eHealth integrity model based on permissioned blockchain T Hyla, J Pejaś Future Internet 11 (3), 76, 2019 | 57 | 2019 |
Long-term verification of signatures based on a blockchain T Hyla, J Pejaś Computers & Electrical Engineering 81, 106523, 2020 | 31 | 2020 |
Implicit and explicit certificates-based encryption scheme T Hyla, W Maćków, J Pejaś Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 15 | 2014 |
A practical certificate and identity based encryption scheme and related security architecture T Hyla, J Pejaś IFIP International Conference on Computer Information Systems and Industrial …, 2013 | 13 | 2013 |
Certificate-based encryption scheme with general access structure T Hyla, J Pejaś Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012 | 13 | 2012 |
Biometrics, computer security systems and artificial intelligence applications K Saeed, J Pejas, R Mosdorf Springer Science & Business Media, 2007 | 12 | 2007 |
Sensitive information protection on mobile devices using general access structures T Hyla, J Pejaś, I El Fray, W Maćków, W Chocianowicz, M Szulga structure 16, 17, 2014 | 11 | 2014 |
Chaos-Based Information Security: Chaos-Based Block and Stream Ciphers in Information Security J Pejaś, A Skrobek Handbook of information and communication security, 91-128, 2010 | 10 | 2010 |
A Hess-like signature scheme based on implicit and explicit certificates T Hyla, J Pejaś The Computer Journal, 2016 | 9 | 2016 |
A new mathematical model for analytical risk assessment and prediction in IT systems IE Fray, M Kurkowski, J Pejaś, W Maćków Control and Cybernetics 41 (1), 241-268, 2012 | 9 | 2012 |
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems J Pejaś, M Zawalich Advances in Information Processing and Protection, 225-239, 2007 | 9 | 2007 |
Enhanced methods in computer security, biometric and artificial intelligence systems J Pejas, A Piegat Springer Science & Business Media, 2006 | 8 | 2006 |
Verification of Mutual Authentication Protocol for MobInfoSec System O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś Computer Information Systems and Industrial Management 9339, 461–474, 2015 | 7 | 2015 |
Long-term preservation of digital signatures for multiple groups of related documents T Hyla, I El Fray, W Maćków, J Pejaś IET Information Security 6 (3), 219-227, 2012 | 7 | 2012 |
Authentication protocol for software and hardware components in distributed electronic signature creation system J Pejaś, I El Fray, A Ruciński Przegląd Elektrotechniczny (Electrical Reviev) 10 (R.88), 79-84, 2012 | 7 | 2012 |
Biometrics, Computer Security Systems and Artificial Intelligence Applications R Mosdorf, J Pejas, K Saeed Springer, 2006 | 7 | 2006 |
A propositional logic for access control policy in distributed systems M Kurkowski, J Pejaś Artificial Intelligence and Security in Computing Systems: 9th International …, 2003 | 7 | 2003 |
Adaptive Control System for Steering the Ship Along the Desired Trajectory-Based on the Optimal Control and Filtering Theory W Chocianowicz, J Pejaś IFAC Proceedings Volumes 25 (3), 319-335, 1992 | 6 | 1992 |
Reversible data hiding scheme for images using gray code pixel value optimization J PejaŚ, Ł Cierocki Procedia Computer Science 192, 328-337, 2021 | 5 | 2021 |
Podpis elektroniczny-sposób działania, zastosowanie i korzyści A Kruk, P Matusiewicz, J Pejaś, A Ruciński, W Ślusarczyk Departament Przedsiębiorczości Ministerstwa Gospodarki, Warszawa, 2005 | 5 | 2005 |