Research Interests
Education
Title course 1
Name of Institution · 2012
Title course 1
Name of Institution · 2012
Publications
Generalized framework for group testing: queries, feedbacks and adversaries
2022 · *Theoretical Computer Science*
New view on adversarial queueing on MAC
2021 · *IEEE Communications Letters*
Exact and efficient protective jamming in SINR-based wireless networks
2021 · *29th International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems : MASCOTS 2021, Houston, Texas, USA, November 3-5, 2021.*
Droppix: towards more realistic video fingerprinting
2020 · *ICETE 2020 : Proceedings of the 17th International Joint Conference on e-Business and Telecommunications : July 8-10, 2020, Lieusaint-Paris, France. Vol. 3, SECRYPT*
Fast size approximation of a radio network in beeping model
2020 · *Theoretical Computer Science*
Stronger trust and privacy in social networks via local cooperation
2020 · *Journal of Complex Networks*
Contention resolution on a restrained channel
2020 · *2020 IEEE 26th International Conference on Parallel and Distributed Systems : ICPADS 2020 : proceedings.*
How to save your face: a facial recognition method robust against image reconstruction
2020 · *2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).*
Universal encoding for provably irreversible data erasing
2019 · *ICETE 2019 : Proceedings of the 16th International Joint Conference on e-Business and Telecommunications : Prague, Czech Republic, 26-28 July 2019. Vol. 2, SECRYPT*
On practical privacy-preserving fault-tolerant data aggregation
2019 · *International Journal of Information Security*
Fault-tolerant parallel scheduling of arbitrary length jobs on a shared channel
2019 · *Fundamentals of computation theory : 22nd International Symposium, FCT 2019, Copenhagen, Denmark, August 12-14, 2019 : proceedings*
Performing partially ordered sets of jobs on a MAC in presence of adversarial crashes
2019 · *2019 IEEE 18th International Symposium on Network Computing and Applications (NCA)*
Ordered and delayed adversaries and how to work against them on a shared channel
2019 · *Distributed Computing*
Energy efficient adversarial routing in shared channels
2019 · *SPAA'19 : proceedings of the 31st ACM Symposium on Parallelism in Algorithms and Architectures, June 22-24, 2019, Phoenix, AZ, USA.*
How to obfuscate execution of protocols in an ad hoc radio network?
2019 · *Ad Hoc Networks*
User authorization based on hand geometry without special equipment
2018 · *Pattern Recognition*
Brief announcement: broadcast in radio networks time vs. energy tradeoffs :extended abstract
2018 · *PODC '18 : proceedings of the 2018 ACM Symposium on Principles of Distributed Computing.*
Light-weight and secure aggregation protocols based on Bloom filters
2018 · *Computers & Security*
On location hiding in distributed systems
2017 · *Structural information and communication complexity : 24th International Colloquium, SIROCCO 2017, Porquerolles, France, June 19-22, 2017 : revised selected papers*
Some remarks about tracing digital cameras - faster method and usable countermeasure
2017 · *ICETE 2017 : proceedings of the 14th International Joint Conference on e-Business and Telecommunications, Madrid - Spain, July 24-26, 2017. Vol. 4, SECRYPT*
Enhancing privacy for ad hoc systems with predeployment key distribution
2017 · *Ad Hoc Networks*
Towards extending noiseless privacy - dependent data and more practical approach
2017 · *ASIA CCS'17 : proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, April 2-6, 2017, Abu Dhabi, UAE.*
How to cooperate locally to improve global privacy in social networks? On amplification of privacy preserving data aggregation
2017 · *The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications : the 11th IEEE International Conference on Big Data Science and Engineering : the 14th IEEE International Conference on Embedded Software and Systems, 1-4 August 2017, Sydney, Australia : proceedings.*
Energy-optimal algorithms for computing aggregative functions in random networks
2016 · *Discrete Mathematics and Theoretical Computer Science*
Practical fault-tolerant data aggregation
2016 · *Applied Cryptography and Network Security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings*
Some remarks and ideas about monetization of sensitive data
2016 · *Data privacy management, and security assurance : 10th International Workshop, DPM 2015 and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015 : revised selected papers*
Approximating the size of a radio network in beeping model
2016 · *Structural information and communication complexity : 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July 19-21, 2016 : revised selected papers*
Distributed alarming in the on-duty and off-duty models
2016 · *IEEE-ACM Transactions on Networking*
Randomized mutual exclusion on a multiple access channel
2016 · *Distributed Computing*
Practical privacy preserving size approximation in distributed systems
