default search action
Jerzy Pejas
Person information
- affiliation: West Pomeranian University of Technology, Szczecin, Poland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Jerzy Pejas, Tomasz Hyla, Wojciech Zabierowski:
Revocable Signature Scheme with Implicit and Explicit Certificates. Entropy 25(9): 1315 (2023) - [c15]Jerzy Pejas, Lukasz Cierocki:
A New Approach to the Architecture of Hybrid and Multilayer Steganographic Methods. CISIM 2023: 77-91 - 2022
- [c14]Jerzy Pejas, Lukasz Cierocki:
A Systematic Review of Highly Transparent Steganographic Methods for the Digital Audio. CISIM 2022: 63-77 - [e9]Michal Choras, Ryszard S. Choras, Marek Kurzynski, Pawel Trajdos, Jerzy Pejas, Tomasz Hyla:
Progress in Image Processing, Pattern Recognition and Communication Systems - Proceedings of the Conference (CORES, IP&C, ACS), Virtual Event / Bydgoszcz, Poland, June 28-30, 2021. Lecture Notes in Networks and Systems 255, Springer 2022, ISBN 978-3-030-81522-6 [contents] - 2021
- [c13]Tomasz Hyla, Jerzy Pejas:
Anonymous Group Signature Scheme with Publicly Verifiable General Access Structure. CISIM 2021: 140-155 - [c12]Jerzy Pejas, Lukasz Cierocki:
Reversible Data Hiding Scheme for Images Using Gray Code Pixel Value Optimization. KES 2021: 328-337 - 2020
- [j5]Tomasz Hyla, Jerzy Pejas:
Long-term verification of signatures based on a blockchain. Comput. Electr. Eng. 81: 106523 (2020)
2010 – 2019
- 2019
- [j4]Tomasz Hyla, Jerzy Pejas:
eHealth Integrity Model Based on Permissioned Blockchain. Future Internet 11(3): 76 (2019) - [c11]Tomasz Hyla, Jerzy Pejas:
eHealth Integrity Model Based on a Permissioned Blockchain. CCC 2019: 172-177 - [e8]Jerzy Pejas, Imed El Fray, Tomasz Hyla, Janusz Kacprzyk:
Advances in Soft and Hard Computing, Proceedings of the International Conference on Advanced Computer Systems, ACS 2018, Miȩdzyzdroje, Poland, 24-26 September 2018. Advances in Intelligent Systems and Computing 889, Springer 2019, ISBN 978-3-030-03313-2 [contents] - 2018
- [j3]Tomasz Hyla, Jerzy Pejas:
Demonstrably Secure Signature Scheme Resistant to k-Traitor Collusion Attack. IEEE Access 6: 50154-50168 (2018) - 2017
- [j2]Tomasz Hyla, Jerzy Pejas:
A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates. Comput. J. 60(4): 457-475 (2017) - [c10]Tomasz Hyla, Jerzy Pejas:
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. CISIM 2017: 638-651 - [e7]Shin-ya Kobayashi, Andrzej Piegat, Jerzy Pejas, Imed El Fray, Janusz Kacprzyk:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security, Selected, Revised Papers from the International Conference on Advanced Computer Systems, ACS 2016, Miȩdzyzdroje, Poland, 19-21 October 2016. Advances in Intelligent Systems and Computing 534, 2017, ISBN 978-3-319-48428-0 [contents] - 2016
- [c9]Tomasz Hyla, Jerzy Pejas:
Non-standard Certification Models for Pairing Based Cryptography. ACS 2016: 167-181 - [c8]Tomasz Hyla, Jerzy Pejas:
A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy. CISIM 2016: 647-660 - [c7]Tomasz Hyla, Jerzy Pejas:
Secure Outsourced Bilinear Pairings Computation for Mobile Devices. NSS 2016: 519-529 - 2015
- [c6]Olga Siedlecka-Lamch, Imed El Fray, Miroslaw Kurkowski, Jerzy Pejas:
Verification of Mutual Authentication Protocol for MobInfoSec System. CISIM 2015: 461-474 - [e6]Antoni Wilinski, Imed El Fray, Jerzy Pejas:
