![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Tomasz Hyla
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Tomasz Hyla
, Natalia Wawrzyniak
:
Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code. CCS 2024: 4943-4945 - 2023
- [j7]Jerzy Pejas
, Tomasz Hyla
, Wojciech Zabierowski
:
Revocable Signature Scheme with Implicit and Explicit Certificates. Entropy 25(9): 1315 (2023) - [c18]Tomasz Hyla, Sebastian Byczyk:
Source code protection against unauthorised copying and analysis in IoT devices. HICSS 2023: 6895-6903 - 2022
- [e2]Michal Choras, Ryszard S. Choras, Marek Kurzynski, Pawel Trajdos, Jerzy Pejas
, Tomasz Hyla
:
Progress in Image Processing, Pattern Recognition and Communication Systems - Proceedings of the Conference (CORES, IP&C, ACS), Virtual Event / Bydgoszcz, Poland, June 28-30, 2021. Lecture Notes in Networks and Systems 255, Springer 2022, ISBN 978-3-030-81522-6 [contents] - 2021
- [c17]Tomasz Hyla
, Jerzy Pejas
:
Anonymous Group Signature Scheme with Publicly Verifiable General Access Structure. CISIM 2021: 140-155 - [c16]Tomasz Hyla, Natalia Wawrzyniak:
Identification of Vessels on Inland Waters Using Low-Quality Video Streams. HICSS 2021: 1-10 - 2020
- [j6]Tomasz Hyla
, Jerzy Pejas
:
Long-term verification of signatures based on a blockchain. Comput. Electr. Eng. 81: 106523 (2020) - [c15]Tomasz Hyla, Luiza Fabisiak:
Measuring Cyber Security Awareness within Groups of Medical Professionals in Poland. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j5]Tomasz Hyla
, Jerzy Pejas
:
eHealth Integrity Model Based on Permissioned Blockchain. Future Internet 11(3): 76 (2019) - [j4]Natalia Wawrzyniak
, Tomasz Hyla
, Adrian Popik:
Vessel Detection and Tracking Method Based on Video Surveillance. Sensors 19(23): 5230 (2019) - [c14]Tomasz Hyla, Jerzy Pejas:
eHealth Integrity Model Based on a Permissioned Blockchain. CCC 2019: 172-177 - [c13]Tomasz Hyla
, Natalia Wawrzyniak
:
Ships Detection on Inland Waters Using Video Surveillance System. CISIM 2019: 39-49 - [c12]Witold Kazimierski
, Natalia Wawrzyniak
, Marta Wlodarczyk-Sielicka
, Tomasz Hyla
, Izabela Bodus-Olkowska
, Grzegorz Zaniewicz
:
Mobile River Navigation for Smart Cities. ICIST 2019: 591-604 - [e1]Jerzy Pejas
, Imed El Fray
, Tomasz Hyla
, Janusz Kacprzyk:
Advances in Soft and Hard Computing, Proceedings of the International Conference on Advanced Computer Systems, ACS 2018, Miȩdzyzdroje, Poland, 24-26 September 2018. Advances in Intelligent Systems and Computing 889, Springer 2019, ISBN 978-3-030-03313-2 [contents] - 2018
- [j3]Tomasz Hyla
, Jerzy Pejas
:
Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack. IEEE Access 6: 50154-50168 (2018) - 2017
- [j2]Tomasz Hyla
, Jerzy Pejas
:
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates. Comput. J. 60(4): 457-475 (2017) - [c11]Tomasz Hyla
, Jerzy Pejas
:
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. CISIM 2017: 638-651 - 2016
- [c10]Tomasz Hyla
, Jerzy Pejas
:
Non-standard Certification Models for Pairing Based Cryptography. ACS 2016: 167-181 - [c9]Tomasz Hyla, Jerzy Pejas
:
A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy. CISIM 2016: 647-660 - [c8]Tomasz Hyla, Jerzy Pejas
:
Secure Outsourced Bilinear Pairings Computation for Mobile Devices. NSS 2016: 519-529 - 2014
- [c7]Tomasz Hyla, Natalia Wawrzyniak
, Witold Kazimierski
:
Model of Collaborative Data Exchange for Inland Mobile Navigation. ACS 2014: 435-444 - [c6]Imed El Fray, Tomasz Hyla, Wlodzimierz Chocianowicz:
Protection Profile for Secure Sensitive Information System on Mobile Devices. CISIM 2014: 636-650 - [c5]Tomasz Hyla, Witold Mackow, Jerzy Pejas:
Implicit and Explicit Certificates-Based Encryption Scheme. CISIM 2014: 651-666 - [c4]Imed El Fray
, Tomasz Hyla, Miroslaw Kurkowski
, Witold Mackow, Jerzy Pejas
:
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices. CSS 2014: 153-165 - [c3]Natalia Wawrzyniak
, Tomasz Hyla:
Managing Depth Information Uncertainty in Inland Mobile Navigation Systems. RSEISP 2014: 343-350 - 2013
- [c2]Tomasz Hyla, Jerzy Pejas:
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture. CISIM 2013: 190-205 - 2012
- [j1]Tomasz Hyla, Imed El Fray
, Witold Mackow, Jerzy Pejas
:
Long-term preservation of digital signatures for multiple groups of related documents. IET Inf. Secur. 6(3): 219-227 (2012) - [c1]Tomasz Hyla, Jerzy Pejas:
Certificate-Based Encryption Scheme with General Access Structure. CISIM 2012: 41-55
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint