


default search action
Annales UMCS, Informatica, Volume 11
Volume 11, Number 1, March 2011
- Damian Borycki:

A strategy in sports betting with the nearest neighbours search and genetic algorithms. 7-13 - Przemyslaw Krysztowiak:

The database of interval orders difficult for the jump number minimizing algorithms. 15-22 - Agnieszka Polak:

A mesh algorithm for principal quadratic forms. 23-31 - Jakub Swacha

:
Comparative evaluation of performance-boosting tools for Python. 33-41 - Miroslaw Zajac:

Use of convolution and filtration to extract information from the DCM graphic files. 43-54 - Aliaksandr Chychuryn:

Simulation of the algorithms and their visualization forthe solutions to the restricted problems of the cosmic dynamics of the fourteen bodies with three rings. 55-65 - Miroslaw Hajder, Pawel Dymora:

A novel approach to fault tolerant multichannel networks designing problems. 67-77 - Tomasz Ordysinski:

Ontology of e-learning applications. 79-87 - Jakub Swacha

, Karolina Muszynska
:
Python and C#: a comparative analysis fromsStudents' perspective. 89-101
Volume 11, Number 2, June 2011
- Michal Misztal:

Differential cryptanalysis of PP-1 cipher. 9-24 - Michal Trojnara:

Evolution of the StreamHash hash function family. 25-36 - Anna Grocholewska-Czurylo:

Cryptographic properties of modified AES-like S-boxes. 37-48 - Jakub Derbisz:

Methods of encrypting monotonic access structures. 49-60 - Wojciech Oszywa, Rafal Gliwa:

Combining message encryption and authentication. 61-79 - Abderezak Touzene, Vasyl Ustimenko, Marwa AlRaissi, Imene Boudelioua:

Performance of algebraic graphs based stream-ciphers using large finite fields. 81-93 - Vasyl Ustimenko, Aneta Wróblewska:

On the key expansion of D(n, K)-based cryptographical algorithm. 95-111 - Maciej Grzeskowiak:

Generating elements of orders dividing p6 ± p5 + p4 ± p3 + p2 + p ± 1. 113-125 - Michal Klisowski, Urszula Romanczuk, Vasyl Ustimenko:

The implementation of cubic public keys based on a new family of algebraic graphs. 127-141 - Monika Polak, Vasyl Ustimenko:

On LDPC codes corresponding to affine parts of generalized polygons. 143-152
Volume 11, Number 3, September 2011
- Marek Klonowski:

Security problems of systems of extremely weak devices. 9-25 - Urszula Krawczyk, Piotr Sapiecha:

Effective reduction of cryptographic protocols specification for model-checking with Spin. 27-40 - Pawel Szalachowski, Zbigniew Kotulski

:
Secure time information in the internet key exchange protocol. 41-56 - Jaroslaw Wojtun

, Zbigniew Piotrowski, Piotr Gajewski:
Implementation of the DSSS method in watermarking digital audio objects. 57-70 - Grzegorz Orynczak, Zbigniew Kotulski

:
Non - cryptographic methods for improving real time transmission security and integrity. 71-86 - Dariusz Rzonca

, Andrzej Stec:
Small prototype acquisition system with secure remote data access. 87-100 - Krystian Baniak:

Group signature revocable anonymity scheme for network monitoring. 101-115 - Damian Rusinek, Bogdan Ksiezopolski

:
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2. 117-127 - Lukasz Papiez:

The security of the multi-application public transport card. 129-139 - Lukasz Kucharzewski, Zbigniew Kotulski

:
Mobile identity management system in heterogeneous wireless networks. 141-152
Volume 11, Number 4, December 2011
- Michal Luczaj:

Cryptographic software: vulnerabilities in implementations. 1-10 - Urszula Romanczuk, Vasyl Ustimenko:

On the key exchange with new cubical maps based on graphs. 11-19 - Marek Grzegorz Stochel:

Reliability of feedback fechanism based on root cause defect analysis - case study. 21-32 - Grzegorz Orynczak, Zbigniew Kotulski

:
Agent based infrastructure for real-time applications. 33-47 - Lukasz Radlinski:

A conceptual Bayesian net model for integrated software quality prediction. 49-60 - Bartosz A. Borucki, Krzysztof Nowinski, Michal Chlebiej, Andrzej Rutkowski, Pawel Adamczyk, Jacek Laskowski:

Automated geometric features evaluation method for normal foot skeleton model. 61-75 - Marcin W. Mastalerz:

Models of analysis for enterprise information technology strategy. 77-88 - Karolina Muszynska

:
Communication management in Polish IT Companies. 89-101 - Tomasz Komorowski:

Identification of e-learning services in higher education. 103-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














