},
  doi          = {10.1145/3055259.3055267},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrzywieckiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Kutylowski17,
  author       = {Miroslaw Kutylowski},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {On Crossroads of Privacy Protection},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {11--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_2},
  doi          = {10.1007/978-3-319-75160-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Kutylowski17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KrzywieckiWK17,
  author       = {Lukasz Krzywiecki and
                  Marta Wszola and
                  Miroslaw Kutylowski},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {96--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_7},
  doi          = {10.1007/978-3-319-60080-2\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/KrzywieckiWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XiangAK16,
  author       = {Yang Xiang and
                  Man Ho Au and
                  Miroslaw Kutylowsky},
  title        = {Security and privacy in big data},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {10},
  pages        = {2856--2857},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3796},
  doi          = {10.1002/CPE.3796},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XiangAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengKXZ16,
  author       = {Xiuzhen Cheng and
                  Miroslaw Kutylowski and
                  Kuai Xu and
                  Haojin Zhu},
  title        = {Cyber security, crime, and forensics of wireless networks and applications},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3763--3764},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1646},
  doi          = {10.1002/SEC.1646},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChengKXZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KutylowskiHK16,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy
                  Threats},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_31},
  doi          = {10.1007/978-3-319-40367-0\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KutylowskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KluczniakHK16,
  author       = {Kamil Kluczniak and
                  Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  editor       = {Feng Bao and
                  Liqun Chen and
                  Robert H. Deng and
                  Guojun Wang},
  title        = {A Formal Concept of Domain Pseudonymous Signatures},
  booktitle    = {Information Security Practice and Experience - 12th International
                  Conference, {ISPEC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10060},
  pages        = {238--254},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49151-6\_17},
  doi          = {10.1007/978-3-319-49151-6\_17},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KluczniakHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HanzlikK16,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Chip Authentication for E-Passports: {PACE} with Chip Authentication
                  Mapping v2},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_8},
  doi          = {10.1007/978-3-319-45871-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HanzlikK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/HanzlikKK16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Controlled Randomness - {A} Defense Against Backdoors in Cryptographic
                  Devices},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {215--232},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_11},
  doi          = {10.1007/978-3-319-61273-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/HanzlikKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KutylowskiCHKCW16,
  author       = {Miroslaw Kutylowski and
                  Jacek Cichon and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Xiaofeng Chen and
                  Jianfeng Wang},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Protecting Electronic Signatures in Case of Key Leakage},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {252--274},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_13},
  doi          = {10.1007/978-3-319-61273-7\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KutylowskiCHKCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KluczniakW0K16,
  author       = {Kamil Kluczniak and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Miroslaw Kutylowski},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Multi-device Anonymous Authentication},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_2},
  doi          = {10.1007/978-3-319-46298-1\_2},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KluczniakW0K16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/BlaskiewiczKLS16,
  author       = {Przemyslaw Blaskiewicz and
                  Miroslaw Kutylowski and
                  Jakub Lemiesz and
                  Malgorzata Sulkowska},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jose M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {Ghost Train for Anonymous Communication},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie,
                  China, November 16-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10066},
  pages        = {224--239},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49148-6\_20},
  doi          = {10.1007/978-3-319-49148-6\_20},
  timestamp    = {Mon, 05 Feb 2024 20:29:50 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/BlaskiewiczKLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanzlikKKD16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski and
                  Shlomi Dolev},
  title        = {Local Self-Organization with Strong Privacy Protection},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {775--782},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0138},
  doi          = {10.1109/TRUSTCOM.2016.0138},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanzlikKKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlaskiewiczCLKZ16,
  author       = {Przemyslaw Blaskiewicz and
                  Jacek Cichon and
                  Jakub Lemiesz and
                  Miroslaw Kutylowski and
                  Marcin Zawada and
                  Szymon Stefanski and
                  Krzysztof Chrobak},
  title        = {{\(\lambda\)}-persistant {CSMA:} a radio-channel access protocol},
  journal      = {CoRR},
  volume       = {abs/1607.00861},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00861},
  eprinttype    = {arXiv},
  eprint       = {1607.00861},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlaskiewiczCLKZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlaskiewiczCLKZ16a,
  author       = {Przemyslaw Blaskiewicz and
                  Jacek Cichon and
                  Jakub Lemiesz and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  title        = {One- and Multi-Pass Long-Hop Routing for Wireless Network},
  journal      = {CoRR},
  volume       = {abs/1607.00862},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00862},
  eprinttype    = {arXiv},
  eprint       = {1607.00862},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlaskiewiczCLKZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlaskiewiczCLKZ16b,
  author       = {Przemyslaw Blaskiewicz and
                  Jacek Cichon and
                  Jakub Lemiesz and
                  Miroslaw Kutylowski and
                  Marcin Zawada and
                  Krystyna Napierala and
                  Michal Panek and
                  Stanislaw Strzyz},
  title        = {A Jamming-Resilient MAC-layer Device Identification for Internet of
                  Things},
  journal      = {CoRR},
  volume       = {abs/1607.00863},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.00863},
  eprinttype    = {arXiv},
  eprint       = {1607.00863},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlaskiewiczCLKZ16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BermanFGKKLT15,
  author       = {Ron Berman and
                  Amos Fiat and
                  Marcin Gomulkiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski and
                  Tomer Levinboim and
                  Amnon Ta{-}Shma},
  title        = {Provable Unlinkability Against Traffic Analysis with Low Message Overhead},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {623--640},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9171-8},
  doi          = {10.1007/S00145-013-9171-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BermanFGKKLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/HanzlikK15,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski},
  title        = {Restricted Identification Secure in the Extended Canetti-Krawczyk
                  Model},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {21},
  number       = {3},
  pages        = {419--439},
  year         = {2015},
  url          = {http://www.jucs.org/jucs\_21\_3/restricted\_identification\_secure\_in},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/HanzlikK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/KlonowskiKRR15,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Michal Ren and
                  Katarzyna Rybarczyk},
  title        = {Mixing in Random Digraphs with Application to the Forward-Secure Key
                  Evolution in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {11},
  number       = {2},
  pages        = {29:1--29:27},
  year         = {2015},
  url          = {https://doi.org/10.1145/2637482},
  doi          = {10.1145/2637482},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/KlonowskiKRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/analco/KardasKL15,
  author       = {Marcin Kardas and
                  Miroslaw Kutylowski and
                  Jakub Lemiesz},
  editor       = {Robert Sedgewick and
                  Mark Daniel Ward},
  title        = {On Distributed Cardinality Estimation: Random Arcs Recycled},
  booktitle    = {Proceedings of the Twelfth Workshop on Analytic Algorithmics and Combinatorics,
                  {ANALCO} 2015, San Diego, CA, USA, January 4, 2015},
  pages        = {129--137},
  publisher    = {{SIAM}},
  year         = {2015},
  url          = {https://doi.org/10.1137/1.9781611973761.12},
  doi          = {10.1137/1.9781611973761.12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/analco/KardasKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/Wang00KK15,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {A New Secure Data Deduplication Approach Supporting User Traceability},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {120--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.49},
  doi          = {10.1109/BWCCA.2015.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/Wang00KK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanzlikKK15,
  author       = {Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks
                  for U-Prove},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {603--608},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714597},
  doi          = {10.1145/2714576.2714597},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HanzlikKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanzlikKY15,
  author       = {Lucjan Hanzlik and
                  Miroslaw Kutylowski and
                  Moti Yung},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Hard Invalidation of Electronic Signatures},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_29},
  doi          = {10.1007/978-3-319-17533-1\_29},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HanzlikKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KluczniakHKK15,
  author       = {Kamil Kluczniak and
                  Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Anonymous Evaluation System},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_19},
  doi          = {10.1007/978-3-319-25645-0\_19},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KluczniakHKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/HanzlikKK15,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  title        = {Insecurity of Anonymous Login with German Personal Identity Cards},
  booktitle    = {International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
  pages        = {39--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SocialSec2015.12},
  doi          = {10.1109/SOCIALSEC2015.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/HanzlikKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanzlikKK15,
  author       = {Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  title        = {Tracing Attacks on U-Prove with Revocation Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/108},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanzlikKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HanzlikKK14,
