default search action
BibTeX records: Pawel Szalachowski
@article{DBLP:journals/tifs/TianLLSZ24, author = {Yangguang Tian and Bowen Liu and Yingjiu Li and Pawel Szalachowski and Jianying Zhou}, title = {Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1756--1766}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3340917}, doi = {10.1109/TIFS.2023.3340917}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TianLLSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/AlangotSDMGAL23, author = {Bithin Alangot and Pawel Szalachowski and Tien Tuan Anh Dinh and Souhail Meftah and Jeff Ivanos Gana and Khin Mi Mi Aung and Zengpeng Li}, title = {Decentralized Identity Authentication with Auditability and Privacy}, journal = {Algorithms}, volume = {16}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.3390/a16010004}, doi = {10.3390/A16010004}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithms/AlangotSDMGAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TanSLSZ23, author = {Teik Guan Tan and Vishal Sharma and Zengpeng Li and Pawel Szalachowski and Jianying Zhou}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {ZKBdf: {A} ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {530--550}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_29}, doi = {10.1007/978-3-031-41181-6\_29}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/acns/TanSLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/HomoliakLS23, author = {Ivan Homoliak and Zengpeng Li and Pawel Szalachowski}, title = {BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023}, pages = {297--306}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/Blockchain60715.2023.00054}, doi = {10.1109/BLOCKCHAIN60715.2023.00054}, timestamp = {Thu, 22 Feb 2024 20:11:26 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/HomoliakLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/distribledger/SharmaLSTZ22, author = {Vishal Sharma and Zengpeng Li and Pawel Szalachowski and Teik Guan Tan and Jianying Zhou}, title = {Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution}, journal = {Distributed Ledger Technol. Res. Pract.}, volume = {1}, number = {1}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.1145/3547300}, doi = {10.1145/3547300}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/distribledger/SharmaLSTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TanSZ22, author = {Teik Guan Tan and Pawel Szalachowski and Jianying Zhou}, title = {Challenges of post-quantum digital signing in real-world applications: a survey}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {4}, pages = {937--952}, year = {2022}, url = {https://doi.org/10.1007/s10207-022-00587-6}, doi = {10.1007/S10207-022-00587-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TanSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SharmaS022, author = {Vishal Sharma and Pawel Szalachowski and Jianying Zhou}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Evaluating Blockchain Protocols with Abusive Modeling}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {109--122}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3497757}, doi = {10.1145/3488932.3497757}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SharmaS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/TanSZ22, author = {Teik Guan Tan and Pawel Szalachowski and Jianying Zhou}, title = {Securing Password Authentication for Web-based Applications}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022.9888923}, doi = {10.1109/DSC54232.2022.9888923}, timestamp = {Wed, 05 Oct 2022 15:16:45 +0200}, biburl = {https://dblp.org/rec/conf/desec/TanSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tokenomics/MalkhiS22, author = {Dahlia Malkhi and Pawel Szalachowski}, editor = {Yackolley Amoussou{-}Guenou and Aggelos Kiayias and Marianne Verdier}, title = {Maximal Extractable Value {(MEV)} Protection on a {DAG}}, booktitle = {4th International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2022, December 12-13, 2022, Paris, France}, series = {OASIcs}, volume = {110}, pages = {6:1--6:17}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/OASIcs.Tokenomics.2022.6}, doi = {10.4230/OASICS.TOKENOMICS.2022.6}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/tokenomics/MalkhiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-00940, author = {Dahlia Malkhi and Pawel Szalachowski}, title = {Maximal Extractable Value {(MEV)} Protection on a {DAG}}, journal = {CoRR}, volume = {abs/2208.00940}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.00940}, doi = {10.48550/ARXIV.2208.00940}, eprinttype = {arXiv}, eprint = {2208.00940}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-00940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanSLSZ22, author = {Teik Guan Tan and Vishal Sharma and Zengpeng Li and Pawel Szalachowski and Jianying Zhou}, title = {ZKBdf: {A} ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1373}, year = {2022}, url = {https://eprint.iacr.org/2022/1373}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TanSLSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/HomoliakVRHSS21, author = {Ivan Homoliak and Sarad Venugopalan and Dani{\"{e}}l Reijsbergen and Qingze Hum and Richard Schumi and Pawel Szalachowski}, title = {The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {23}, number = {1}, pages = {341--390}, year = {2021}, url = {https://doi.org/10.1109/COMST.2020.3033665}, doi = {10.1109/COMST.2020.3033665}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/HomoliakVRHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiYSZ21, author = {Zengpeng Li and Zheng Yang and Pawel Szalachowski and Jianying Zhou}, title = {Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {2}, pages = {844--859}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3008773}, doi = {10.1109/JIOT.2020.3008773}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiYSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSLXSF21, author = {Chunpeng Ge and Willy Susilo and Zhe Liu and Jinyue Xia and Pawel Szalachowski and Liming Fang}, title = {Secure Keyword Search and Data Sharing Mechanism for Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2787--2800}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2963978}, doi = {10.1109/TDSC.2020.2963978}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GeSLXSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Szalachowski21, author = {Pawel Szalachowski}, title = {Password-Authenticated Decentralized Identities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4801--4810}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3116429}, doi = {10.1109/TIFS.2021.3116429}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Szalachowski21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AlangotRVSY21, author = {Bithin Alangot and Dani{\"{e}}l Reijsbergen and Sarad Venugopalan and Pawel Szalachowski and Kiat Seng Yeo}, title = {Decentralized and Lightweight Approach to Detect Eclipse Attacks on Proof of Work Blockchains}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {1659--1672}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3069502}, doi = {10.1109/TNSM.2021.3069502}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/AlangotRVSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/LiuSZ21, author = {Bowen Liu and Pawel Szalachowski and Jianying Zhou}, title = {A First Look into DeFi Oracles}, booktitle = {{IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2021, Online Event, August 23-26, 2021}, pages = {39--48}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DAPPS52256.2021.00010}, doi = {10.1109/DAPPS52256.2021.00010}, timestamp = {Fri, 04 Nov 2022 16:07:31 +0100}, biburl = {https://dblp.org/rec/conf/dappcon/LiuSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ReijsbergenSKL021, author = {Dani{\"{e}}l Reijsbergen and Pawel Szalachowski and Junming Ke and Zengpeng Li and Jianying Zhou}, title = {LaKSA: {A} Probabilistic Proof-of-Stake Protocol}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/laksa-a-probabilistic-proof-of-stake-protocol/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ReijsbergenSKL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-13543, author = {Yangguang Tian and Bowen Liu and Yingjiu Li and Pawel Szalachowski and Jianying Zhou}, title = {Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting}, journal = {CoRR}, volume = {abs/2104.13543}, year = {2021}, url = {https://arxiv.org/abs/2104.13543}, eprinttype = {arXiv}, eprint = {2104.13543}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-13543.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02012, author = {Zengpeng Li and Teik Guan Tan and Pawel Szalachowski and Vishal Sharma and Jianying Zhou}, title = {Post-Quantum {VRF} and its Applications in Future-Proof Blockchain System}, journal = {CoRR}, volume = {abs/2109.02012}, year = {2021}, url = {https://arxiv.org/abs/2109.02012}, eprinttype = {arXiv}, eprint = {2109.02012}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-07316, author = {Vishal Sharma and Zengpeng Li and Pawel Szalachowski and Teik Guan Tan and Jianying Zhou}, title = {Reinshard: An optimally sharded dual-blockchain for concurrency resolution}, journal = {CoRR}, volume = {abs/2109.07316}, year = {2021}, url = {https://arxiv.org/abs/2109.07316}, eprinttype = {arXiv}, eprint = {2109.07316}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-07316.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlashwaliSM20, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Exploring {HTTPS} security inconsistencies: {A} cross-regional perspective}, journal = {Comput. Secur.}, volume = {97}, pages = {101975}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101975}, doi = {10.1016/J.COSE.2020.101975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlashwaliSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TianLLS020, author = {Yangguang Tian and Nan Li and Yingjiu Li and Pawel Szalachowski and Jianying Zhou}, title = {Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {813--828}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427247}, doi = {10.1145/3427228.3427247}, timestamp = {Mon, 21 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TianLLS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/HomoliakBHHBS20, author = {Ivan Homoliak and Dominik Breitenbacher and Ondrej Hujnak and Pieter H. Hartel and Alexander Binder and Pawel Szalachowski}, title = {SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets}, booktitle = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies, New York, NY, USA, October 21-23, 2020}, pages = {145--162}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419614.3423257}, doi = {10.1145/3419614.3423257}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aft/HomoliakBHHBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/AlangotRVS20, author = {Bithin Alangot and Dani{\"{e}}l Reijsbergen and Sarad Venugopalan and Pawel Szalachowski}, title = {Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2020, Rhodes, Greece, November 2-6, 2020}, pages = {337--342}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/Blockchain50366.2020.00049}, doi = {10.1109/BLOCKCHAIN50366.2020.00049}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/AlangotRVS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/GuarnizoAS20, author = {Juan Guarnizo and Bithin Alangot and Pawel Szalachowski}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Jiamou Liu}, title = {SmartWitness: {A} Proactive Software Transparency System using Smart Contracts}, booktitle = {{BSCI} '20: Proceedings of the 2nd {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {117--129}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384943.3409428}, doi = {10.1145/3384943.3409428}, timestamp = {Wed, 21 Oct 2020 12:23:01 +0200}, biburl = {https://dblp.org/rec/conf/bsci/GuarnizoAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuSS20, author = {Bowen Liu and Pawel Szalachowski and Siwei Sun}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {506--518}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384716}, doi = {10.1145/3320269.3384716}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuSS20, author = {Bowen Liu and Siwei Sun and Pawel Szalachowski}, title = {{SMACS:} Smart Contract Access Control Service}, booktitle = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020}, pages = {221--232}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSN48063.2020.00039}, doi = {10.1109/DSN48063.2020.00039}, timestamp = {Wed, 05 Aug 2020 14:09:10 +0200}, biburl = {https://dblp.org/rec/conf/dsn/LiuSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KeS0X20, author = {Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {Formalizing Bitcoin Crashes with Universally Composable Security}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {334--351}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_19}, doi = {10.1007/978-3-030-62974-8\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KeS0X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-06127, author = {Bowen Liu and Pawel Szalachowski and Siwei Sun}, title = {Fail-safe Watchtowers and Short-lived Assertions for Payment Channels}, journal = {CoRR}, volume = {abs/2003.06127}, year = {2020}, url = {https://arxiv.org/abs/2003.06127}, eprinttype = {arXiv}, eprint = {2003.06127}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-06127.