Search results for: Łukasz Krzywiecki
Computer Communications > 2016 > 93 > C > 52-67
Lecture Notes in Business Information Processing > Business Information Systems Workshops > LIT Workshop > 270-281
Lecture Notes in Computer Science > Mathematical Foundations of Computer Science 2008 > Contributed Papers > 431-442
Lecture Notes in Computer Science > Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques > Contributed Talks of RANDOM > 409-421
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Session 2: Physically Unclonable Functions > 48-62
Lecture Notes in Computer Science > Information Security and Cryptology > Cryptographic Schemes > 130-143
Lecture Notes in Computer Science > Information Security and Cryptology > Privacy and Algebraic Cryptanalysis > 373-386
Lecture Notes in Computer Science > Trust and Trustworthy Computing > Technical Strand—Full Papers > 109-123
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 96-109
Wireless Networks > 2017 > 23 > 4 > 1045-1062
Wireless Networks > 2016 > 22 > 3 > 879-896