Security protocols analysis including various time parameters S Szymoniak Mathematical Biosciences and Engineering 18 (2), 1136-1153, 2021 | 21 | 2021 |
Timed analysis of security protocols S Szymoniak, O Siedlecka-Lamch, M Kurkowski Information Systems Architecture and Technology: Proceedings of 37th …, 2017 | 21 | 2017 |
Key agreement and authentication protocols in the Internet of Things: A survey S Szymoniak, S Kesar Applied Sciences 13 (1), 404, 2022 | 19 | 2022 |
ProToc—An universal language for security protocols specifications A Grosser, M Kurkowski, J Piątkowski, S Szymoniak Soft Computing in Computer and Information Science, 237-248, 2015 | 15* | 2015 |
User authentication protocol based on the location factor for a mobile environment M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ... IEEE Access 10, 16439-16455, 2022 | 14 | 2022 |
Amelia—A new security protocol for protection against false links S Szymoniak Computer Communications 179, 73-81, 2021 | 14 | 2021 |
Timed models of security protocols including delays in the network S Szymoniak, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015 | 13 | 2015 |
Sat and smt-based verification of security protocols including time aspects S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ... Sensors 21 (9), 3055, 2021 | 12 | 2021 |
A fast method for security protocols verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski Computer Information Systems and Industrial Management: 18th International …, 2019 | 12 | 2019 |
On some time aspects in security protocols analysis S Szymoniak, O Siedlecka-Lamch, M Kurkowski Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018 | 11 | 2018 |
Versectis-an agent based model checker for security protocols AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ... Proceedings of the 19th International Conference on Autonomous Agents and …, 2020 | 7 | 2020 |
Efficient verification of security protocols time properties using SMT solvers AM Zbrzezny, S Szymoniak, M Kurkowski International Joint Conference: 12th International Conference on …, 2020 | 7 | 2020 |
SAT-based verification of NSPK protocol including delays in the network S Szymoniak, O Siedlecka-Lamch, M Kurkowski 2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017 | 7 | 2017 |
Using a security protocol to protect against false links S Szymoniak Moving technology ethics at the forefront of society, organisations and …, 2021 | 6 | 2021 |
Practical approach in verification of security systems using satisfiability modulo theories AM Zbrzezny, S Szymoniak, M Kurkowski Logic Journal of the IGPL 30 (2), 289-300, 2022 | 4 | 2022 |
Towards Most Efficient Method for Untimed Security Protocols Verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray | 4 | 2020 |
Securing Meetings in D2D IoT Systems S Szymoniak, O Siedlecka-Lamch ETHICOMP 2022 31, 2022 | 3 | 2022 |
How to Be on Time with Security Protocol? S Szymoniak Societal Challenges in the Smart Society, 225-238, 2020 | 3 | 2020 |
SMT solvers as efficient tools for automatic time properties verification of security protocols AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski 2019 20th International Conference on Parallel and Distributed Computing …, 2019 | 3 | 2019 |
Kaochow protocol timed analysis S Szymoniak Advances in Soft and Hard Computing, 346-357, 2019 | 3 | 2019 |