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-07495, author = {Bowen Liu and Siwei Sun and Pawel Szalachowski}, title = {{SMACS:} Smart Contract Access Control Service}, journal = {CoRR}, volume = {abs/2003.07495}, year = {2020}, url = {https://arxiv.org/abs/2003.07495}, eprinttype = {arXiv}, eprint = {2003.07495}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-07495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13259, author = {Pawel Szalachowski}, title = {SmartCert: Redesigning Digital Certificates with Smart Contracts}, journal = {CoRR}, volume = {abs/2003.13259}, year = {2020}, url = {https://arxiv.org/abs/2003.13259}, eprinttype = {arXiv}, eprint = {2003.13259}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-04377, author = {Bowen Liu and Pawel Szalachowski}, title = {A First Look into DeFi Oracles}, journal = {CoRR}, volume = {abs/2005.04377}, year = {2020}, url = {https://arxiv.org/abs/2005.04377}, eprinttype = {arXiv}, eprint = {2005.04377}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-04377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-13339, author = {Ivan Homoliak and Pawel Szalachowski}, title = {Aquareum: {A} Centralized Ledger Enhanced with Blockchain and Trusted Computing}, journal = {CoRR}, volume = {abs/2005.13339}, year = {2020}, url = {https://arxiv.org/abs/2005.13339}, eprinttype = {arXiv}, eprint = {2005.13339}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-13339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01427, author = {Dani{\"{e}}l Reijsbergen and Pawel Szalachowski and Junming Ke and Zengpeng Li and Jianying Zhou}, title = {ProPoS: {A} Probabilistic Proof-of-Stake Protocol}, journal = {CoRR}, volume = {abs/2006.01427}, year = {2020}, url = {https://arxiv.org/abs/2006.01427}, eprinttype = {arXiv}, eprint = {2006.01427}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01427.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02287, author = {Bithin Alangot and Dani{\"{e}}l Reijsbergen and Sarad Venugopalan and Pawel Szalachowski}, title = {Decentralized Lightweight Detection of Eclipse Attacks on Bitcoin Clients}, journal = {CoRR}, volume = {abs/2007.02287}, year = {2020}, url = {https://arxiv.org/abs/2007.02287}, eprinttype = {arXiv}, eprint = {2007.02287}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-15881, author = {Pawel Szalachowski}, title = {Password-authenticated Decentralized Identities}, journal = {CoRR}, volume = {abs/2007.15881}, year = {2020}, url = {https://arxiv.org/abs/2007.15881}, eprinttype = {arXiv}, eprint = {2007.15881}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-15881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-09112, author = {Sarad Venugopalan and Ivan Homoliak and Zengpeng Li and Pawel Szalachowski}, title = {BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting}, journal = {CoRR}, volume = {abs/2010.09112}, year = {2020}, url = {https://arxiv.org/abs/2010.09112}, eprinttype = {arXiv}, eprint = {2010.09112}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-09112.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10170, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew P. Martin}, title = {Exploring {HTTPS} Security Inconsistencies: {A} Cross-Regional Perspective}, journal = {CoRR}, volume = {abs/2010.10170}, year = {2020}, url = {https://arxiv.org/abs/2010.10170}, eprinttype = {arXiv}, eprint = {2010.10170}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10170.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06257, author = {Teik Guan Tan and Pawel Szalachowski and Jianying Zhou}, title = {Securing Password Authentication for Web-based Applications}, journal = {CoRR}, volume = {abs/2011.06257}, year = {2020}, url = {https://arxiv.org/abs/2011.06257}, eprinttype = {arXiv}, eprint = {2011.06257}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlashwaliSM20, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Exploring {HTTPS} Security Inconsistencies: {A} Cross-Regional Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2020}, url = {https://eprint.iacr.org/2020/079}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlashwaliSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KeSZX20, author = {Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu}, title = {Formalizing Bitcoin Crashes with Universally Composable Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2020}, url = {https://eprint.iacr.org/2020/1098}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KeSZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GeZXSS19, author = {Chunpeng Ge and Lu Zhou and Jinyue Xia and Pawel Szalachowski and Chunhua Su}, title = {A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {137266--137278}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942651}, doi = {10.1109/ACCESS.2019.2942651}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GeZXSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/PappasLRSP19, author = {Christos Pappas and Taeho Lee and Raphael M. Reischuk and Pawel Szalachowski and Adrian Perrig}, title = {Network Transparency for Better Internet Security}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {27}, number = {5}, pages = {2028--2042}, year = {2019}, url = {https://doi.org/10.1109/TNET.2019.2937132}, doi = {10.1109/TNET.2019.2937132}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/PappasLRSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AlashwaliSM19, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Does "www." Mean Better Transport Layer Security?