Privacy-Aware Identity Management. Encyclopedia of Big Data Technologies 2019.
M. Kutyłowski, P. Błaśkiewicz
Pseudonymous Signature Schemes in Advances in Cyber Security: Principles, Techniques, and Applications pp 185-255,
P. Błaśkiewicz, L. Hanzlik, K. Kluczniak, Ł. Krzywiecki, M. Kutyłowski, M. Słowik, M. Wszoła
A Jamming-Resilient MAC-layer Device Identification for Internet of Things,
P. Błaśkiewicz, J. Cichoń, J. Lemiesz, M. Kutyłowski, M. Zawada, K. Napierała, M. Panek, S. Strzyz, 2016
[arxiv]
λ-persistant CSMA: a radio-channel access protocol,
P. Błaśkiewicz, J. Cichoń, J. Lemiesz , M. Kutyłowski, M. Zawada, S. Stefanski, K. Chrobak, 2016,
[arxiv]
One- and Multi-Pass Long-Hop Routing for Wireless Network,
P. Błaśkiewicz, J. Cichoń, J. Lemiesz, M. Kutyłowski, M. Zawada, 2016,
[arxiv]
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits,
P. Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga, ISPEC 2016: 209-223
Ghost Train for Anonymous Communication,
P. Błaśkiewicz, M. Kutylowski, J. Lemiesz, M. Sulkowska, SpaCCS 2016 , LNCS (Springer-Verlag, 2016)
An Application of GPU Parallel Computing to Power Flow Calculation in HVDC Networks,
P. Błaśkiewicz, M. Zawada, P. Balcerek, P. Dawidowski: PDP 2015: 635-641
Lightweight Protocol for Trusted Spontaneous Communication,
P. Błaśkiewicz, M. Klonowski, M.Kutylowski, P. Syga, INTRUST 2014, LNCS 9473 (Springer-Verlag, 2015), 1-15
Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems,
P. Błaśkiewicz, M. Klonowski, K. Majcher, P. Syga. CyberC 2013: 89-96
How to Make Operating Systems for Smart Cards Open,
P. Błaśkiewicz, P.Kubiak, M.Kutylowski, Bulcrypt 2012 ,
Extreme Propagation in an Ad-hoc Radio Network - Revisited,
P.Błaśkiewicz, M.Kutylowski, W.Wodo, K.Wolny, ICCCI 2012, LNCS 7654 (Springer-Verlag, 2012), 142-151
Security and trust in sensor networks. In: Theoretical aspects of distributed computing in sensor networks / Sotiris Nikoletseas, José D.P. Rolim (eds.). Berlin ; Heidelberg : Springer, cop. 2011. s. 697-739.
P.Błaśkiewicz, M.Kutyłowski
RFID Electronic Visa with Personalized Verification,
P. Błaśkiewicz, J. Cichoń, M. Kutyłowski, K. Majcher, Radio Frequency Identification Systems Security, IOS Press 2011, Cryptology and Information Security Series, (RFIDsec'11 Asia, 6th - 8th April, 2011, Wuxi, China), vol. 6, 2011, p. 81-95
Self-keying Identification Mechanism for Small Devices,
K.Barczynńki, P. Błaśkiewicz, M. Klonowski, M. Kutylowski, STA 2011 , Communications in Computer and Information Science, vol. 186, (Springer-Verlag 2011), 37-44
RFID Electronic Visa with Personalized Verification,
P. Błaśkiewicz, J. Cichoń, M. Kutyłowski, K. Majcher, RFIDsec Asia 2011 , In: Radio Frequency Identification Systems Security, IOS Press 2011, Cryptology and Information Security Series, vol. 6, pp. 81-95
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems,
M. Kutyłowski, P. Błaśkiewicz, Ł. Krzywiecki, P. Kubiak, W. Paluszynski, M. Tabor. BIS (Workshops) 2011: 270-281
Digital Signatures for e-Government -- a Long-Term Security Architecture,
P. Błaśkiewicz, P. Kubiak, M. Kutylowski, E-FORENSIC 2010 , LNICST, Forensicsin Telecommunications, Information, and Multimedia Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 56, 2011, 256-270
Two-Head Dragon Protocol. Preventing Cloning of Signature Keys,
P. Błaśkiewicz, P. Kubiak, M. Kutylowski, INTRUST 2010 , LNCS 6802 (Springer-Verlag, 2011), 173-188,
Security and Trust in Sensor Networks. Theoretical Aspects of Distributed Computing in Sensor Networks,
P. Błaśkiewicz, M. Kutyłowski, (2011) pp. 697-739
Group Key Establishment. In Distributed self-organized societies of tiny artefacts : design and implementation / ed. by Ioannis Chatzigiannakis, Paul Spirakis. [Raleigh, N.C. : Lulu Publishers, 2011]. s. 39-45.
P. Błaśkiewcz, M. Koza, T. Strumiński
RFID System with Allowers,
P Błaśkiewicz, Z. Gołębiewski, M, Klonowski, K. Majcher, PerCom Workshops 2009