  author       = {Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Stand-by Attacks on {E-ID} Password Authentication},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {475--495},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_26},
  doi          = {10.1007/978-3-319-16745-9\_26},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HanzlikKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanzlikKK14,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification
                  by Revoked Users},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {283--290},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_18},
  doi          = {10.1007/978-3-662-45472-5\_18},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HanzlikKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BlaskiewiczKKS14,
  author       = {Przemyslaw Blaskiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski and
                  Piotr Syga},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Lightweight Protocol for Trusted Spontaneous Communication},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_15},
  doi          = {10.1007/978-3-319-27998-5\_15},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BlaskiewiczKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KutylowskiHKKK14,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Przemyslaw Kubiak and
                  Lukasz Krzywiecki},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Forbidden City Model - Towards a Practice Relevant Framework for Designing
                  Cryptographic Protocols},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_5},
  doi          = {10.1007/978-3-319-06320-1\_5},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KutylowskiHKKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/KrzywieckiKK14,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Viliam Geffert and
                  Bart Preneel and
                  Branislav Rovan and
                  Julius Stuller and
                  A Min Tjoa},
  title        = {Probabilistic Admissible Encoding on Elliptic Curves - Towards {PACE}
                  with Generalized Integrated Mapping},
  booktitle    = {{SOFSEM} 2014: Theory and Practice of Computer Science - 40th International
                  Conference on Current Trends in Theory and Practice of Computer Science,
                  Nov{\'{y}} Smokovec, Slovakia, January 26-29, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8327},
  pages        = {395--406},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04298-5\_35},
  doi          = {10.1007/978-3-319-04298-5\_35},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/KrzywieckiKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-1,
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9},
  doi          = {10.1007/978-3-319-11203-9},
  isbn         = {978-3-319-11202-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2014-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1},
  doi          = {10.1007/978-3-319-11212-1},
  isbn         = {978-3-319-11211-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2014-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BrzezniakHKK13,
  author       = {Blazej Brzezniak and
                  Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  title        = {Attack against Ibrahim's Distributed Key Generation for {RSA}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {313--316},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n4/ijns-2013-v15-n4-p313-316.pdf},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BrzezniakHKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KubiakK13,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Supervised Usage of Signature Creation Devices},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_9},
  doi          = {10.1007/978-3-319-12087-4\_9},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KubiakK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/HanzlikKKK13,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski and
                  Lukasz Krzywiecki},
  editor       = {Sokratis K. Katsikas and
                  Isaac Agudo},
  title        = {Mutual Restricted Identification},
  booktitle    = {Public Key Infrastructures, Services and Applications - 10th European
                  Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8341},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53997-8\_8},
  doi          = {10.1007/978-3-642-53997-8\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/HanzlikKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/KikGK13,
  author       = {Marcin Kik and
                  Maciej Gebala and
                  Miroslaw Kutylowski},
  editor       = {Mukaddim Pathan and
                  Guiyi Wei and
                  Giancarlo Fortino},
  title        = {Bit Reversal Broadcast Scheduling for Ad Hoc Systems},
  booktitle    = {Internet and Distributed Computing Systems - 6th International Conference,
                  {IDCS} 2013, Hangzhou, China, October 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8223},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41428-2\_18},
  doi          = {10.1007/978-3-642-41428-2\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idcs/KikGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanzlikKK13,
  author       = {Lucjan Hanzlik and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Simplified PACE{\(\vert\)}AA Protocol},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_16},
  doi          = {10.1007/978-3-642-38033-4\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HanzlikKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KlonowskiKS13,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Piotr Syga},
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {Chameleon {RFID} and Tracking Prevention},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  pages        = {17--29},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-328-5-17},
  doi          = {10.3233/978-1-61499-328-5-17},
  timestamp    = {Wed, 13 May 2020 07:48:31 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/KlonowskiKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KlonowskiKK13,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {Efficient and robust data aggregation using untrusted infrastructure},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {123--130},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2523535},
  doi          = {10.1145/2523514.2523535},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KlonowskiKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KutylowskiL13,
  author       = {Miroslaw Kutylowski and
                  Piotr Lipiak},
  title        = {Disability Parking Permit - Lightweight But Trustworthy Identity Documents},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1535--1540},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.188},
  doi          = {10.1109/TRUSTCOM.2013.188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KutylowskiL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanzlikKKK13,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  title        = {Mutual Chip Authentication},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1683--1689},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.209},
  doi          = {10.1109/TRUSTCOM.2013.209},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanzlikKKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2012,
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38519-3},
  doi          = {10.1007/978-3-642-38519-3},
  isbn         = {978-3-642-38518-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrzywieckiKK13,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  title        = {Stamp {\textbackslash}{\&} Extend - Instant but Undeniable Timestamping
                  based on Lazy Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/730},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrzywieckiKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KlonowskiKZ12,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  title        = {Energy efficient alert in single-hop networks of extremely weak devices},
  journal      = {Theor. Comput. Sci.},
  volume       = {453},
  pages        = {65--74},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.tcs.2012.01.044},
  doi          = {10.1016/J.TCS.2012.01.044},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/KlonowskiKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CichonGK12,
  author       = {Jacek Cichon and
                  Zbigniew Golebiewski and
                  Miroslaw Kutylowski},
  title        = {From key predistribution to key redistribution},
  journal      = {Theor. Comput. Sci.},
  volume       = {453},
  pages        = {75--87},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.tcs.2012.06.001},
  doi          = {10.1016/J.TCS.2012.06.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/CichonGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/KrzywieckiKKTW12,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Michal Tabor and
                  Daniel Wachnik},
  editor       = {Witold Abramowicz and
                  Dalia Kriksciuniene and
                  Virgilijus Sakalauskas},
  title        = {Lightweight Certificates - Towards a Practical Model for {PKI}},
  booktitle    = {Business Information Systems - 15th International Conference, {BIS}
                  2012, Vilnius, Lithuania, May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {117},
  pages        = {296--307},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30359-3\_26},
  doi          = {10.1007/978-3-642-30359-3\_26},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/KrzywieckiKKTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccci/BlaskiewiczKWW12,
  author       = {Przemyslaw Blaskiewicz and
                  Miroslaw Kutylowski and
                  Wojciech Wodo and
                  Kamil Wolny},
  editor       = {Ngoc Thanh Nguyen and
                  Kiem Hoang and
                  Piotr Jedrzejowicz},
  title        = {Extreme Propagation in an Ad-Hoc Radio Network - Revisited},
  booktitle    = {Computational Collective Intelligence. Technologies and Applications
                  - 4th International Conference, {ICCCI} 2012, Ho Chi Minh City, Vietnam,
                  November 28-30, 2012, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7654},
  pages        = {142--151},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34707-8\_15},
  doi          = {10.1007/978-3-642-34707-8\_15},
  timestamp    = {Thu, 16 Mar 2023 20:00:30 +0100},
  biburl       = {https://dblp.org/rec/conf/iccci/BlaskiewiczKWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KrzywieckiKK12,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Chris J. Mitchell and
                  Allan Tomlinson},
  title        = {Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy
                  Trees},
  booktitle    = {Trusted Systems, 4th International Conference, {INTRUST} 2012, London,
                  UK, December 17-18, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7711},
  pages        = {5--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35371-0\_2},
  doi          = {10.1007/978-3-642-35371-0\_2},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KrzywieckiKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KrzywieckiK12,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {Proof of Possession for Cloud Storage via Lagrangian Interpolation
                  Techniques},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_23},
  doi          = {10.1007/978-3-642-34601-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KrzywieckiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/KutylowskiG12,
  author       = {Miroslaw Kutylowski and
                  Maciej Gebala},
  editor       = {M{\'{a}}ria Bielikov{\'{a}} and
                  Gerhard Friedrich and
                  Georg Gottlob and
                  Stefan Katzenbeisser and
                  Gy{\"{o}}rgy Tur{\'{a}}n},
  title        = {Optimizing Segment Based Document Protection},
  booktitle    = {{SOFSEM} 2012: Theory and Practice of Computer Science - 38th Conference
                  on Current Trends in Theory and Practice of Computer Science, {\v{S}}pindler{\r{u}}v
                  Ml{\'{y}}n, Czech Republic, January 21-27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7147},
  pages        = {566--575},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27660-6\_46},