}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {23:1--23:7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339277}, doi = {10.1145/3339252.3339277}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AlashwaliSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/HomoliakVHS19, author = {Ivan Homoliak and Sarad Venugopalan and Qingze Hum and Pawel Szalachowski}, title = {A Security Reference Architecture for Blockchains}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {390--397}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00060}, doi = {10.1109/BLOCKCHAIN.2019.00060}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/HomoliakVHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/Szalachowski19, author = {Pawel Szalachowski}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Debiao He and Sheng Wen}, title = {{EVLA:} Extended-Validation Certificates with Location Assurance}, booktitle = {Proceedings of the 2019 {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand, July 8, 2019}, pages = {73--79}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327960.3332379}, doi = {10.1145/3327960.3332379}, timestamp = {Thu, 08 Aug 2019 14:16:11 +0200}, biburl = {https://dblp.org/rec/conf/bsci/Szalachowski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuarnizoS19, author = {Juan Guarnizo and Pawel Szalachowski}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {{PDFS:} Practical Data Feed Service for Smart Contracts}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {767--789}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_37}, doi = {10.1007/978-3-030-29959-0\_37}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GuarnizoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/GeSS19, author = {Chunpeng Ge and Siwei Sun and Pawel Szalachowski}, title = {Permission less Block chains and Secure Logging}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2019, Seoul, Korea (South), May 14-17, 2019}, pages = {56--60}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BLOC.2019.8751306}, doi = {10.1109/BLOC.2019.8751306}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/GeSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/Szalachowski19, author = {Pawel Szalachowski}, title = {{PADVA:} {A} Blockchain-Based {TLS} Notary Service}, booktitle = {25th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2019, Tianjin, China, December 4-6, 2019}, pages = {836--843}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICPADS47876.2019.00124}, doi = {10.1109/ICPADS47876.2019.00124}, timestamp = {Tue, 04 Feb 2020 13:36:54 +0100}, biburl = {https://dblp.org/rec/conf/icpads/Szalachowski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KeSZXY19, author = {Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu and Zheng Yang}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {{IBWH:} An Intermittent Block Withholding Attack with Optimal Mining Reward Rate}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {3--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_1}, doi = {10.1007/978-3-030-30215-3\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KeSZXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AlashwaliSM19, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Towards Forward Secure Internet Traffic}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {341--364}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_17}, doi = {10.1007/978-3-030-37228-6\_17}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AlashwaliSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/GeZXSS19, author = {Chunpeng Ge and Lu Zhou and Jinyue Xia and Pawel Szalachowski and Chunhua Su}, editor = {Weizhi Meng and Steven Furnell}, title = {A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {139--151}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_11}, doi = {10.1007/978-981-15-0758-8\_11}, timestamp = {Mon, 22 Feb 2021 16:00:52 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/GeZXSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SzalachowskiRHS19, author = {Pawel Szalachowski and Dani{\"{e}}l Reijsbergen and Ivan Homoliak and Siwei Sun}, editor = {Nadia Heninger and Patrick Traynor}, title = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {819--836}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/szalachowski}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/SzalachowskiRHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-03954, author = {Chunpeng Ge and Siwei Sun and Pawel Szalachowski}, title = {Permissionless Blockchains and Secure Logging}, journal = {CoRR}, volume = {abs/1903.03954}, year = {2019}, url = {http://arxiv.org/abs/1903.03954}, eprinttype = {arXiv}, eprint = {1903.03954}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-03954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-06898, author = {Ivan Homoliak and Sarad Venugopalan and Qingze Hum and Pawel Szalachowski}, title = {A Security Reference Architecture for Blockchains}, journal = {CoRR}, volume = {abs/1904.06898}, year = {2019}, url = {http://arxiv.org/abs/1904.06898}, eprinttype = {arXiv}, eprint = {1904.06898}, timestamp = {Thu, 25 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-06898.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09655, author = {Pawel Szalachowski and Dani{\"{e}}l Reijsbergen and Ivan Homoliak and Siwei Sun}, title = {StrongChain: Transparent and Collaborative Proof-of-Work Consensus}, journal = {CoRR}, volume = {abs/1905.09655}, year = {2019}, url = {http://arxiv.org/abs/1905.09655}, eprinttype = {arXiv}, eprint = {1905.09655}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-06505, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Does "www." Mean Better Transport Layer Security?}, journal = {CoRR}, volume = {abs/1906.06505}, year = {2019}, url = {http://arxiv.org/abs/1906.06505}, eprinttype = {arXiv}, eprint = {1906.06505}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-06505.