Follow
Jerzy Pejaś
Title
Cited by
Cited by
Year
eHealth integrity model based on permissioned blockchain
T Hyla, J Pejaś
Future Internet 11 (3), 76, 2019
542019
Long-term verification of signatures based on a blockchain
T Hyla, J Pejaś
Computers & Electrical Engineering 81, 106523, 2020
312020
Implicit and explicit certificates-based encryption scheme
T Hyla, W Maćków, J Pejaś
Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014
152014
A practical certificate and identity based encryption scheme and related security architecture
T Hyla, J Pejaś
IFIP International Conference on Computer Information Systems and Industrial …, 2013
132013
Certificate-based encryption scheme with general access structure
T Hyla, J Pejaś
Computer Information Systems and Industrial Management: 11th IFIP TC 8 …, 2012
132012
Biometrics, computer security systems and artificial intelligence applications
K Saeed, J Pejas, R Mosdorf
Springer Science & Business Media, 2007
122007
Sensitive information protection on mobile devices using general access structures
T Hyla, J Pejaś, I El Fray, W Maćków, W Chocianowicz, M Szulga
structure 16, 17, 2014
112014
Chaos-Based Information Security: Chaos-Based Block and Stream Ciphers in Information Security
J Pejaś, A Skrobek
Handbook of information and communication security, 91-128, 2010
102010
A Hess-like signature scheme based on implicit and explicit certificates
T Hyla, J Pejaś
The Computer Journal, 2016
92016
A new mathematical model for analytical risk assessment and prediction in IT systems
IE Fray, M Kurkowski, J Pejaś, W Maćków
Control and Cybernetics 41 (1), 241-268, 2012
92012
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems
J Pejaś, M Zawalich
Advances in Information Processing and Protection, 225-239, 2007
92007
Enhanced methods in computer security, biometric and artificial intelligence systems
J Pejas, A Piegat
Springer Science & Business Media, 2006
82006
Verification of Mutual Authentication Protocol for MobInfoSec System
O Siedlecka-Lamch, I El Fray, M Kurkowski, J Pejaś
Computer Information Systems and Industrial Management 9339, 461–474, 2015
72015
Long-term preservation of digital signatures for multiple groups of related documents
T Hyla, I El Fray, W Maćków, J Pejaś
IET Information Security 6 (3), 219-227, 2012
72012
Authentication protocol for software and hardware components in distributed electronic signature creation system
J Pejaś, I El Fray, A Ruciński
Przegląd Elektrotechniczny (Electrical Reviev) 10 (R.88), 79-84, 2012
72012
Biometrics, Computer Security Systems and Artificial Intelligence Applications
R Mosdorf, J Pejas, K Saeed
Springer, 2006
72006
A propositional logic for access control policy in distributed systems
M Kurkowski, J Pejaś
Artificial Intelligence and Security in Computing Systems: 9th International …, 2003
72003
Adaptive Control System for Steering the Ship Along the Desired Trajectory-Based on the Optimal Control and Filtering Theory
W Chocianowicz, J Pejaś
IFAC Proceedings Volumes 25 (3), 319-335, 1992
61992
Podpis elektroniczny-sposób działania, zastosowanie i korzyści
A Kruk, P Matusiewicz, J Pejaś, A Ruciński, W Ślusarczyk
Departament Przedsiębiorczości Ministerstwa Gospodarki, Warszawa, 2005
52005
The proposal of protocol for electronic signature creation in public environment
W Chocianowicz, J Pejaś, A Ruciński
Enhanced methods in computer security, biometric and artificial intelligence …, 2005
52005
The system can't perform the operation now. Try again later.
Articles 1–20