  doi          = {10.1007/978-3-642-27660-6\_46},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/KutylowskiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanzlikKKK12,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Restricted Identification without Group Keys},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1194--1199},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.243},
  doi          = {10.1109/TRUSTCOM.2012.243},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanzlikKKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-4605,
  author       = {Marcin Kik and
                  Maciej Gebala and
                  Miroslaw Kutylowski},
  title        = {One-side Energy costs of the {RBO} receiver},
  journal      = {CoRR},
  volume       = {abs/1209.4605},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.4605},
  eprinttype    = {arXiv},
  eprint       = {1209.4605},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-4605.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiG12,
  author       = {Miroslaw Kutylowski and
                  Maciej Gebala},
  title        = {Optimizing Segment Based Document Protection (Corrected Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/KutylowskiL11,
  author       = {Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka},
  editor       = {Witold Abramowicz and
                  Leszek A. Maciaszek and
                  Krzysztof Wecel},
  title        = {Challenges for Electronic Identity Documents},
  booktitle    = {Business Information Systems Workshops - {BIS} 2011 International
                  Workshops and {BPSC} International Conference, Pozna{\'{n}},
                  Poland, June 15-17, 2011. Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {97},
  pages        = {256--257},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25370-6\_25},
  doi          = {10.1007/978-3-642-25370-6\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/KutylowskiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/KutylowskiBKKPT11,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Blaskiewicz and
                  Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Wieslaw Paluszynski and
                  Michal Tabor},
  editor       = {Witold Abramowicz and
                  Leszek A. Maciaszek and
                  Krzysztof Wecel},
  title        = {Technical and Legal Meaning of "Sole Control" - Towards
                  Verifiability in Signing Systems},
  booktitle    = {Business Information Systems Workshops - {BIS} 2011 International
                  Workshops and {BPSC} International Conference, Pozna{\'{n}},
                  Poland, June 15-17, 2011. Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {97},
  pages        = {270--281},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25370-6\_27},
  doi          = {10.1007/978-3-642-25370-6\_27},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/KutylowskiBKKPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/KutylowskiS11,
  author       = {Miroslaw Kutylowski and
                  Jun Shao},
  title        = {Signing with multiple ID's and a single key},
  booktitle    = {2011 {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2011, Las Vegas, NV, 9-12 January, 2011},
  pages        = {519--520},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CCNC.2011.5766527},
  doi          = {10.1109/CCNC.2011.5766527},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/KutylowskiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KutylowskiS11,
  author       = {Miroslaw Kutylowski and
                  Jun Shao},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {1-out-of-2 signature},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {391--395},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966965},
  doi          = {10.1145/1966913.1966965},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KutylowskiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/KutylowskiKKK11,
  author       = {Miroslaw Kutylowski and
                  Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Michal Koza},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Restricted Identification Scheme and Diffie-Hellman Linking Problem},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_15},
  doi          = {10.1007/978-3-642-32298-3\_15},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/KutylowskiKKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KlonowskiKK11,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {How to Transmit Messages via {WSN} in a Hostile Environment},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {387--390},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KlonowskiKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sta/BarczynskiBKK11,
  author       = {Krzysztof Barczynski and
                  Przemyslaw Blaskiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {James J. Park and
                  Javier L{\'{o}}pez and
                  Sang{-}Soo Yeo and
                  Taeshik Shon and
                  David Taniar},
  title        = {Self-keying Identification Mechanism for Small Devices},
  booktitle    = {Secure and Trust Computing, Data Management and Applications - 8th
                  {FTRA} International Conference, {STA} 2011, Loutraki, Greece, June
                  28-30, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {186},
  pages        = {37--44},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22339-6\_5},
  doi          = {10.1007/978-3-642-22339-6\_5},
  timestamp    = {Mon, 08 Apr 2019 12:52:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sta/BarczynskiBKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrzywieckiK11,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Coalition Resistant Anonymous Broadcast Encryption Scheme Based on
                  {PUF}},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_4},
  doi          = {10.1007/978-3-642-21599-5\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrzywieckiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/eatcs/BlaskiewiczK11,
  author       = {Przemyslaw Blaskiewicz and
                  Miroslaw Kutylowski},
  editor       = {Sotiris E. Nikoletseas and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Security and Trust in Sensor Networks},
  booktitle    = {Theoretical Aspects of Distributed Computing in Sensor Networks},
  series       = {Monographs in Theoretical Computer Science. An {EATCS} Series},
  pages        = {697--739},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-14849-1\_22},
  doi          = {10.1007/978-3-642-14849-1\_22},
  timestamp    = {Tue, 16 May 2017 14:24:23 +0200},
  biburl       = {https://dblp.org/rec/series/eatcs/BlaskiewiczK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/BorisovKKL10,
  author       = {Nikita Borisov and
                  Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka},
  title        = {Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {380--399},
  year         = {2010},
  url          = {https://doi.org/10.3837/tiis.2010.06.011},
  doi          = {10.3837/TIIS.2010.06.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/BorisovKKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/KubiakKS10,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Jun Shao},
  editor       = {Ngoc Thanh Nguyen and
                  Manh Thanh Le and
                  Jerzy Swiatek},
  title        = {How to Construct State Registries-Matching Undeniability with Public
                  Security},
  booktitle    = {Intelligent Information and Database Systems, Second International
                  Conference, ACIIDS, Hue City, Vietnam, March 24-26, 2010. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5990},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12145-6\_7},
  doi          = {10.1007/978-3-642-12145-6\_7},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aciids/KubiakKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KlonowskiKK10,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_24},
  doi          = {10.1007/978-3-642-14081-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KlonowskiKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/CichonGK10,
  author       = {Jacek Cichon and
                  Zbigniew Golebiewski and
                  Miroslaw Kutylowski},
  editor       = {Christian Scheideler},
  title        = {From Key Predistribution to Key Redistribution},
  booktitle    = {Algorithms for Sensor Systems - 6th International Workshop on Algorithms
                  for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile
                  Entities, {ALGOSENSORS} 2010, Bordeaux, France, July 5, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6451},
  pages        = {92--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16988-5\_9},
  doi          = {10.1007/978-3-642-16988-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/CichonGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/KubiakKLT10,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka and
                  Michal Tabor},
  editor       = {Witold Abramowicz and
                  Robert Tolksdorf and
                  Krzysztof Wecel},
  title        = {Mediated Signatures - Towards Undeniability of Digital Data in Technical
                  and Legal Framework},
  booktitle    = {Business Information Systems Workshops - {BIS} 2010 International
                  Workshops, Berlin, Germany, May 3-5, 2010. Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {57},
  pages        = {298--309},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15402-7\_36},
  doi          = {10.1007/978-3-642-15402-7\_36},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/KubiakKLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KrzywieckiKMS10,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Hubert Misztela and
                  Tomasz Struminski},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Private Information Retrieval with a Trusted Hardware Unit - Revisited},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {373--386},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_26},
  doi          = {10.1007/978-3-642-21518-6\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KrzywieckiKMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/BlaskiewiczKK10,
  author       = {Przemyslaw Blaskiewicz and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {Digital Signatures for e-Government - {A} Long-Term Security Architecture},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {256--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_24},
  doi          = {10.1007/978-3-642-23602-0\_24},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/BlaskiewiczKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/BlaskiewiczKK10,
  author       = {Przemyslaw Blaskiewicz and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work
                  in Progress},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {173--188},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_12},
  doi          = {10.1007/978-3-642-25283-9\_12},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/BlaskiewiczKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/KutylowskiK10,
  author       = {Miroslaw Kutylowski and
                  Przemyslaw Kubiak},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {Polish Concepts for Securing E-Government Document Flow},
  booktitle    = {{ISSE} 2010 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2010 Conference, Berlin,
                  Germany, October 5-7, 2010},
  pages        = {399--407},
  publisher    = {Vieweg+Teubner},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-8348-9788-6\_39},
  doi          = {10.1007/978-3-8348-9788-6\_39},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/KutylowskiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/KrzywieckiK10,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Lagrangian E-Voting: Verifiability on Demand and Strong Privacy},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_8},
  doi          = {10.1007/978-3-642-13869-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/KrzywieckiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/KutylowskiZ10,
  author       = {Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Scratch, Click {\&} Vote: {E2E} Voting over the Internet},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {343--356},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_21},
  doi          = {10.1007/978-3-642-12980-3\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/KutylowskiZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3},
  doi          = {10.1007/978-3-642-12980-3},
  isbn         = {978-3-642-12979-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/2010lncs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KlonowskiKKL09,
  author       = {Marek Klonowski and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Anna Lauks},
  title        = {Step-out group signatures},