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00231, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Towards Forward Secure Internet Traffic}, journal = {CoRR}, volume = {abs/1907.00231}, year = {2019}, url = {http://arxiv.org/abs/1907.00231}, eprinttype = {arXiv}, eprint = {1907.00231}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-09775, author = {Ivan Homoliak and Sarad Venugopalan and Qingze Hum and Dani{\"{e}}l Reijsbergen and Richard Schumi and Pawel Szalachowski}, title = {The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses}, journal = {CoRR}, volume = {abs/1910.09775}, year = {2019}, url = {http://arxiv.org/abs/1910.09775}, eprinttype = {arXiv}, eprint = {1910.09775}, timestamp = {Sun, 27 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-09775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlashwaliSM19, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Towards Forward Secure Internet Traffic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {821}, year = {2019}, url = {https://eprint.iacr.org/2019/821}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlashwaliSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlashwaliSM19a, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Does "www." Mean Better Transport Layer Security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2019}, url = {https://eprint.iacr.org/2019/941}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlashwaliSM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BasinCKPSS18, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, title = {Design, Analysis, and Implementation of {ARPKI:} An Attack-Resilient Public-Key Infrastructure}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {3}, pages = {393--408}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601610}, doi = {10.1109/TDSC.2016.2601610}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BasinCKPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeePSP18, author = {Taeho Lee and Christos Pappas and Pawel Szalachowski and Adrian Perrig}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Towards Sustainable Evolution for the {TLS} Public-Key Infrastructure}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {637--649}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196520}, doi = {10.1145/3196494.3196520}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeePSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AlashwaliS18, author = {Eman Salem Alashwali and Pawel Szalachowski}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {{DSTC:} DNS-Based Strict {TLS} Configurations}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {93--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_9}, doi = {10.1007/978-3-030-12143-3\_9}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/AlashwaliS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvcbt/Szalachowski18, author = {Pawel Szalachowski}, title = {(Short Paper) Towards More Reliable Bitcoin Timestamps}, booktitle = {Crypto Valley Conference on Blockchain Technology, {CVCBT} 2018, Zug, Switzerland, June 20-22, 2018}, pages = {101--104}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CVCBT.2018.00018}, doi = {10.1109/CVCBT.2018.00018}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/cvcbt/Szalachowski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/DykcikCSP18, author = {Lukasz Dykcik and Laurent Chuat and Pawel Szalachowski and Adrian Perrig}, editor = {Hanghang Tong and Zhenhui Jessie Li and Feida Zhu and Jeffrey Yu}, title = {BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure}, booktitle = {2018 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops, Singapore, Singapore, November 17-20, 2018}, pages = {105--114}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDMW.2018.00022}, doi = {10.1109/ICDMW.2018.00022}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/DykcikCSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/ChiaHHMPRSS18, author = {Vincent Chia and Pieter H. Hartel and Qingze Hum and Sebastian Ma and Georgios Piliouras and Dani{\"{e}}l Reijsbergen and Mark van Staalduinen and Pawel Szalachowski}, title = {Rethinking Blockchain Security: Position Paper}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1273--1280}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00222}, doi = {10.1109/CYBERMATICS\_2018.2018.00222}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ithings/ChiaHHMPRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/VarshneyS18, author = {Gaurav Varshney and Pawel Szalachowski}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {155--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_9}, doi = {10.1007/978-3-030-01704-0\_9}, timestamp = {Fri, 11 Jan 2019 16:16:24 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/VarshneyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09028, author = {Pawel Szalachowski}, title = {Towards More Reliable Bitcoin Timestamps}, journal = {CoRR}, volume = {abs/1803.09028}, year = {2018}, url = {http://arxiv.org/abs/1803.09028}, eprinttype = {arXiv}, eprint = {1803.09028}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09028.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00875, author = {Pawel Szalachowski}, title = {Blockchain-based {TLS} Notary Service}, journal = {CoRR}, volume = {abs/1804.00875}, year = {2018}, url = {http://arxiv.org/abs/1804.00875}, eprinttype = {arXiv}, eprint = {1804.00875}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-04274, author = {Gaurav Varshney and Pawel Szalachowski}, title = {A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet}, journal = {CoRR}, volume = {abs/1804.04274}, year = {2018}, url = {http://arxiv.org/abs/1804.04274}, eprinttype = {arXiv}, eprint = {1804.04274}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-04274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-04358, author = {Vincent Chia and Pieter H. Hartel and Qingze Hum and Sebastian Ma and Georgios Piliouras and Dani{\"{e}}l Reijsbergen and Mark van Staalduinen and Pawel Szalachowski}, title = {Rethinking Blockchain Security: Position Paper}, journal = {CoRR}, volume = {abs/1806.04358}, year = {2018}, url = {http://arxiv.org/abs/1806.04358}, eprinttype = {arXiv}, eprint = {1806.04358}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-04358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-06641, author = {Juan Guarnizo and Pawel Szalachowski}, title = {{PDFS:} Practical Data Feed Service for Smart Contracts}, journal = {CoRR}, volume = {abs/1808.06641}, year = {2018}, url = {http://arxiv.org/abs/1808.06641}, eprinttype = {arXiv}, eprint = {1808.06641}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-06641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05674, author = {Eman Salem Alashwali and Pawel Szalachowski}, title = {{DSTC:} DNS-based Strict {TLS} Configurations}, journal = {CoRR}, volume = {abs/1809.05674}, year = {2018}, url = {http://arxiv.org/abs/1809.05674}, eprinttype = {arXiv}, eprint = {1809.05674}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05674.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-09544, author = {Lukasz Dykcik and Laurent Chuat and Pawel Szalachowski and Adrian Perrig}, title = {BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure}, journal = {CoRR}, volume = {abs/1809.09544}, year = {2018}, url = {http://arxiv.org/abs/1809.09544}, eprinttype = {arXiv}, eprint = {1809.09544}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-09544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-03598, author = {Ivan Homoliak and Dominik Breitenbacher and Alexander Binder and Pawel Szalachowski}, title = {An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets}, journal = {CoRR}, volume = {abs/1812.03598}, year = {2018}, url = {http://arxiv.org/abs/1812.03598}, eprinttype = {arXiv}, eprint = {1812.03598}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-03598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/PerrigSRC17, author = {Adrian Perrig and Pawel Szalachowski and Raphael M. Reischuk and Laurent Chuat}, title = {{SCION:} {A} Secure Internet Architecture}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67080-5}, doi = {10.1007/978-3-319-67080-5}, isbn = {978-3-319-67079-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/PerrigSRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BarreraCPRS17, author = {David Barrera and Laurent Chuat and Adrian Perrig and Raphael M. Reischuk and Pawel Szalachowski}, title = {The {SCION} internet architecture}, journal = {Commun. {ACM}}, volume = {60}, number = {6}, pages = {56--65}, year = {2017}, url = {https://doi.org/10.1145/3085591}, doi = {10.1145/3085591}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BarreraCPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MatsumotoRSKP17, author = {Stephanos Matsumoto and Raphael M. Reischuk and Pawel Szalachowski and Tiffany Hyun{-}Jin Kim and Adrian Perrig}, title = {Authentication Challenges in a Global Environment}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {1}, pages = {1:1--1:34}, year = {2017}, url = {https://doi.org/10.1145/3007208}, doi = {10.1145/3007208}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MatsumotoRSKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SzalachowskiP17, author = {Pawel Szalachowski and Adrian Perrig}, editor = {Aggelos Kiayias}, title = {Short Paper: On Deployment of DNS-Based Security Enhancements}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {424--433}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_24}, doi = {10.1007/978-3-319-70972-7\_24}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/SzalachowskiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SzalachowskiP17, author = {Pawel Szalachowski and Adrian Perrig}, title = {Short Paper: On Deployment of DNS-based Security Enhancements}, journal = {CoRR}, volume = {abs/1702.05311}, year = {2017}, url = {http://arxiv.org/abs/1702.05311}, eprinttype = {arXiv}, eprint = {1702.05311}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SzalachowskiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZSW16, author = {Yao Zhang and Zhiming Zheng and Pawel Szalachowski and Qi Wang}, title = {Collusion-resilient broadcast encryption based on dual-evolving one-way function trees}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3633--3645}, year = {2016}, url = {https://doi.org/10.1002/sec.1570}, doi = {10.1002/SEC.1570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/LeePBSP16, author = {Taeho Lee and Christos Pappas and David Barrera and Pawel Szalachowski and Adrian Perrig}, editor = {Athina Markopoulou and Michalis Faloutsos and Vyas Sekar and Dejan Kostic}, title = {Source Accountability with Domain-brokered Privacy}, booktitle = {Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA, December 12-15, 2016}, pages = {345--358}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2999572.2999581}, doi = {10.1145/2999572.2999581}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/LeePBSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SzalachowskiCP16, author = {Pawel Szalachowski and Laurent Chuat and Adrian Perrig}, title = {{PKI} Safety Net {(PKISN):} Addressing the Too-Big-to-Be-Revoked Problem of the {TLS} Ecosystem}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {407--422}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.38}, doi = {10.1109/EUROSP.2016.38}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SzalachowskiCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SzalachowskiCLP16, author = {Pawel Szalachowski and Laurent Chuat and Taeho Lee and Adrian Perrig}, title = {{RITM:} Revocation in the Middle}, booktitle = {36th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2016, Nara, Japan, June 27-30, 2016}, pages = {189--200}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDCS.2016.91}, doi = {10.1109/ICDCS.2016.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SzalachowskiCLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LeePSP16, author = {Taeho Lee and Christos Pappas and Pawel Szalachowski and Adrian Perrig}, title = {Communication based on per-packet One-Time Addresses}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784450}, doi = {10.1109/ICNP.2016.7784450}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LeePSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BasescuRSPZHKU16, author = {Cristina Basescu and Raphael M. Reischuk and Pawel Szalachowski and Adrian Perrig and Yao Zhang and Hsu{-}Chun Hsiao and Ayumu Kubota and Jumpei Urakawa}, title = {{SIBRA:} Scalable Internet Bandwidth Reservation Architecture}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/sibra-scalable-internet-bandwidth-reservation-architecture.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BasescuRSPZHKU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SzalachowskiCP16, author = {Pawel Szalachowski and Laurent Chuat and Adrian Perrig}, title = {{PKI} Safety Net {(PKISN):} Addressing the Too-Big-to-Be-Revoked Problem of the {TLS} Ecosystem}, journal = {CoRR}, volume = {abs/1601.03874}, year = {2016}, url = {http://arxiv.org/abs/1601.03874}, eprinttype = {arXiv}, eprint = {1601.03874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SzalachowskiCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SzalachowskiCLP16, author = {Pawel Szalachowski and Laurent Chuat and Taeho Lee and Adrian Perrig}, title = {{RITM:} Revocation in the Middle}, journal = {CoRR}, volume = {abs/1604.08490}, year = {2016}, url = {http://arxiv.org/abs/1604.08490}, eprinttype = {arXiv}, eprint = {1604.08490}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/SzalachowskiCLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeePBSP16, author = {Taeho Lee and Christos Pappas and David Barrera and Pawel Szalachowski and Adrian Perrig}, title = {Source Accountability with Domain-brokered Privacy}, journal = {CoRR}, volume = {abs/1610.00461}, year = {2016}, url = {http://arxiv.org/abs/1610.00461}, eprinttype = {arXiv}, eprint = {1610.00461}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LeePBSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SzalachowskiK15, author = {Pawel Szalachowski and Tiffany Hyun{-}Jin Kim}, title = {Secure broadcast in distributed networks with strong adversaries}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3739--3750}, year = {2015}, url = {https://doi.org/10.1002/sec.1296}, doi = {10.1002/SEC.1296}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SzalachowskiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SzalachowskiP15, author = {Pawel Szalachowski and Adrian Perrig}, editor = {Richard Chow and G{\"{o}}kay Saldamli}, title = {Lightweight Protection of Group Content Distribution}, booktitle = {Proceedings of the 1st {ACM} Workshop on IoT Privacy, Trust, and Security, IoTPTS@AsiaCCS 2015, Singapore, Republic of Singapore, April 14, 2015}, pages = {35--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732209.2732215}, doi = {10.1145/2732209.2732215}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SzalachowskiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChuatSPLM15, author = {Laurent Chuat and Pawel Szalachowski and Adrian Perrig and Ben Laurie and Eran Messeri}, title = {Efficient gossip protocols for verifying the consistency of Certificate logs}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {415--423}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346853}, doi = {10.1109/CNS.2015.7346853}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ChuatSPLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/MatsumotoSP15, author = {Stephanos Matsumoto and Pawel Szalachowski and Adrian Perrig}, editor = {Juan Caballero and Michalis Polychronakis}, title = {Deployment challenges in log-based {PKI} enhancements}, booktitle = {Proceedings of the Eighth European Workshop on System Security, EuroSec 2015, Bordeaux, France, April 21, 2015}, pages = {1:1--1:7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2751323.2751324}, doi = {10.1145/2751323.2751324}, timestamp = {Tue, 06 Nov 2018 16:58:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/MatsumotoSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MatsumotoRSKP15, author = {Stephanos Matsumoto and Raphael M. Reischuk and Pawel Szalachowski and Tiffany Hyun{-}Jin Kim and Adrian Perrig}, title = {Designing a Global Authentication Infrastructure}, journal = {CoRR}, volume = {abs/1506.03392}, year = {2015}, url = {http://arxiv.org/abs/1506.03392}, eprinttype = {arXiv}, eprint = {1506.03392}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MatsumotoRSKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarreraRSP15, author = {David Barrera and Raphael M. Reischuk and Pawel Szalachowski and Adrian Perrig}, title = {{SCION} Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks}, journal = {CoRR}, volume = {abs/1508.01651}, year = {2015}, url = {http://arxiv.org/abs/1508.01651}, eprinttype = {arXiv}, eprint = {1508.01651}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BarreraRSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LeeSBPLW15, author = {Taeho Lee and Pawel Szalachowski and David Barrera and Adrian Perrig and Heejo Lee and David Watrin}, title = {Bootstrapping Real-world Deployment of Future Internet Architectures}, journal = {CoRR}, volume = {abs/1508.02240}, year = {2015}, url = {http://arxiv.org/abs/1508.02240}, eprinttype = {arXiv}, eprint = {1508.02240}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LeeSBPLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BasescuRSPZHKU15, author = {Cristina Basescu and Raphael M. Reischuk and Pawel Szalachowski and Adrian Perrig and Yao Zhang and Hsu{-}Chun Hsiao and Ayumu Kubota and Jumpei Urakawa}, title = {{SIBRA:} Scalable Internet Bandwidth Reservation Architecture}, journal = {CoRR}, volume = {abs/1510.02696}, year = {2015}, url = {http://arxiv.org/abs/1510.02696}, eprinttype = {arXiv}, eprint = {1510.02696}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BasescuRSPZHKU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChuatSPLM15, author = {Laurent Chuat and Pawel Szalachowski and Adrian Perrig and Ben Laurie and Eran Messeri}, title = {Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs}, journal = {CoRR}, volume = {abs/1511.01514}, year = {2015}, url = {http://arxiv.org/abs/1511.01514}, eprinttype = {arXiv}, eprint = {1511.01514}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChuatSPLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinCKPSS14, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ARPKI:} Attack Resilient Public-Key Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {382--393}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660298}, doi = {10.1145/2660267.2660298}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinCKPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SzalachowskiMP14, author = {Pawel Szalachowski and Stephanos Matsumoto and Adrian Perrig}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {PoliCert: Secure and Flexible {TLS} Certificate Management}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {406--417}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660355}, doi = {10.1145/2660267.2660355}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SzalachowskiMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/KonorskiPKKCS13, author = {Jerzy Konorski and Piotr Pacyna and Grzegorz Kolaczek and Zbigniew Kotulski and Krzysztof Cabaj and Pawel Szalachowski}, title = {Theory and implementation of a virtualisation level Future Internet defence in depth architecture}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {1}, number = {3/4}, pages = {274--299}, year = {2013}, url = {https://doi.org/10.1504/IJTMCC.2013.056431}, doi = {10.1504/IJTMCC.2013.056431}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/KonorskiPKKCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/SzalachowskiK12, author = {Pawel Szalachowski and Zbigniew Kotulski}, title = {One-Time Broadcast Encryption Schemes in Distributed Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {8}, year = {2012}, url = {https://doi.org/10.1155/2012/536718}, doi = {10.1155/2012/536718}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/SzalachowskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/HeSKFMPM12, author = {Xiaobing He and Pawel Szalachowski and Zbigniew Kotulski and Nikos Fotiou and Giannis F. Marias and George C. Polyzos and Hermann de Meer}, title = {Energy-aware Key Management in Mobile Wireless Sensor Networks}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {83--96}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0022-2}, doi = {10.2478/V10065-012-0022-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/HeSKFMPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/KonorskiPKKCS12, author = {Jerzy Konorski and Piotr Pacyna and Grzegorz Kolaczek and Zbigniew Kotulski and Krzysztof Cabaj and Pawel Szalachowski}, editor = {Sabu M. Thampi and Albert Y. Zomaya and Thorsten Strufe and Jos{\'{e}} M. Alcaraz Calero and Tony Thomas}, title = {A Virtualization-Level Future Internet Defense-in-Depth Architecture}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - International Conference, {SNDS} 2012, Trivandrum, India, October 11-12, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {335}, pages = {283--292}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34135-9\_29}, doi = {10.1007/978-3-642-34135-9\_29}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/snds/KonorskiPKKCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spects/SzalachowskiK12, author = {Pawel Szalachowski and Zbigniew Kotulski}, title = {Enhancing the Oakley key agreement protocol with secure time information}, booktitle = {International Symposium on Performance Evaluation of Computer {\&} Telecommunication Systems, {SPECTS} 2012, Genoa, Italy, July 8-11, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/freeabs\_all.jsp?arnumber=6267031}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spects/SzalachowskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/SzalachowskiK11, author = {Pawel Szalachowski and Zbigniew Kotulski}, title = {Secure time information in the internet key exchange protocol}, journal = {Ann. {UMCS} Informatica}, volume = {11}, number = {3}, pages = {41--56}, year = {2011}, url = {https://doi.org/10.2478/v10065-011-0019-2}, doi = {10.2478/V10065-011-0019-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/SzalachowskiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/SzalachowskiKK11, author = {Pawel Szalachowski and Zbigniew Kotulski and Bogdan Ksiezopolski}, editor = {Andrzej Kwiecien and Piotr Gaj and Piotr Stera}, title = {Secure Position-Based Selecting Scheme for {WSN} Communication}, booktitle = {Computer Networks - 18th Conference, {CN} 2011, Ustron, Poland, June 14-18, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {160}, pages = {386--397}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21771-5\_42}, doi = {10.1007/978-3-642-21771-5\_42}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cn/SzalachowskiKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SzalachowskiKK10, author = {Pawel Szalachowski and Bogdan Ksiezopolski and Zbigniew Kotulski}, title = {CMAC, {CCM} and {GCM/GMAC:} Advanced modes of operation of symmetric block ciphers in wireless sensor networks}, journal = {Inf. Process. Lett.}, volume = {110}, number = {7}, pages = {247--251}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.01.004}, doi = {10.1016/J.IPL.2010.01.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SzalachowskiKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/KsiezopolskiSK10, author = {Bogdan Ksiezopolski and Pawel Szalachowski and Zbigniew Kotulski}, editor = {Andrzej Kwiecien and Piotr Gaj and Piotr Stera}, title = {{SPOT:} Optimization Tool for Network Adaptable Security}, booktitle = {Computer Networks - 17th Conference, {CN} 2010, Ustro{\'{n}}, Poland, June 15-19, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {79}, pages = {269--279}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13861-4\_28}, doi = {10.1007/978-3-642-13861-4\_28}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cn/KsiezopolskiSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/SzalachowskiKK10, author = {Pawel Szalachowski and Bogdan Ksiezopolski and Zbigniew Kotulski}, editor = {Andrzej Kwiecien and Piotr Gaj and Piotr Stera}, title = {On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks}, booktitle = {Computer Networks - 17th Conference, {CN} 2010, Ustro{\'{n}}, Poland, June 15-19, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {79}, pages = {280--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13861-4\_29}, doi = {10.1007/978-3-642-13861-4\_29}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cn/SzalachowskiKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/SzalachowskiKK09, author = {Pawel Szalachowski and Bogdan Ksiezopolski and Zbigniew Kotulski}, title = {Optimization of {TLS} security protocol using the adaptable security model}, journal = {Ann. {UMCS} Informatica}, volume = {9}, number = {1}, pages = {59--75}, year = {2009}, url = {https://doi.org/10.2478/v10065-009-0005-0}, doi = {10.2478/V10065-009-0005-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/SzalachowskiKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/KsiezopolskiKS09, author = {Bogdan Ksiezopolski and Zbigniew Kotulski and Pawel Szalachowski}, editor = {Andrzej Kwiecien and Piotr Gaj and Piotr Stera}, title = {Adaptive Approach to Network Security}, booktitle = {Computer Networks - 16th Conference, {CN} 2009, Wis{\l}a, Poland, June 16-20, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {39}, pages = {233--241}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02671-3\_28}, doi = {10.1007/978-3-642-02671-3\_28}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cn/KsiezopolskiKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.