2016 · *2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP 2016) : Prague, Czech Republic, 20-22, July 2016.*
Mixing in random digraphs with application to the forward-secure key evolution in wireless sensor networks
2015 · *ACM Transactions on Sensor Networks*
Lightweight protocol for trusted spontaneous communication
2015 · *Trusted Systems : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014 : revised selected papers*
Provable unlinkability against traffic analysis with low message overhead
2015 · *Journal of Cryptology*
On the dynamics of systems of urns
2015 · *Discrete Mathematics and Theoretical Computer Science*
Electing a leader in wireless networks quickly despite jamming
2015 · *SPAA'15 : proceedings of the 27th ACM Symposium on Parallelism in Algorithms and Architectures, June 13-15, 2015, Portland, OR, USA.*
On size approximation protocols in Multiple Access Channel - time vs. accuracy
2014
Editorial :
2014
k-Selection protocols from energetic complexity perspective
2014 · *International Journal of Networking and Computing*
Ad-hoc, mobile, and wireless network : 12th International Conference, ADHOC-NOW 2013, Wrocław, Poland, July 8-10, 2013 : proceedings
2013 · *Springer*
Countermeasures against sybil attacks in WSN based on proofs-of-work
2013 · *WiSec'13 : proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, April 17-19, 2013.*
k-Selection protocols from energetic complexity perspective
2013 · *2013 IEEE 27th International Symposium on Parallel & Distributed Processing Workshops and PhD Forum, 20-24 May 2013, Boston (MA) USA.*
On delta-method of moments and probabilistic sums
2013 · *2013 Proceedings of the Tenth Workshop on Analytic Algorithmics and Combinatorics (ANALCO) : New Orleans, Louisiana, USA, January 6, 2013*
Chameleon RFID and tracking prevention
2013 · *Radio Frequency Identification System Security : RFIDsec’13 Asia Workshop Proceedings*
Efficient and robust data aggregation using untrusted infrastructure
2013 · *Security of Information and Networks : proceedings of the Sixth International Conference on Security of Information and Networks (SIN 2013), 26-28 November 2013, Aksaray, Turkey*
Computing connected components
2013 · *Methods of acquiring and storing measurment data : monograph of the project POIG.01.03.01-02-002/08*
On asymptotics of the extremal statistics of a set of random variables
2013
Blocker-type methods for protecting customers' privacy in RFID systems
2013 · *2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Beijing, China, 10-12 October 2013.*
On flooding in the presence of random faults
2013 · *Fundamenta Informaticae*
Energy-efficient leader election protocols for single-hop radio networks
2013 · *ICPP 2013 International Conference on Parallel Processing : The 42nd Annual Conference, 1-4 October 2013, Lyon, France.*
Hidden bits approach for authentication in RFID systems
2013 · *Radio frequency identification : security and privacy issues : 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012 : revised selected papers*
Immune size approximation algorithms in ad hoc radio network
2012 · *Wireless Sensor Networks : 9th European Conference, EWSN 2012, Trento, Italy, February 15-17, 2012 : proceedings*
Some remarks on keystroke dynamics :global surveillance, retrieving information and simple countermeasures
2012 · *SECRYPT 2012 : proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July 2012.*
Obfuscated counting in single-hop radio network
2012 · *Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, ICPADS 2012 : 17-19 December 2012, Singapore.*
On lambda-alert problem
2012 · *Proceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium, 21-25 May 2012, Shanghai, China.*
Energy efficient alert in single-hop networks of extremely weak devices
2012 · *Theoretical Computer Science*
New efficient authentication protocol for the system of weak devices
2011
On the minimum of two negative binomial distributions
2011
How to transmit messages via WSN in a hostile environment
2011 · *SECRYPT 2011 : proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011.*
Self-keying identification mechanism for small devices
2011 · *Secure and trust computing, data management, and applications : 8th FTRA International Conference, STA 2011, Loutraki, Greece, June 28-30, 2011 : proceedings*
Practical universal random sampling
2010 · *Lecture Notes in Computer Science*
SkewCCC+:a heterogeneous Distributed Hash Table
2010 · *Lecture Notes in Computer Science*
Event extent estimation
2010 · *Lecture Notes in Computer Science*
A note on invariant random variables
2010 · *Discrete Mathematics and Theoretical Computer Science*
Repelling Sybil-type attacks in wireless ad hoc systems
2010 · *Lecture Notes in Computer Science*
Attacking and repairing the improved ModOnions protocol
2010 · *Lecture Notes in Computer Science*
Dynamic sharing of a multiple access channel
2010 · *27th International Symposium on Theoretical Aspects of Computer Science (STACS'10)*
Attacking and repairing the improved ModOnions protocol - tagging approach
2010 · *KSII Transactions on Internet and Information Systems*
Data deletion with provable security
2009 · *Lecture Notes in Computer Science*
RFID system with allowers
2009 · *Pervasive Computing and Communications, 2009, PerCom 2009 : IEEE International Conference, 9-13 March 2009, Galveston, TX, USA.*
Leader election for multi-channel radio networks – dependent versus independent trials
2009 · *First Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 1-3 April 2009, Dong Hoi, Vietnam : proceedings*
Security challenges for wireless sensor networks – dynamic routing as a security paradigm
2009 · *ERCIM News*
Data deletion with time-aware adversary model
2009 · *CSE 2009 : 12th IEEE International Conference on Computational Science (CSE 2009), 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009), 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2009), 2009 IEEE International Conference on Social Computing (SocialCom 2009), 29-31 August 2009, Vancouver, Canada. Vol. 2.*
Algorytmy zapewniające anonimowość i ich matematyczna analiza
2009
Energy efficient alert in single-hop networks of extremely weak devices
2009 · *Lecture Notes in Computer Science*
Step-out group signatures
2009 · *Computing*
Broadcasting with mobile objects
2009
Towards fair leader election in wireless networks
2009 · *Lecture Notes in Computer Science*
Privacy protection for RFID with hidden subset identifiers
2008 · *Lecture Notes in Computer Science*
Step-out ring signatures
2008 · *Lecture Notes in Computer Science*
Distributed verification of mixing-local forking proofs model
2008 · *Lecture Notes in Computer Science*
Repelling detour attack against onions with re-encryption
2008 · *Lecture Notes in Computer Science*
NTP - untrusty time protocol
2008
Proofs of communication and its application for fighting spam
2008 · *Lecture Notes in Computer Science*
Practical deniable encryption
2008 · *Lecture Notes in Computer Science*
Ochrona prywatności w systemach RFID
2008 · *Zagadnienia bezpieczeństwa w systemach informacyjnych : praca zbiorowa*
Random subsets of the interval and P2P protocols
2007 · *Lecture Notes in Computer Science*
Privacy protection in dynamic systems based on RFID tags
2007 · *Fifth Annual IEEE International Conference on Pervasive Computing and Communications. PerComWorkshops 2007. Proceedings, White Plains, New York, USA, 19-23 March 2007.*
Urządzenia RFID - bezpieczeństwo czy nowe zagrożenia?
2007 · *Technologie IT na Dolnym Śląsku - potencjał i szanse rozwoju. [Red. Katarzyna Janicka].*
Forward-secure key evolution in wireless sensor networks
2007 · *Lecture Notes in Computer Science*
Kleptographic attacks on e-voting schemes
2006 · *Lecture Notes in Computer Science*
E-Dolny Śląsk - perspektywy i przeszkody we wdrażaniu nowoczesnych technologii informacyjnych
2006 · *Innowacyjność wyróżnikiem Dolnego Śląska?, Wrocław, [29] czerwiec 2006.*
Extended sanitizable signatures
2006 · *Lecture Notes in Computer Science*
Wykorzystanie technik teleinformatycznych dla zwiększenia efektywności służby zdrowia na Dolnym Śląsku
2006 · *Metody elektronicznej identyfikacji. Wpływ na obrót gospodarczy i rozwój e-społeczeństwa na Dolnym Śląsku, Wrocław, [29] listopad 2006.*
Universal re-encryption of signatures and controlling anonymous information flow
2006 · *Tatra Mountains Mathematical Publications*
How to protect a signature from being shown to a third party
2006 · *Lecture Notes in Computer Science*
Privacy protection for P2P Publish-Subscribe networks
2005 · *Security and Protection of Information 2005. Proceedings of the conference, Brno, Czech Republic, 3-5.5.2005.*
Eksperymentalne badania własności protokołów Chord oraz ChordW
2005
On special random subsets of the interval
2005
On random subsets of the interval
2005
Onions based on universal re-encryption - anonymous communication immune against repetitive attack
2005 · *Lecture Notes in Computer Science*
Duo-onions and hydra-onions - failure and adversary resistant onion protocols
2005 · *Communications and multimedia security. Ed. by David Chadwick i Bart Preneel.*
Anonymous communication with on-line and off-line onion encoding
2005 · *Lecture Notes in Computer Science*
Provable anonymity for networks of mixes
2005 · *Lecture Notes in Computer Science*
Local view attack on anonymous communication
2005 · *Lecture Notes in Computer Science*
Conditional digital signatures
2005 · *Lecture Notes in Computer Science*
Hiding data sources in P2P networks
2005 · *Applied public key infrastructure. 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005*
A practical voting scheme with receipts
2005 · *Lecture Notes in Computer Science*
Provable unlinkability against traffic analysis already after O(log(n)) steps
2004 · *Information security. 7th International Conference, ISC 2004. Proceedings, Palo Alto, Ca., USA, September 2004*
Rapid mixing and security of Chaum's visual electronic voting
2003 · *Computer security - ESORICS 2003. 8th European Symposium on Research in Computer Security. Proceedings, Gjovik, Norway, October 13-15, 2003*
