Handbook of finite state based models and applications J Wang CRC press, 2012 | 50 | 2012 |
Multifactor authentication protocol in a mobile environment M Bartłomiejczyk, M Kurkowski IEEE Access 7, 157185-157199, 2019 | 44 | 2019 |
Modern cryptography primer C Kościelny, M Kurkowski, M Srebrny Springer Verlag, 2013 | 37 | 2013 |
Applying timed automata to model checking of security protocols M Kurkowski, W Penczek Handbook of Finite State Based Models and Applications, 235-266, 2016 | 25 | 2016 |
Verifying security protocols modelled by networks of automata M Kurkowski, W Penczek Fundamenta Informaticae 79 (3-4), 453-471, 2007 | 22 | 2007 |
Timed analysis of security protocols S Szymoniak, O Siedlecka-Lamch, M Kurkowski Information Systems Architecture and Technology: Proceedings of 37th …, 2017 | 21 | 2017 |
Probabilistic model checking of security protocols without perfect cryptography assumption O Siedlecka-Lamch, M Kurkowski, J Piatkowski Computer Networks: 23rd International Conference, CN 2016, Brunów, Poland …, 2016 | 16 | 2016 |
User authentication protocol based on the location factor for a mobile environment M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ... IEEE Access 10, 16439-16455, 2022 | 14 | 2022 |
A fast method for security protocols verification O Siedlecka-Lamch, S Szymoniak, M Kurkowski Computer Information Systems and Industrial Management: 18th International …, 2019 | 13 | 2019 |
Timed models of security protocols including delays in the network S Szymoniak, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015 | 13 | 2015 |
Formalne metody weryfikacji własności protokołów zabezpieczających w sieciach komputerowych M Kurkowski Akademicka Oficyna Wydawnicza Exit, 2013 | 13 | 2013 |
Sat and smt-based verification of security protocols including time aspects S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ... Sensors 21 (9), 3055, 2021 | 12 | 2021 |
A quantifier-free first-order knowledge logic of authentication M Kurkowski, M Srebrny Fundamenta Informaticae 72 (1-3), 263-282, 2006 | 12 | 2006 |
M/G/n/(0, V) Erlang queueing system with non-homogeneous customers, non-identical servers and limited memory space O Tikhonenko, M Ziółkowski, M Kurkowski Bulletin of the Polish Academy of Sciences Technical Sciences, 489-500-489-500, 2019 | 11 | 2019 |
On some time aspects in security protocols analysis S Szymoniak, O Siedlecka-Lamch, M Kurkowski Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018 | 11 | 2018 |
Towards parallel direct SAT-based cryptanalysis P Dudek, M Kurkowski, M Srebrny Parallel Processing and Applied Mathematics: 9th International Conference …, 2012 | 11 | 2012 |
Sat-based verification of security protocols via translation to networks of automata M Kurkowski, W Penczek, A Zbrzezny Model Checking and Artificial Intelligence: 4th Workshop, MoChArt IV, Riva …, 2007 | 11 | 2007 |
A new mathematical model for analytical risk assessment and prediction in IT systems IE Fray, M Kurkowski, J Pejaś, W Maćków Control and Cybernetics 41 (1), 241-268, 2012 | 10 | 2012 |
A new effective approach for modeling and verification of security protocols M Kurkowski, O Siedlecka-Lamch, H Piech Proceedings of CS&P 12, 191-202, 2012 | 9 | 2012 |
Verifying timed security protocols via translation to timed automata M Kurkowski, W Penczek This three-volume booklet contains the papers presented at CS&P’08, the 17th …, 2009 | 9 | 2009 |