  journal      = {Computing},
  volume       = {85},
  number       = {1-2},
  pages        = {137--151},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00607-009-0040-0},
  doi          = {10.1007/S00607-009-0040-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KlonowskiKKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aciids/GolebiewskiKKK09,
  author       = {Zbigniew Golebiewski and
                  Michal Koza and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Ngoc Thanh Nguyen and
                  Huynh Phan Nguyen and
                  Adam Grzech},
  title        = {Leader Election for Multi-channel Radio Networks - Dependent versus
                  Independent Trials},
  booktitle    = {First Asian Conference on Intelligent Information and Database Systems,
                  {ACIIDS} 2009, Dong hoi, Quang binh, Vietnam, April 1-3, 2009},
  pages        = {477--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACIIDS.2009.29},
  doi          = {10.1109/ACIIDS.2009.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aciids/GolebiewskiKKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/GolebiewskiKKK09,
  author       = {Zbigniew Golebiewski and
                  Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Pedro M. Ruiz and
                  Jose Joaquin Garcia{-}Luna{-}Aceves},
  title        = {Towards Fair Leader Election in Wireless Networks},
  booktitle    = {Ad-Hoc, Mobile and Wireless Networks, 8th International Conference,
                  {ADHOC-NOW} 2009, Murcia, Spain, September 22-25, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5793},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04383-3\_13},
  doi          = {10.1007/978-3-642-04383-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/GolebiewskiKKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/CichonGK09,
  author       = {Jacek Cichon and
                  Jaroslaw Grzaslewicz and
                  Miroslaw Kutylowski},
  editor       = {Shlomi Dolev},
  title        = {Key Levels and Securing Key Predistribution against Node Captures},
  booktitle    = {Algorithmic Aspects of Wireless Sensor Networks, 5th International
                  Workshop, {ALGOSENSORS} 2009, Rhodes, Greece, July 10-11, 2009. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5804},
  pages        = {64--75},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05434-1\_8},
  doi          = {10.1007/978-3-642-05434-1\_8},
  timestamp    = {Sat, 19 Oct 2019 20:04:08 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/CichonGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/KlonowskiKZ09,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  editor       = {Shlomi Dolev},
  title        = {Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices},
  booktitle    = {Algorithmic Aspects of Wireless Sensor Networks, 5th International
                  Workshop, {ALGOSENSORS} 2009, Rhodes, Greece, July 10-11, 2009. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5804},
  pages        = {139--150},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05434-1\_14},
  doi          = {10.1007/978-3-642-05434-1\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/KlonowskiKZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadcom/CichonGK09,
  author       = {Jacek Cichon and
                  Maciej Gebala and
                  Miroslaw Kutylowski},
  editor       = {Tomasz Janiczek and
                  Ryszard Klempous and
                  Jan Nikodem and
                  Ryszard J. Zielinski and
                  Johnson I. Agbinya and
                  Robin Braun and
                  Zenon Chaczko},
  title        = {On Optimal One-dimensional Routing Strategies in Sensor Networks},
  booktitle    = {Selected Papers on Broadband Communication, Information Technology
                  {\&} Biomedical Applications, BroadBandCom 2009, Proceedings,
                  Wroc{\l}aw, Poland, July 15-18, 2009},
  pages        = {209--214},
  publisher    = {Wroc{\l}aw University of Technology},
  year         = {2009},
  timestamp    = {Tue, 18 Apr 2023 16:23:03 +0200},
  biburl       = {https://dblp.org/rec/conf/broadcom/CichonGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BorisovKKL09,
  author       = {Nikita Borisov and
                  Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks{-}Dutka},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Attacking and Repairing the Improved ModOnions Protocol},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_18},
  doi          = {10.1007/978-3-642-14423-3\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BorisovKKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fct/2009,
  editor       = {Miroslaw Kutylowski and
                  Witold Charatonik and
                  Maciej Gebala},
  title        = {Fundamentals of Computation Theory, 17th International Symposium,
                  {FCT} 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5699},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03409-1},
  doi          = {10.1007/978-3-642-03409-1},
  isbn         = {978-3-642-03408-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fct/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/KlonowskiKK09,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  title        = {Security Challenges for Wireless Sensor Networks},
  journal      = {{ERCIM} News},
  volume       = {2009},
  number       = {76},
  year         = {2009},
  url          = {http://ercim-news.ercim.eu/en76/special/security-challenges-for-wireless-sensor-networks-dynamic-routing-as-a-security-paradigm},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/KlonowskiKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KrzywieckiKN08,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Maciej Nikodem},
  title        = {General anonymous key broadcasting via Lagrangian interpolation},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {79--84},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070122},
  doi          = {10.1049/IET-IFS:20070122},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KrzywieckiKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CichonKZ08,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  title        = {Adaptive initialization algorithm for ad hoc radio networks with carrier
                  sensing},
  journal      = {Theor. Comput. Sci.},
  volume       = {402},
  number       = {1},
  pages        = {16--28},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.tcs.2008.03.002},
  doi          = {10.1016/J.TCS.2008.03.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/CichonKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CichonKK08,
  author       = {Jacek Cichon and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Distributed Verification of Mixing - Local Forking Proofs Model},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_10},
  doi          = {10.1007/978-3-540-70500-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CichonKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KlonowskiKL08,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Repelling Detour Attack Against Onions with Re-encryption},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {296--308},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_18},
  doi          = {10.1007/978-3-540-68914-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KlonowskiKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/GomulkiewiczKW08,
  author       = {Marcin Gomulkiewicz and
                  Miroslaw Kutylowski and
                  Pawel Wlaz},
  editor       = {S{\'{a}}ndor P. Fekete},
  title        = {Random Fault Attack against Shrinking Generator},
  booktitle    = {Algorithmic Aspects of Wireless Sensor Networks, Fourth International
                  Workshop, {ALGOSENSORS} 2008, Reykjavik, Iceland, July 2008. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5389},
  pages        = {87--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-92862-1\_8},
  doi          = {10.1007/978-3-540-92862-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/GomulkiewiczKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/GolebiewskiKLZ08,
  author       = {Zbigniew Golebiewski and
                  Miroslaw Kutylowski and
                  Tomasz Luczak and
                  Filip Zag{\'{o}}rski},
  title        = {Self-stabilizing population of mobile agents},
  booktitle    = {22nd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2008, Miami, Florida USA, April 14-18, 2008},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPDPS.2008.4536301},
  doi          = {10.1109/IPDPS.2008.4536301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/GolebiewskiKLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/KlonowskiKKL08,
  author       = {Marek Klonowski and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Anna Lauks},
  editor       = {Edward Ochmanski and
                  Jerzy Tyszkiewicz},
  title        = {Step-Out Ring Signatures},
  booktitle    = {Mathematical Foundations of Computer Science 2008, 33rd International
                  Symposium, {MFCS} 2008, Torun, Poland, August 25-29, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5162},
  pages        = {431--442},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85238-4\_35},
  doi          = {10.1007/978-3-540-85238-4\_35},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/KlonowskiKKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/CichonKZ08,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  editor       = {Peng{-}Jun Wan and
                  Michael Segal},
  title        = {Power of Discrete Nonuniformity - Optimizing Access to Shared Radio
                  Channel in Ad Hoc Networks},
  booktitle    = {{MSN} 2008, The 4th International Conference on Mobile Ad-hoc and
                  Sensor Networks, Wuhan, China, December 10-12, 2008},
  pages        = {9--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSN.2008.48},
  doi          = {10.1109/MSN.2008.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/CichonKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pervasive/CichonKK08,
  author       = {Jacek Cichon and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Jadwiga Indulska and
                  Donald J. Patterson and
                  Tom Rodden and
                  Max Ott},
  title        = {Privacy Protection for {RFID} with Hidden Subset Identifiers},
  booktitle    = {Pervasive Computing, 6th International Conference, Pervasive 2008,
                  Sydney, Australia, May 19-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5013},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79576-6\_18},
  doi          = {10.1007/978-3-540-79576-6\_18},
  timestamp    = {Thu, 14 Oct 2021 10:19:36 +0200},
  biburl       = {https://dblp.org/rec/conf/pervasive/CichonKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/CichonKW08,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Bogdan Weglorz},
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {Short Ballot Assumption and Threeballot Voting Protocol},
  booktitle    = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4910},
  pages        = {585--598},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77566-9\_51},
  doi          = {10.1007/978-3-540-77566-9\_51},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/CichonKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/KlonowskiKK08,
  author       = {Marek Klonowski and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {Practical Deniable Encryption},
  booktitle    = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4910},
  pages        = {599--609},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77566-9\_52},
  doi          = {10.1007/978-3-540-77566-9\_52},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/KlonowskiKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/algosensors/2007,
  editor       = {Miroslaw Kutylowski and
                  Jacek Cichon and
                  Przemyslaw Kubiak},
  title        = {Algorithmic Aspects of Wireless Sensor Networks, Third International
                  Workshop, {ALGOSENSORS} 2007, Wroclaw, Poland, July 14, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4837},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77871-4},
  doi          = {10.1007/978-3-540-77871-4},
  isbn         = {978-3-540-77870-7},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7311,
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07311/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiZ08,
  author       = {Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  title        = {Scratch, Click {\&} Vote: {E2E} voting over the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/Kutylowski07,
  author       = {Miroslaw Kutylowski},
  title        = {Tagung "Frontiers of E-Voting", 29. Juli bis 3. August auf
                  Schloss Dagstuhl},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {31},
  number       = {9},
  pages        = {718},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11623-007-0232-8},
  doi          = {10.1007/S11623-007-0232-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dud/Kutylowski07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/Kutylowski07,
  author       = {Miroslaw Kutylowski},
  editor       = {Miroslaw Kutylowski and
                  Jacek Cichon and
                  Przemyslaw Kubiak},
  title        = {Algorithmic Challenges for Sensor Networks - Foreword to {ALGOSENSORS}
                  2007},
  booktitle    = {Algorithmic Aspects of Wireless Sensor Networks, Third International
                  Workshop, {ALGOSENSORS} 2007, Wroclaw, Poland, July 14, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4837},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77871-4\_1},
  doi          = {10.1007/978-3-540-77871-4\_1},
  timestamp    = {Mon, 23 Oct 2023 15:28:12 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/Kutylowski07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KlonowskiKRR07,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Michal Ren and
                  Katarzyna Rybarczyk},
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Forward-Secure Key Evolution in Wireless Sensor Networks},
  booktitle    = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  pages        = {102--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9\_7},
  doi          = {10.1007/978-3-540-76969-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KlonowskiKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KubiakKZ07,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Kleptographic attacks on a cascade of mix servers},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229297},
  doi          = {10.1145/1229285.1229297},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KubiakKZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/CichonK08,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Anonymity and k-Choice Identities},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_23},
  doi          = {10.1007/978-3-540-79499-8\_23},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/CichonK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KutylowskiZ07,
  author       = {Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Verifiable Internet Voting Solving Secure Platform Problem},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_14},
  doi          = {10.1007/978-3-540-75651-4\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KutylowskiZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/CichonKK07,
  author       = {Jacek Cichon and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  title        = {Privacy Protection in Dynamic Systems Based on {RFID} Tags},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {235--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.96},
  doi          = {10.1109/PERCOMW.2007.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/CichonKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Executive Summary -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1294},
  timestamp    = {Thu, 10 Jun 2021 13:02:04 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07a,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Abstracts Collection -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1303},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlonowskiKRR07,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Michal Ren and
                  Katarzyna Rybarczyk},
  title        = {Forward-secure Key Evolution in Wireless Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlonowskiKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/CichonKZ06,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  editor       = {Thomas Kunz and
                  S. S. Ravi},
  title        = {Initialization for Ad Hoc Radio Networks with Carrier Sensing and
                  Collision Detection},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference,
                  {ADHOC-NOW} 2006, Ottawa, Canada, August 17-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4104},
  pages        = {308--320},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11814764\_25},
  doi          = {10.1007/11814764\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/CichonKZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/algosensors/CichonKZ06,
  author       = {Jacek Cichon and
                  Miroslaw Kutylowski and
                  Marcin Zawada},
  editor       = {Sotiris E. Nikoletseas and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier
                  Sensing},
  booktitle    = {Algorithmic Aspects of Wireless Sensor Networks, Second International
                  Workshop, {ALGOSENSORS} 2006, Venice, Italy, July 15, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4240},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11963271\_4},
  doi          = {10.1007/11963271\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/algosensors/CichonKZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GolebiewskiKZ06,
  author       = {Zbigniew Golebiewski and
                  Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Stealing Secrets with {SSL/TLS} and {SSH} - Kleptographic Attacks},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_13},
  doi          = {10.1007/11935070\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GolebiewskiKZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KrzywieckiKK06,
  author       = {Lukasz Krzywiecki and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {A Revocation Scheme Preserving Privacy},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {130--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_11},
  doi          = {10.1007/11937807\_11},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KrzywieckiKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/GogolewskiKKKLZ06,
  author       = {Marcin Gogolewski and
                  Marek Klonowski and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Anna Lauks and
                  Filip Zag{\'{o}}rski},
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Kleptographic Attacks on E-Voting Schemes},
  booktitle    = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  pages        = {494--508},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155\_35},
  doi          = {10.1007/11766155\_35},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/GogolewskiKKKLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsnc/BorzeckiKKKZ06,
  author       = {Piotr Borzecki and
                  Jedrzej Kabarowski and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  title        = {Kleptographic Weaknesses in Benaloh-Tuinstra Protocol},
  booktitle    = {Proceedings of the International Conference on Systems and Networks
                  Communications {(ICSNC} 2006), October 29 - November 3, 2006, Papeete,
                  Tahiti, French Polynesia},
  pages        = {26},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICSNC.2006.50},
  doi          = {10.1109/ICSNC.2006.50},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsnc/BorzeckiKKKZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/KabarowskiKR06,
  author       = {Jedrzej Kabarowski and
                  Miroslaw Kutylowski and
                  Wojciech Rutkowski},
  editor       = {Jin{-}yi Cai and
                  S. Barry Cooper and
                  Angsheng Li},
  title        = {Adversary Immune Size Approximation of Single-Hop Radio Networks},
  booktitle    = {Theory and Applications of Models of Computation, Third International
                  Conference, {TAMC} 2006, Beijing, China, May 15-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3959},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11750321\_14},
  doi          = {10.1007/11750321\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/tamc/KabarowskiKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KlonowskiKKL06,
  author       = {Marek Klonowski and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski and
                  Anna Lauks},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Steven Furnell and
                  Costas Lambrinoudakis},
  title        = {How to Protect a Signature from Being Shown to a Third Party},
  booktitle    = {Trust and Privacy in Digital Business, Third International Conference,
                  TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4083},
  pages        = {192--202},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11824633\_20},
  doi          = {10.1007/11824633\_20},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KlonowskiKKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wea/GomulkiewiczKW06,
  author       = {Marcin Gomulkiewicz and
                  Miroslaw Kutylowski and
                  Pawel Wlaz},
  editor       = {Carme {\`{A}}lvarez and
                  Maria J. Serna},
  title        = {Fault Cryptanalysis and the Shrinking Generator},
  booktitle    = {Experimental Algorithms, 5th International Workshop, {WEA} 2006, Cala
                  Galdana, Menorca, Spain, May 24-27, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4007},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11764298\_6},
  doi          = {10.1007/11764298\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/wea/GomulkiewiczKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GomulkiewiczKW06,
  author       = {Marcin Gomulkiewicz and
                  Miroslaw Kutylowski and
                  Pawel Wlaz},
  editor       = {Matthias Krause and
                  Pavel Pudl{\'{a}}k and
                  R{\"{u}}diger Reischuk and
                  Dieter van Melkebeek},
  title        = {Fault Jumping Attacks against Shrinking Generator},
  booktitle    = {Complexity of Boolean Functions, 12.03. - 17.03.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06111},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2006/611},
  timestamp    = {Thu, 10 Jun 2021 13:02:07 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GomulkiewiczKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/JurdzinskiKZ05,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  title        = {Efficient simulation of synchronous systems by multi-speed systems},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {39},
  number       = {2},
  pages        = {403--419},
  year         = {2005},
  url          = {https://doi.org/10.1051/ita:2005025},
  doi          = {10.1051/ITA:2005025},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/JurdzinskiKZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GogolewskiKK05,
  author       = {Marcin Gogolewski and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Local View Attack on Anonymous Communication},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {475--488},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_27},
  doi          = {10.1007/11555827\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GogolewskiKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/GrzaslewiczKKP05,
  author       = {Ryszard Grzaslewicz and
                  Jaroslaw Kutylowski and
                  Miroslaw Kutylowski and
                  Wojciech Pietkiewicz},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Robust Undetectable Interference Watermarks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {517--526},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_55},
  doi          = {10.1007/11424826\_55},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/GrzaslewiczKKP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KlonowskiK05,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Mauro Barni and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Stefan Katzenbeisser and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Provable Anonymity for Networks of Mixes},
  booktitle    = {Information Hiding, 7th International Workshop, {IH} 2005, Barcelona,
                  Spain, June 6-8, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3727},
  pages        = {26--38},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11558859\_3},
  doi          = {10.1007/11558859\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KlonowskiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KlonowskiKLZ05,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks and
                  Filip Zag{\'{o}}rski},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {A Practical Voting Scheme with Receipts},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {490--497},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_36},