Soft Computing in Computer and Information Science, Revised Papers from the International Conference on Advanced Computer Systems, ACS 2014, Miȩdzyzdroje, Poland, 22-24 October 2014. Advances in Intelligent Systems and Computing 342, Springer 2015, ISBN 978-3-319-15146-5 [contents] - 2014
- [c5]Tomasz Hyla, Witold Mackow, Jerzy Pejas:
Implicit and Explicit Certificates-Based Encryption Scheme. CISIM 2014: 651-666 - [c4]Imed El Fray, Tomasz Hyla, Miroslaw Kurkowski, Witold Mackow, Jerzy Pejas:
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devices. CSS 2014: 153-165 - 2013
- [c3]Tomasz Hyla, Jerzy Pejas:
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture. CISIM 2013: 190-205 - 2012
- [j1]Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas:
Long-term preservation of digital signatures for multiple groups of related documents. IET Inf. Secur. 6(3): 219-227 (2012) - [c2]Tomasz Hyla, Jerzy Pejas:
Certificate-Based Encryption Scheme with General Access Structure. CISIM 2012: 41-55 - 2010
- [p9]Jerzy Pejas, Adrian Skrobek:
Chaos-Based Information Security. Handbook of Information and Communication Security 2010: 91-128
2000 – 2009
- 2007
- [p8]Jerzy Pejas, Michal Zawalich:
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. Advances in Information Processing and Protection 2007: 225-239 - [e5]Jerzy Pejas, Khalid Saeed:
Advances in Information Processing and Protection. Springer 2007, ISBN 978-0-387-73136-0 [contents] - 2006
- [e4]Khalid Saeed, Jerzy Pejas, Romuald Mosdorf:
Biometrics, Computer Security Systems and Artificial Intelligence Applications. Springer 2006, ISBN 978-0-387-36232-8 [contents] - 2005
- [p7]Imed El Fray, Jerzy Pejas:
Integrated Payment System for Public Key Infrastructure Services. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 47-59 - [p6]Jerzy Pejas, Imed El Fray:
Some methods of the analysis and risk assessment in the PKI system services providers. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 61-70 - [p5]Wlodzimierz Chocianowicz, Jerzy Pejas, Andrzej Rucinski:
The Proposal of Protocol for Electronic Signature Creation in Public Environment. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 113-124 - [p4]Stefan Berczynski, Yury A. Kravtsov, Jerzy Pejas, Adrian Skrobek:
Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters. Information Processing and Security Systems 2005: 135-148 - [p3]S. Berczynski, Yurii A. Kravtsov, Jerzy Pejas, E. D. Surovyatkina:
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 135-142 - [p2]Witold Macków, Jerzy Pejas:
Unauthorized servers for online certificates status verification. Information Processing and Security Systems 2005: 167-174 - [p1]Jerzy Pejas, Pawel Sukiennik:
Protocol for Certificate Based Access Control Policies Description Language. Information Processing and Security Systems 2005: 207-216 - [e3]Jerzy Pejas, Andrzej Piegat:
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer 2005, ISBN 978-1-4020-7776-0 [contents] - [e2]Khalid Saeed, Jerzy Pejas:
Information Processing and Security Systems. Springer 2005, ISBN 978-0-387-25091-5 [contents] - 2002
- [e1]Jerzy Soldek, Jerzy Pejas:
Advanced Computer Systems, Eighth International Conference, ACS 2001, Mielno, Poland, October 17-19, 2001 Proceedings. Springer 2002, ISBN 978-1-4613-4635-7 [contents] - 2001
- [c1]Jerzy Pejas:
Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems. ACS 2001: 371-382
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint