Multifactor authentication protocol in a mobile environment M Bartłomiejczyk, M Kurkowski IEEE Access 7, 157185-157199, 2019 | 44 | 2019 |
A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in information systems I El Fray Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012 | 33 | 2012 |
User authentication protocol based on the location factor for a mobile environment M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ... IEEE Access 10, 16439-16455, 2022 | 14 | 2022 |
Sensitive information protection on mobile devices using general access structures T Hyla, J Pejaś, I El Fray, W Maćków, W Chocianowicz, M Szulga structure 16, 17, 2014 | 11 | 2014 |
A new mathematical model for analytical risk assessment and prediction in IT systems IE Fray, M Kurkowski, J Pejaś, W Maćków Control and Cybernetics 41 (1), 241-268, 2012 | 10 | 2012 |
New xml signature scheme that is resistant to some attacks G Wawrzyniak, I El Fray IEEE Access 8, 35815-35831, 2020 | 7 | 2020 |
Verification of mutual authentication protocol for MobInfoSec system O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś Computer Information Systems and Industrial Management: 14th IFIP TC 8 …, 2015 | 7 | 2015 |
Long-term preservation of digital signatures for multiple groups of related documents T Hyla, I El Fray, W Maćków, J Pejaś IET Information Security 6 (3), 219-227, 2012 | 7 | 2012 |
Authentication protocol for software and hardware components in distributed electronic signature creation system J Pejaś, I El Fray, A Ruciński Prz Elektrotechniczn, 2012 | 7 | 2012 |
Securing event logs with blockchain for IoT M Kłos, I El Fray International Conference on Computer Information Systems and Industrial …, 2020 | 6 | 2020 |
Deniable File System--Application of Deniable Storage to Protection of Private Keys B Oler, I El Fray 6th International Conference on Computer Information Systems and Industrial …, 2007 | 6 | 2007 |
Towards Most Efficient Method for Untimed Security Protocols Verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray | 4 | 2020 |
Load-balanced Integrated Information Security Monitoring System. T Klasa, I El Fray FedCSIS (Communication Papers), 213-221, 2017 | 4 | 2017 |
Hard and Soft computing for artificial intelligence, multimedia and security S Kobayashi, A Piegat, J Pejaś, I El Fray, J Kacprzyk Springer International Publishing, 2017 | 4 | 2017 |
Protection profile for secure sensitive information system on mobile devices I El Fray, T Hyla, W Chocianowicz Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 4 | 2014 |
Practical authentication protocols for protecting and sharing sensitive information on mobile devices I El Fray, T Hyla, M Kurkowski, W Maćków, J Pejaś Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014 | 4 | 2014 |
Advances in Soft and Hard Computing J Pejaś, I El Fray, T Hyla, J Kacprzyk Springer, 2018 | 3 | 2018 |
The implementation of electronic document in transaction execution G Wawrzyniak, I El Fray Computer Information Systems and Industrial Management: 16th IFIP TC8 …, 2017 | 3 | 2017 |
An electronic document for distributed electronic services G Wawrzyniak, IE Fray Computer Information Systems and Industrial Management: 15th IFIP TC8 …, 2016 | 3 | 2016 |
Trust construction for security functions and mechanisms of IT system using results of risk analysis I El Fray Pomiary Automatyka Kontrola 55 (10), 893-843, 2009 | 3 | 2009 |