  doi          = {10.1007/11556992\_36},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KlonowskiKLZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwap/KlonowskiKR05,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Bartlomiej R{\'{o}}zanski},
  editor       = {Jianying Zhou and
                  Meng{-}Chow Kang and
                  Feng Bao and
                  HweeHwa Pang},
  title        = {Hiding Data Sources in {P2P} Networks},
  booktitle    = {Applied Public Key Infrastructure - 4th International Workshop: {IWAP}
                  2005, Singapore, September 21-23, 2005},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {128},
  pages        = {225--239},
  publisher    = {{IOS} Press},
  year         = {2005},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1245},
  timestamp    = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iwap/KlonowskiKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/madnes/CichonKKW05,
  author       = {Jacek Cichon and
                  Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Pawel Wlaz},
  editor       = {Mike Burmester and
                  Alec Yasinsac},
  title        = {Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems},
  booktitle    = {Secure Mobile Ad-hoc Networks and Sensors, First International Workshop,
                  {MADNES} 2005, Singapore, September 20-22, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4074},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11801412\_9},
  doi          = {10.1007/11801412\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/madnes/CichonKKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/KlonowskiKZ05,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Filip Zag{\'{o}}rski},
  editor       = {Peter Vojt{\'{a}}s and
                  M{\'{a}}ria Bielikov{\'{a}} and
                  Bernadette Charron{-}Bost and
                  Ondrej S{\'{y}}kora},
  title        = {Anonymous Communication with On-line and Off-line Onion Encoding},
  booktitle    = {{SOFSEM} 2005: Theory and Practice of Computer Science, 31st Conference
                  on Current Trends in Theory and Practice of Computer Science, Liptovsk{\'{y}}
                  J{\'{a}}n, Slovakia, January 22-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3381},
  pages        = {229--238},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30577-4\_26},
  doi          = {10.1007/978-3-540-30577-4\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/KlonowskiKZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KlonowskiKLZ05,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Anna Lauks and
                  Filip Zag{\'{o}}rski},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  G{\"{u}}nther Pernul},
  title        = {Conditional Digital Signatures},
  booktitle    = {Trust, Privacy and Security in Digital Business: Second International
                  Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3592},
  pages        = {206--215},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11537878\_21},
  doi          = {10.1007/11537878\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KlonowskiKLZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wea/GomulkiewiczKVW05,
  author       = {Marcin Gomulkiewicz and
                  Miroslaw Kutylowski and
                  Heinrich Theodor Vierhaus and
                  Pawel Wlaz},
  editor       = {Sotiris E. Nikoletseas},
  title        = {Synchronization Fault Cryptanalysis for Breaking {A5/1}},
  booktitle    = {Experimental and Efficient Algorithms, 4th InternationalWorkshop,
                  {WEA} 2005, Santorini Island, Greece, May 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3503},
  pages        = {415--427},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427186\_36},
  doi          = {10.1007/11427186\_36},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/wea/GomulkiewiczKVW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/IwanikKK04,
  author       = {Jan Iwanik and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion
                  Protocols},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_1},
  doi          = {10.1007/0-387-24486-7\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/IwanikKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/KutylowskiR04,
  author       = {Miroslaw Kutylowski and
                  Wojciech Rutkowski},
  editor       = {Claude Castelluccia and
                  Hannes Hartenstein and
                  Christof Paar and
                  Dirk Westhoff},
  title        = {Secure Initialization in Single-Hop Radio Networks},
  booktitle    = {Security in Ad-hoc and Sensor Networks, First European Workshop, {ESAS}
                  2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3313},
  pages        = {31--41},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30496-8\_4},
  doi          = {10.1007/978-3-540-30496-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/KutylowskiR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GogolewskiKL04,
  author       = {Marcin Gogolewski and
                  Miroslaw Kutylowski and
                  Tomasz Luczak},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Mobile Mixing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {380--393},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_28},
  doi          = {10.1007/11496618\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/GogolewskiKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GomulkiewiczKK04,
  author       = {Marcin Gomulkiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Provable Unlinkability Against Traffic Analysis Already After O(log(n))
                  Steps!},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {354--366},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_30},
  doi          = {10.1007/978-3-540-30144-8\_30},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/GomulkiewiczKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmb/GebalaKRZVW04,
  author       = {Maciej Gebala and
                  Miroslaw Kutylowski and
                  Bartlomiej R{\'{o}}zanski and
                  Marcin Zawada and
                  J. Vossnacker and
                  T. Winter},
  editor       = {Peter Buchholz and
                  Ralf Lehnert and
                  Michal Pi{\'{o}}ro},
  title        = {Optimized {UTRAN} Topology Planning Including Point-to-Multipoint
                  Equipment},
  booktitle    = {{MMB} {\&} {PGTS} 2004, 12th {GI/ITG} Conference on Measuring
                  and Evaluation of Computer and Communication Systems {(MMB)} together
                  with 3rd Polish-German Teletraffic Symposium (PGTS), September 12-15,
                  2004, Dresden, Germany},
  pages        = {87--92},
  publisher    = {{VDE} Verlag},
  year         = {2004},
  timestamp    = {Tue, 25 Sep 2018 18:26:26 +0200},
  biburl       = {https://dblp.org/rec/conf/mmb/GebalaKRZVW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GomulkiewiczKK04,
  author       = {Marcin Gomulkiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Onions Based on Universal Re-encryption - Anonymous Communication
                  Immune Against Repetitive Attack},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {400--410},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_32},
  doi          = {10.1007/978-3-540-31815-6\_32},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GomulkiewiczKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JurdziskiKZ03,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  title        = {Weak communication in single-hop radio networks: adjusting algorithms
                  to industrial standards},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {15},
  number       = {11-12},
  pages        = {1117--1131},
  year         = {2003},
  url          = {https://doi.org/10.1002/cpe.783},
  doi          = {10.1002/CPE.783},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/JurdziskiKZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/KutylowskiR03,
  author       = {Miroslaw Kutylowski and
                  Wojciech Rutkowski},
  editor       = {Giuseppe Di Battista and
                  Uri Zwick},
  title        = {Adversary Immune Leader Election in ad hoc Radio Networks},
  booktitle    = {Algorithms - {ESA} 2003, 11th Annual European Symposium, Budapest,
                  Hungary, September 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2832},
  pages        = {397--408},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39658-1\_37},
  doi          = {10.1007/978-3-540-39658-1\_37},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/KutylowskiR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GomulkiewiczKK03,
  author       = {Marcin Gomulkiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Rapid Mixing and Security of Chaum's Visual Electronic Voting},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {132--145},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_8},
  doi          = {10.1007/978-3-540-39650-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GomulkiewiczKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/KutylowskiL03,
  author       = {Miroslaw Kutylowski and
                  Daniel Letkiewicz},
  editor       = {Branislav Rovan and
                  Peter Vojt{\'{a}}s},
  title        = {Computing Average Value in Ad Hoc Networks},
  booktitle    = {Mathematical Foundations of Computer Science 2003, 28th International
                  Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2747},
  pages        = {511--520},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45138-9\_45},
  doi          = {10.1007/978-3-540-45138-9\_45},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/KutylowskiL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/JurdzinskiKZ02,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  editor       = {Oscar H. Ibarra and
                  Louxin Zhang},
  title        = {Energy-Efficient Size Approximation of Radio Networks with No Collision
                  Detection},
  booktitle    = {Computing and Combinatorics, 8th Annual International Conference,
                  {COCOON} 2002, Singapore, August 15-17, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2387},
  pages        = {279--289},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45655-4\_31},
  doi          = {10.1007/3-540-45655-4\_31},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/JurdzinskiKZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GomulkiewiczK02,
  author       = {Marcin Gomulkiewicz and
                  Miroslaw Kutylowski},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking
                  Defense},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_6},
  doi          = {10.1007/3-540-45853-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GomulkiewiczK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/JurdzinskiKZ02,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  editor       = {Burkhard Monien and
                  Rainer Feldmann},
  title        = {Weak Communication in Radio Networks},
  booktitle    = {Euro-Par 2002, Parallel Processing, 8th International Euro-Par Conference
                  Paderborn, Germany, August 27-30, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2400},
  pages        = {965--972},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45706-2\_137},
  doi          = {10.1007/3-540-45706-2\_137},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/JurdzinskiKZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JurdzinskiKZ02,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  editor       = {Aleta Ricciardi},
  title        = {Efficient algorithms for leader election in radio networks},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571833},
  doi          = {10.1145/571825.571833},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/JurdzinskiKZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/JurdzinskiK01,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Communication Gap for Finite Memory Devices},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {1052--1064},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_85},
  doi          = {10.1007/3-540-48224-5\_85},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/JurdzinskiK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/JurdzinskiKZ01,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Jan Zatopianski},
  title        = {Communication Complexity for Asynchronous Systems of Finite Devices},
  booktitle    = {Proceedings of the 15th International Parallel {\&} Distributed
                  Processing Symposium (IPDPS-01), San Francisco, CA, USA, April 23-27,
                  2001},
  pages        = {139},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/IPDPS.2001.925122},
