


default search action
Annales UMCS, Informatica, Volume 11
Volume 11, Number 1, March 2011
- Damian Borycki:
A strategy in sports betting with the nearest neighbours search and genetic algorithms. 7-13 - Przemyslaw Krysztowiak:
The database of interval orders difficult for the jump number minimizing algorithms. 15-22 - Agnieszka Polak:
A mesh algorithm for principal quadratic forms. 23-31 - Jakub Swacha
:
Comparative evaluation of performance-boosting tools for Python. 33-41 - Miroslaw Zajac:
Use of convolution and filtration to extract information from the DCM graphic files. 43-54 - Aliaksandr Chychuryn:
Simulation of the algorithms and their visualization forthe solutions to the restricted problems of the cosmic dynamics of the fourteen bodies with three rings. 55-65 - Miroslaw Hajder, Pawel Dymora:
A novel approach to fault tolerant multichannel networks designing problems. 67-77 - Tomasz Ordysinski:
Ontology of e-learning applications. 79-87 - Jakub Swacha
, Karolina Muszynska
:
Python and C#: a comparative analysis fromsStudents' perspective. 89-101
Volume 11, Number 2, June 2011
- Michal Misztal:
Differential cryptanalysis of PP-1 cipher. 9-24 - Michal Trojnara:
Evolution of the StreamHash hash function family. 25-36 - Anna Grocholewska-Czurylo:
Cryptographic properties of modified AES-like S-boxes. 37-48 - Jakub Derbisz:
Methods of encrypting monotonic access structures. 49-60 - Wojciech Oszywa, Rafal Gliwa:
Combining message encryption and authentication. 61-79 - Abderezak Touzene, Vasyl Ustimenko, Marwa AlRaissi, Imene Boudelioua:
Performance of algebraic graphs based stream-ciphers using large finite fields. 81-93 - Vasyl Ustimenko, Aneta Wróblewska:
On the key expansion of D(n, K)-based cryptographical algorithm. 95-111 - Maciej Grzeskowiak:
Generating elements of orders dividing p6 ± p5 + p4 ± p3 + p2 + p ± 1. 113-125 - Michal Klisowski, Urszula Romanczuk, Vasyl Ustimenko:
The implementation of cubic public keys based on a new family of algebraic graphs. 127-141 - Monika Polak, Vasyl Ustimenko:
On LDPC codes corresponding to affine parts of generalized polygons. 143-152
Volume 11, Number 3, September 2011
- Marek Klonowski:
Security problems of systems of extremely weak devices. 9-25 - Urszula Krawczyk, Piotr Sapiecha:
Effective reduction of cryptographic protocols specification for model-checking with Spin. 27-40 - Pawel Szalachowski, Zbigniew Kotulski
:
Secure time information in the internet key exchange protocol. 41-56 - Jaroslaw Wojtun
, Zbigniew Piotrowski, Piotr Gajewski:
Implementation of the DSSS method in watermarking digital audio objects. 57-70 - Grzegorz Orynczak, Zbigniew Kotulski
:
Non - cryptographic methods for improving real time transmission security and integrity. 71-86 - Dariusz Rzonca
, Andrzej Stec:
Small prototype acquisition system with secure remote data access. 87-100 - Krystian Baniak:
Group signature revocable anonymity scheme for network monitoring. 101-115 - Damian Rusinek, Bogdan Ksiezopolski
:
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2. 117-127 - Lukasz Papiez:
The security of the multi-application public transport card. 129-139 - Lukasz Kucharzewski, Zbigniew Kotulski
:
Mobile identity management system in heterogeneous wireless networks. 141-152
Volume 11, Number 4, December 2011
- Michal Luczaj:
Cryptographic software: vulnerabilities in implementations. 1-10 - Urszula Romanczuk, Vasyl Ustimenko:
On the key exchange with new cubical maps based on graphs. 11-19 - Marek Grzegorz Stochel:
Reliability of feedback fechanism based on root cause defect analysis - case study. 21-32 - Grzegorz Orynczak, Zbigniew Kotulski
:
Agent based infrastructure for real-time applications. 33-47 - Lukasz Radlinski:
A conceptual Bayesian net model for integrated software quality prediction. 49-60 - Bartosz A. Borucki, Krzysztof Nowinski, Michal Chlebiej, Andrzej Rutkowski, Pawel Adamczyk, Jacek Laskowski:
Automated geometric features evaluation method for normal foot skeleton model. 61-75 - Marcin W. Mastalerz:
Models of analysis for enterprise information technology strategy. 77-88 - Karolina Muszynska
:
Communication management in Polish IT Companies. 89-101 - Tomasz Komorowski:
Identification of e-learning services in higher education. 103-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.