  doi          = {10.1109/IPDPS.2001.925122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/JurdzinskiKZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/KutylowskiLOW00,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys and
                  Brigitte Oesterdiekhoff and
                  Rolf Wanka},
  title        = {Periodification scheme: constructing sorting networks with constant
                  period},
  journal      = {J. {ACM}},
  volume       = {47},
  number       = {5},
  pages        = {944--967},
  year         = {2000},
  url          = {https://doi.org/10.1145/355483.355490},
  doi          = {10.1145/355483.355490},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/KutylowskiLOW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rsa/CzumajK00,
  author       = {Artur Czumaj and
                  Miroslaw Kutylowski},
  title        = {Delayed path coupling and generating random permutations},
  journal      = {Random Struct. Algorithms},
  volume       = {17},
  number       = {3-4},
  pages        = {238--259},
  year         = {2000},
  url          = {https://doi.org/10.1002/1098-2418(200010/12)17:3/4\&\#60;238::AID-RSA4\&\#62;3.0.CO;2-E},
  doi          = {10.1002/1098-2418(200010/12)17:3/4\&\#60;238::AID-RSA4\&\#62;3.0.CO;2-E},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rsa/CzumajK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/HeideKR00,
  author       = {Friedhelm Meyer auf der Heide and
                  Miroslaw Kutylowski and
                  Prabhakar Ragde},
  editor       = {Arndt Bode and
                  Thomas Ludwig and
                  Wolfgang Karl and
                  Roland Wism{\"{u}}ller},
  title        = {Complexity Theory and Algorithms},
  booktitle    = {Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference,
                  Munich, Germany, August 29 - September 1, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1900},
  pages        = {455},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44520-X\_59},
  doi          = {10.1007/3-540-44520-X\_59},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/HeideKR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/JurdzinskiKL99,
  author       = {Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  editor       = {Takao Asano and
                  Hiroshi Imai and
                  D. T. Lee and
                  Shin{-}Ichi Nakano and
                  Takeshi Tokuyama},
  title        = {Multi-party Finite Computations},
  booktitle    = {Computing and Combinatorics, 5th Annual International Conference,
                  {COCOON} '99, Tokyo, Japan, July 26-28, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1627},
  pages        = {318--329},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48686-0\_32},
  doi          = {10.1007/3-540-48686-0\_32},
  timestamp    = {Sat, 30 Sep 2023 09:37:25 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/JurdzinskiKL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/KikKP99,
  author       = {Marcin Kik and
                  Miroslaw Kutylowski and
                  Marek Piotr{\'{o}}w},
  title        = {Correction Networks},
  booktitle    = {Proceedings of the International Conference on Parallel Processing
                  1999, {ICPP} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICPP.1999.797386},
  doi          = {10.1109/ICPP.1999.797386},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpp/KikKP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/CzumajKKL99,
  author       = {Artur Czumaj and
                  Przemyslawa Kanarek and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {Delayed Path Coupling and Generating Random Permutations via Distributed
                  Stochastic Processes},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {271--280},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.314571},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/CzumajKKL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mfcs/1999,
  editor       = {Miroslaw Kutylowski and
                  Leszek Pacholski and
                  Tomasz Wierzbicki},
  title        = {Mathematical Foundations of Computer Science 1999, 24th International
                  Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1672},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48340-3},
  doi          = {10.1007/3-540-48340-3},
  isbn         = {3-540-66408-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/CzumajKKL98,
  author       = {Artur Czumaj and
                  Przemyslawa Kanarek and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  title        = {Fast Generation of Random Permutations Via Networks Simulation},
  journal      = {Algorithmica},
  volume       = {21},
  number       = {1},
  pages        = {2--20},
  year         = {1998},
  url          = {https://doi.org/10.1007/PL00009206},
  doi          = {10.1007/PL00009206},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/CzumajKKL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/KutylowskiLO98,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys and
                  Brigitte Oesterdiekhoff},
  title        = {Periodic Merging Networks},
  journal      = {Theory Comput. Syst.},
  volume       = {31},
  number       = {5},
  pages        = {551--578},
  year         = {1998},
  url          = {https://doi.org/10.1007/s002240000103},
  doi          = {10.1007/S002240000103},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/KutylowskiLO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DurisJKL98,
  author       = {Pavol Duris and
                  Tomasz Jurdzinski and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  editor       = {Kim Guldstrand Larsen and
                  Sven Skyum and
                  Glynn Winskel},
  title        = {Power of Cooperation and Multihead Finite Systems},
  booktitle    = {Automata, Languages and Programming, 25th International Colloquium,
                  ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1443},
  pages        = {896--907},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055111},
  doi          = {10.1007/BFB0055111},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DurisJKL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/AdlerDJKR98,
  author       = {Micah Adler and
                  Wolfgang Dittrich and
                  Ben H. H. Juurlink and
                  Miroslaw Kutylowski and
                  Ingo Rieping},
  editor       = {Gary L. Miller and
                  Phillip B. Gibbons},
  title        = {Communication-Optimal Parallel Minimum Spanning Tree Algorithms (Extended
                  Abstract)},
  booktitle    = {Proceedings of the Tenth Annual {ACM} Symposium on Parallel Algorithms
                  and Architectures, {SPAA} '98, Puerto Vallarta, Mexico, June 28 -
                  July 2, 1998},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277651.277662},
  doi          = {10.1145/277651.277662},
  timestamp    = {Wed, 21 Nov 2018 12:27:44 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/AdlerDJKR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/HagerupK97,
  author       = {Torben Hagerup and
                  Miroslaw Kutylowski},
  title        = {Fast Integer Merging on the {EREW} {PRAM}},
  journal      = {Algorithmica},
  volume       = {17},
  number       = {1},
  pages        = {55--66},
  year         = {1997},
  url          = {https://doi.org/10.1007/BF02523238},
  doi          = {10.1007/BF02523238},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/HagerupK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/KutylowskiW97,
  author       = {Miroslaw Kutylowski and
                  Rolf Wanka},
  editor       = {Hon Wai Leong and
                  Hiroshi Imai and
                  Sanjay Jain},
  title        = {Playing Tetris on Meshes and Multi-Dimensional {SHEARSORT}},
  booktitle    = {Algorithms and Computation, 8th International Symposium, {ISAAC} '97,
                  Singapore, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1350},
  pages        = {32--41},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63890-3\_5},
  doi          = {10.1007/3-540-63890-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/KutylowskiW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FichIKKK96,
  author       = {Faith E. Fich and
                  Russell Impagliazzo and
                  Bruce M. Kapron and
                  Valerie King and
                  Miroslaw Kutylowski},
  title        = {Limits on the Power of Parallel Random Access Machines with Weak Forms
                  of Write Conflict Resolution},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {53},
  number       = {1},
  pages        = {104--111},
  year         = {1996},
  url          = {https://doi.org/10.1006/jcss.1996.0052},
  doi          = {10.1006/JCSS.1996.0052},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FichIKKK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DietzfelbingerKR96,
  author       = {Martin Dietzfelbinger and
                  Miroslaw Kutylowski and
                  R{\"{u}}diger Reischuk},
  title        = {Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write
                  Parallel Random-Access Machines},
  journal      = {{SIAM} J. Comput.},
  volume       = {25},
  number       = {6},
  pages        = {1196--123},
  year         = {1996},
  url          = {https://doi.org/10.1137/S0097539791224285},
  doi          = {10.1137/S0097539791224285},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DietzfelbingerKR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/CzumajKKL96,
  author       = {Artur Czumaj and
                  Przemyslawa Kanarek and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  editor       = {Josep D{\'{\i}}az and
                  Maria J. Serna},
  title        = {Fast Generation of Random Permutations via Networks Simulation},
  booktitle    = {Algorithms - {ESA} '96, Fourth Annual European Symposium, Barcelona,
                  Spain, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1136},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61680-2\_60},
  doi          = {10.1007/3-540-61680-2\_60},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/CzumajKKL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/KutylowskiL96,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys},
  editor       = {Vijay Chandru and
                  V. Vinay},
  title        = {Limitations of the {QRQW} and {EREW} {PRAM} Models},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  16th Conference, Hyderabad, India, December 18-20, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1180},
  pages        = {310--321},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62034-6\_59},
  doi          = {10.1007/3-540-62034-6\_59},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/KutylowskiL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/KutylowskiW96,
  author       = {Miroslaw Kutylowski and
                  Tomasz Wierzbicki},
  title        = {Approximate Compaction and Padded-Sorting on Exclusive Write PRAMs},
  booktitle    = {Proceedings of {IPPS} '96, The 10th International Parallel Processing
                  Symposium, April 15-19, 1996, Honolulu, Hawaii, {USA}},
  pages        = {174--181},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/IPPS.1996.508054},
  doi          = {10.1109/IPPS.1996.508054},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/KutylowskiW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/KutylowskiLO96,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys and
                  Brigitte Oesterdiekhoff},
  editor       = {Tetsuo Asano and
                  Yoshihide Igarashi and
                  Hiroshi Nagamochi and
                  Satoru Miyano and
                  Subhash Suri},
  title        = {Periodic Merging Networks},
  booktitle    = {Algorithms and Computation, 7th International Symposium, {ISAAC} '96,
                  Osaka, Japan, December 16-18, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1178},
  pages        = {336--345},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0009510},
  doi          = {10.1007/BFB0009510},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/KutylowskiLO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/trier/MI96-26,
  author       = {Artur Czumaj and
                  Przemyslawa Kanarek and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys},
  title        = {Fast Generation of Random Permutations via Networks Simulation},
  journal      = {Universit{\"{a}}t Trier, Mathematik/Informatik, Forschungsbericht},
  volume       = {96-26},
  year         = {1996},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/tr/trier/MI96-26.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/FichKKLR95,
  author       = {Faith E. Fich and
                  Miroslaw Kowaluk and
                  Miroslaw Kutylowski and
                  Krzysztof Lorys and
                  Prabhakar Ragde},
  title        = {Retrieval of Scattered Information by EREW, CREW, and {CRCW} PRAMs},
  journal      = {Comput. Complex.},
  volume       = {5},
  number       = {2},
  pages        = {113--131},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01268141},
  doi          = {10.1007/BF01268141},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/FichKKLR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR95-004,
  author       = {Martin Dietzfelbinger and
                  Miroslaw Kutylowski and
                  R{\"{u}}diger Reischuk},
  title        = {Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write
                  PRAMs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR95-004}},
  year         = {1995},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1995/TR95-004/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR95-004},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR95-004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/DietzfelbingerKR94,
  author       = {Martin Dietzfelbinger and
                  Miroslaw Kutylowski and
                  R{\"{u}}diger Reischuk},
  title        = {Exact Lower Time Bounds for Computing Boolean Functions on {CREW}
                  PRAMs},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {48},
  number       = {2},
  pages        = {231--254},
  year         = {1994},
  url          = {https://doi.org/10.1016/S0022-0000(05)80003-0},
  doi          = {10.1016/S0022-0000(05)80003-0},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/DietzfelbingerKR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/BeameKK94,
  author       = {Paul Beame and
                  Miroslaw Kutylowski and
                  Marcin Kik},
  title        = {Information Broadcasting by Exclusive-Read Prams},
  journal      = {Parallel Process. Lett.},
  volume       = {4},
  pages        = {159--169},
  year         = {1994},
  url          = {https://doi.org/10.1142/S012962649400017X},
  doi          = {10.1142/S012962649400017X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppl/BeameKK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KutylowskiLOW94,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys and
                  Brigitte Oesterdiekhoff and
                  Rolf Wanka},
  title        = {Fast and Feasible Periodic Sorting Networks of Constant Depth},
  booktitle    = {35th Annual Symposium on Foundations of Computer Science, Santa Fe,
                  New Mexico, USA, 20-22 November 1994},
  pages        = {369--380},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SFCS.1994.365679},
  doi          = {10.1109/SFCS.1994.365679},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KutylowskiLOW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/KikKS94,
  author       = {Marcin Kik and
                  Miroslaw Kutylowski and
                  Grzegorz Stachowiak},
  editor       = {Patrice Enjalbert and
                  Ernst W. Mayr and
                  Klaus W. Wagner},
  title        = {Periodic Constant Depth Sorting Networks},
  booktitle    = {{STACS} 94, 11th Annual Symposium on Theoretical Aspects of Computer
                  Science, Caen, France, February 24-26, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {775},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-57785-8\_142},
  doi          = {10.1007/3-540-57785-8\_142},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/KikKS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Kutylowski93,
  author       = {Miroslaw Kutylowski},
  title        = {Stack versus Sensitivity for One-Way Automata},
  journal      = {Theor. Comput. Sci.},
  volume       = {119},
  number       = {2},
  pages        = {233--245},
  year         = {1993},
  url          = {https://doi.org/10.1016/0304-3975(93)90158-P},
  doi          = {10.1016/0304-3975(93)90158-P},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Kutylowski93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/FichIKKK93,
  author       = {Faith E. Fich and
                  Russell Impagliazzo and
                  Bruce M. Kapron and
                  Valerie King and
                  Miroslaw Kutylowski},
  editor       = {Patrice Enjalbert and
                  Alain Finkel and
                  Klaus W. Wagner},
  title        = {Limits on the Power of Parallel Random Access Machines with Weak Forms
                  of Write Conflict Resolution},
  booktitle    = {{STACS} 93, 10th Annual Symposium on Theoretical Aspects of Computer
                  Science, W{\"{u}}rzburg, Germany, February 25-27, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {665},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56503-5\_39},
  doi          = {10.1007/3-540-56503-5\_39},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/FichIKKK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/KutylowskiW92,
  author       = {Miroslaw Kutylowski and
                  Rolf Wanka},
  title        = {Periodic Sorting on Two-Dimensional Meshes},
  journal      = {Parallel Process. Lett.},
  volume       = {2},
  pages        = {213--220},
  year         = {1992},
  url          = {https://doi.org/10.1142/S0129626492000349},
  doi          = {10.1142/S0129626492000349},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/KutylowskiW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dfg/Kutylowski92,
  author       = {Miroslaw Kutylowski},
  editor       = {Burkhard Monien and
                  Thomas Ottmann},
  title        = {Complexity of Boolean Functions on PRAMs - Lower Bound Techniques},
  booktitle    = {Data Structures and Efficient Algorithms, Final Report on the {DFG}
                  Special Joint Initiative},
  series       = {Lecture Notes in Computer Science},
  volume       = {594},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55488-2\_34},
  doi          = {10.1007/3-540-55488-2\_34},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dfg/Kutylowski92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swat/FichKLKR92,
  author       = {Faith E. Fich and
                  Miroslaw Kowaluk and
                  Krzysztof Lorys and
                  Miroslaw Kutylowski and
                  Prabhakar Ragde},
  editor       = {Otto Nurmi and
                  Esko Ukkonen},
  title        = {Retrieval of scattered information by EREW, {CREW} and {CRCW} PRAMs},
  booktitle    = {Algorithm Theory - {SWAT} '92, Third Scandinavian Workshop on Algorithm
                  Theory, Helsinki, Finland, July 8-10, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {621},
  pages        = {30--41},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-55706-7\_3},
  doi          = {10.1007/3-540-55706-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/swat/FichKLKR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Kutylowski91,
  author       = {Miroslaw Kutylowski},
  title        = {Time Complexity of Boolean Functions on {CREW} PRAMs},
  journal      = {{SIAM} J. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {824--833},
  year         = {1991},
  url          = {https://doi.org/10.1137/0220051},
  doi          = {10.1137/0220051},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Kutylowski91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Kutylowski91,
  author       = {Miroslaw Kutylowski},
  title        = {Multihead One-Way Finite Automata},
  journal      = {Theor. Comput. Sci.},
  volume       = {85},
  number       = {1},
  pages        = {135--153},
  year         = {1991},
  url          = {https://doi.org/10.1016/0304-3975(91)90051-3},
  doi          = {10.1016/0304-3975(91)90051-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Kutylowski91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Kutylowski90,
  author       = {Miroslaw Kutylowski},
  title        = {Remarks on Sorting and One-Way Multihead Finite Automata},
  journal      = {Inf. Process. Lett.},
  volume       = {36},
  number       = {4},
  pages        = {215--218},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90076-A},
  doi          = {10.1016/0020-0190(90)90076-A},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Kutylowski90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/Kutylowski90,
  author       = {Miroslaw Kutylowski},
  title        = {One-Way Multihead Finite Automata and 2-Bounded Languages},
  journal      = {Math. Syst. Theory},
  volume       = {23},
  number       = {2},
  pages        = {107--139},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF02090769},
  doi          = {10.1007/BF02090769},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/Kutylowski90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/KutylowskiLL90,
  author       = {Miroslaw Kutylowski and
                  Maciej Liskiewicz and
                  Krzysztof Lorys},
  title        = {Reversal Complexity Classes for Alternating Turing Machines},
  journal      = {{SIAM} J. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {207--221},
  year         = {1990},
  url          = {https://doi.org/10.1137/0219014},
  doi          = {10.1137/0219014},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/KutylowskiLL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/DietzfelbingerKR90,
  author       = {Martin Dietzfelbinger and
                  Miroslaw Kutylowski and
                  R{\"{u}}diger Reischuk},
  editor       = {Frank Thomson Leighton},
  title        = {Exact Time Bounds for Computing Boolean Functions on PRAMs Without
                  Simultaneous Writes},
  booktitle    = {Proceedings of the 2nd Annual {ACM} Symposium on Parallel Algorithms
                  and Architectures, {SPAA} '90, Island of Crete, Greece, July 2-6,
                  1990},
  pages        = {125--135},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/97444.97678},
  doi          = {10.1145/97444.97678},
  timestamp    = {Wed, 21 Nov 2018 12:27:44 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/DietzfelbingerKR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/Kutzlowski90,
  author       = {Miroslaw Kutylowski},
  editor       = {Christian Choffrut and
                  Thomas Lengauer},
  title        = {Computational Power of One-Way Multihead Finite Automata},
  booktitle    = {{STACS} 90, 7th Annual Symposium on Theoretical Aspects of Computer
                  Science, Rouen, France, February 22-24, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {415},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-52282-4\_41},
  doi          = {10.1007/3-540-52282-4\_41},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/Kutzlowski90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsyml/Kutylowski88,
  author       = {Miroslaw Kutylowski},
  title        = {Finite Automata, Real Time Processes and Counting Problems in Bounded
                  Arithmetics},
  journal      = {J. Symb. Log.},
  volume       = {53},
  number       = {1},
  pages        = {243--258},
  year         = {1988},
  url          = {https://doi.org/10.1017/S0022481200029078},
  doi          = {10.1017/S0022481200029078},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsyml/Kutylowski88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Kutylowski87,
  author       = {Miroslaw Kutylowski},
  title        = {A Generalized Grzegorczyk Hierarchy and Low Complexity Classes},
  journal      = {Inf. Comput.},
  volume       = {72},
  number       = {2},
  pages        = {133--149},
  year         = {1987},
  url          = {https://doi.org/10.1016/0890-5401(87)90044-7},
  doi          = {10.1016/0890-5401(87)90044-7},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Kutylowski87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlq/KutylowskiL87,
  author       = {Miroslaw Kutylowski and
                  Krzysztof Lorys},
  title        = {A Note on "{\(\mathscr{E}\)}},
  journal      = {Math. Log. Q.},
  volume       = {33},
  number       = {2},
  pages        = {115--121},
  year         = {1987},
  url          = {https://doi.org/10.1002/malq.19870330205},
  doi          = {10.1002/MALQ.19870330205},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlq/KutylowskiL87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlq/Kutylowski86,
  author       = {Miroslaw Kutylowski},
  title        = {Restricted Collection and Comprehension Schemata in Weak Set Theories},
  journal      = {Math. Log. Q.},
  volume       = {32},
  number       = {35-36},
  pages        = {545--549},
  year         = {1986},
  url          = {https://doi.org/10.1002/malq.19860323502},
  doi          = {10.1002/MALQ.19860323502},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mlq/Kutylowski86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics