default search action
Miroslaw Kutylowski
Person information
- affiliation: Wroclaw University of Technology, Department of Computer Science, Poland
- affiliation: University of Paderborn, Heinz Nixdorf Institute, Germany
- affiliation: Poznań University, Department of Mathematics and Computer Science, Poland
- affiliation (PhD 1985): University of Wroclaw, Institute of Computer Science, Poland
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Jacek Cichon, Miroslaw Kutylowski, Patryk Stopyra:
Creating small ad hoc networks: Swift presence notification strategies. Veh. Commun. 45: 100694 (2024) - 2023
- [j45]Miroslaw Kutylowski, Przemyslaw Blaskiewicz:
Advanced Electronic Signatures and eIDAS - Analysis of the Concept. Comput. Stand. Interfaces 83: 103644 (2023) - [j44]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. Proc. Priv. Enhancing Technol. 2023(4): 170-183 (2023) - [j43]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [c142]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication! CRYPTO (2) 2023: 759-790 - [c141]Dominik Bojko, Jacek Cichon, Miroslaw Kutylowski:
Sliding Window Sampling over Data Stream - a Solution Based on Devil's Staircases. DSAA 2023: 1-9 - 2022
- [c140]Przemyslaw Blaskiewicz, Miroslaw Kutylowski:
Chaining Electronic Seals - An eIDAS Compliant Framework for Controlling SSCD. ACIIDS (2) 2022: 714-732 - [e11]Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - 2021
- [c139]Lukasz Krzywiecki, Miroslaw Kutylowski, Rafal Rothenberger, Bartosz Drzazga:
Hierarchical Ring Signatures Immune to Randomness Injection Attacks. CSCML 2021: 171-186 - [c138]Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski:
PACE with Mutual Authentication - Towards an Upgraded eID in Europe. ESORICS (2) 2021: 501-519 - [c137]Miroslaw Kutylowski, Przemyslaw Kubiak, Patryk Koziel, Yanmei Cao:
Poster: eID in Europe - Password Authentication Revisited. Networking 2021: 1-3 - [c136]Jacek Cichon, Krzysztof Majcher, Miroslaw Kutylowski:
Fair Mutual Authentication. SECRYPT 2021: 754-759 - [p4]Miroslaw Kutylowski, Piotr Syga, Moti Yung:
Emerging Security Challenges for Ubiquitous Devices. Security of Ubiquitous Computing Systems 2021: 3-18 - [p3]Lucjan Hanzlik, Miroslaw Kutylowski:
ePassport and eID Technologies. Security of Ubiquitous Computing Systems 2021: 81-97 - 2020
- [j42]Kuo-Hui Yeh, Chunhua Su, Robert H. Deng, Moti Yung, Miroslaw Kutylowski:
Special issue on security and privacy of blockchain technologies. Int. J. Inf. Sec. 19(3): 243-244 (2020) - [c135]Miroslaw Kutylowski, Anna Lauks-Dutka, Moti Yung:
GDPR - Challenges for Reconciling Legal Rules with Technical Reality. ESORICS (1) 2020: 736-755 - [c134]Przemyslaw Kubiak, Miroslaw Kutylowski:
Preventing a Fork in a Blockchain - David Fighting Goliath. TrustCom 2020: 1044-1051 - [e10]Miroslaw Kutylowski, Jun Zhang, Chao Chen:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4 [contents]
2010 – 2019
- 2019
- [j41]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
CTRL-PACE: Controlled Randomness for e-Passport Password Authentication. Fundam. Informaticae 169(4): 295-330 (2019) - [j40]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device anonymous authentication. Int. J. Inf. Sec. 18(2): 181-197 (2019) - [c133]Przemyslaw Blaskiewicz, Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Revised Gateway Selection for LoRa Radio Networks. ADHOC-NOW 2019: 228-240 - [c132]Miroslaw Kutylowski, Lukasz Krzywiecki, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. CSCML 2019: 296-315 - [c131]Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). CSCML 2019: 320-323 - [c130]Miroslaw Kutylowski, Jakub Lemiesz, Marta Slowik, Marcin Slowik, Kamil Kluczniak, Maciej Gebala:
GDPR-Compliant Reputation System Based on Self-certifying Domain Signatures. ISPEC 2019: 341-361 - [c129]Adam Bobowski, Miroslaw Kutylowski:
Derandomized PACE with Mutual Authentication. NSS 2019: 697-705 - [c128]Miroslaw Kutylowski, Przemyslaw Kubiak:
Privacy and Security Analysis of PACE GM Protocol. TrustCom/BigDataSE 2019: 763-768 - [p2]Przemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola:
Pseudonymous Signature Schemes. Advances in Cyber Security 2019: 185-255 - [r1]Miroslaw Kutylowski, Przemyslaw Blaskiewicz:
Privacy-Aware Identity Management. Encyclopedia of Big Data Technologies 2019 - [i17]Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios. IACR Cryptol. ePrint Arch. 2019: 337 (2019) - 2018
- [j39]Miroslaw Kutylowski, Yu Wang, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [e9]Lech Jan Janczewski, Miroslaw Kutylowski:
ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings. IFIP Advances in Information and Communication Technology 529, Springer 2018, ISBN 978-3-319-99827-5 [contents] - [i16]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token. IACR Cryptol. ePrint Arch. 2018: 1148 (2018) - 2017
- [j38]Yang Xiang, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j37]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
TrDup: enhancing secure data deduplication with user traceability in cloud computing. Int. J. Web Grid Serv. 13(3): 270-289 (2017) - [c127]Jacek Cichon, Miroslaw Kutylowski, Kamil Wolny:
Braid Chain Radio Communication. ALGOSENSORS 2017: 223-235 - [c126]Lukasz Krzywiecki, Miroslaw Kutylowski:
Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50 - [c125]Miroslaw Kutylowski:
On Crossroads of Privacy Protection. Inscrypt 2017: 11-20 - [c124]Lukasz Krzywiecki, Marta Wszola, Miroslaw Kutylowski:
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98 - 2016
- [j36]Yang Xiang, Man Ho Au, Miroslaw Kutylowsky:
Security and privacy in big data. Concurr. Comput. Pract. Exp. 28(10): 2856-2857 (2016) - [j35]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu:
Cyber security, crime, and forensics of wireless networks and applications. Secur. Commun. Networks 9(16): 3763-3764 (2016) - [c123]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. ACISP (2) 2016: 467-477 - [c122]Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski:
A Formal Concept of Domain Pseudonymous Signatures. ISPEC 2016: 238-254 - [c121]Lucjan Hanzlik, Miroslaw Kutylowski:
Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2. ISC 2016: 115-129 - [c120]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. Mycrypt 2016: 215-232 - [c119]Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang:
Protecting Electronic Signatures in Case of Key Leakage. Mycrypt 2016: 252-274 - [c118]Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski:
Multi-device Anonymous Authentication. NSS 2016: 21-36 - [c117]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz, Malgorzata Sulkowska:
Ghost Train for Anonymous Communication. SpaCCS 2016: 224-239 - [c116]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Shlomi Dolev:
Local Self-Organization with Strong Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 775-782 - [i15]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada, Szymon Stefanski, Krzysztof Chrobak:
λ-persistant CSMA: a radio-channel access protocol. CoRR abs/1607.00861 (2016) - [i14]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada:
One- and Multi-Pass Long-Hop Routing for Wireless Network. CoRR abs/1607.00862 (2016) - [i13]Przemyslaw Blaskiewicz, Jacek Cichon, Jakub Lemiesz, Miroslaw Kutylowski, Marcin Zawada, Krystyna Napierala, Michal Panek, Stanislaw Strzyz:
A Jamming-Resilient MAC-layer Device Identification for Internet of Things. CoRR abs/1607.00863 (2016) - 2015
- [j34]Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma:
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. J. Cryptol. 28(3): 623-640 (2015) - [j33]Lucjan Hanzlik, Miroslaw Kutylowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model. J. Univers. Comput. Sci. 21(3): 419-439 (2015) - [j32]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Mixing in Random Digraphs with Application to the Forward-Secure Key Evolution in Wireless Sensor Networks. ACM Trans. Sens. Networks 11(2): 29:1-29:27 (2015) - [c115]Marcin Kardas, Miroslaw Kutylowski, Jakub Lemiesz:
On Distributed Cardinality Estimation: Random Arcs Recycled. ANALCO 2015: 129-137 - [c114]Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski:
A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124 - [c113]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. AsiaCCS 2015: 603-608 - [c112]Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung:
Hard Invalidation of Electronic Signatures. ISPEC 2015: 421-436 - [c111]Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Anonymous Evaluation System. NSS 2015: 283-299 - [c110]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Insecurity of Anonymous Login with German Personal Identity Cards. SocialSec 2015: 39-43 - [i12]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism. IACR Cryptol. ePrint Arch. 2015: 108 (2015) - 2014
- [c109]Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stand-by Attacks on E-ID Password Authentication. Inscrypt 2014: 475-495 - [c108]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. Financial Cryptography 2014: 283-290 - [c107]Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Lightweight Protocol for Trusted Spontaneous Communication. INTRUST 2014: 228-242 - [c106]Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki:
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59 - [c105]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406 - [e8]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8712, Springer 2014, ISBN 978-3-319-11202-2 [contents] - [e7]Miroslaw Kutylowski, Jaideep Vaidya:
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8713, Springer 2014, ISBN 978-3-319-11211-4 [contents] - 2013
- [j31]Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Attack against Ibrahim's Distributed Key Generation for RSA. Int. J. Netw. Secur. 15(4): 313-316 (2013) - [c104]Przemyslaw Kubiak, Miroslaw Kutylowski:
Supervised Usage of Signature Creation Devices. Inscrypt 2013: 132-149 - [c103]Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki:
Mutual Restricted Identification. EuroPKI 2013: 119-133 - [c102]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski:
Bit Reversal Broadcast Scheduling for Ad Hoc Systems. IDCS 2013: 223-237 - [c101]Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. ISPEC 2013: 218-232 - [c100]Marek Klonowski, Miroslaw Kutylowski, Piotr Syga:
Chameleon RFID and Tracking Prevention. RFIDSec Asia 2013: 17-29 - [c99]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Efficient and robust data aggregation using untrusted infrastructure. SIN 2013: 123-130 - [c98]Miroslaw Kutylowski, Piotr Lipiak:
Disability Parking Permit - Lightweight But Trustworthy Identity Documents. TrustCom/ISPA/IUCC 2013: 1535-1540 - [c97]Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski:
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689 - [e6]Miroslaw Kutylowski, Moti Yung:
Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7763, Springer 2013, ISBN 978-3-642-38518-6 [contents] - [i11]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp \& Extend - Instant but Undeniable Timestamping based on Lazy Trees. IACR Cryptol. ePrint Arch. 2013: 730 (2013) - 2012
- [j30]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy efficient alert in single-hop networks of extremely weak devices. Theor. Comput. Sci. 453: 65-74 (2012) - [j29]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski:
From key predistribution to key redistribution. Theor. Comput. Sci. 453: 75-87 (2012) - [c96]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski, Michal Tabor, Daniel Wachnik:
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307 - [c95]Przemyslaw Blaskiewicz, Miroslaw Kutylowski, Wojciech Wodo, Kamil Wolny:
Extreme Propagation in an Ad-Hoc Radio Network - Revisited. ICCCI (2) 2012: 142-151 - [c94]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24 - [c93]Lukasz Krzywiecki, Miroslaw Kutylowski:
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319 - [c92]Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection. SOFSEM 2012: 566-575 - [c91]Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski:
Restricted Identification without Group Keys. TrustCom 2012: 1194-1199 - [i10]Marcin Kik, Maciej Gebala, Miroslaw Kutylowski:
One-side Energy costs of the RBO receiver. CoRR abs/1209.4605 (2012) - [i9]Miroslaw Kutylowski, Maciej Gebala:
Optimizing Segment Based Document Protection (Corrected Version). IACR Cryptol. ePrint Arch. 2012: 520 (2012) - 2011
- [c90]Miroslaw Kutylowski, Anna Lauks-Dutka:
Challenges for Electronic Identity Documents. BIS (Workshops) 2011: 256-257 - [c89]Miroslaw Kutylowski, Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Przemyslaw Kubiak, Wieslaw Paluszynski, Michal Tabor:
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281 - [c88]Miroslaw Kutylowski, Jun Shao:
Signing with multiple ID's and a single key. CCNC 2011: 519-520 - [c87]Miroslaw Kutylowski, Jun Shao:
1-out-of-2 signature. AsiaCCS 2011: 391-395 - [c86]Miroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza:
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238 - [c85]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - [c84]Krzysztof Barczynski, Przemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski:
Self-keying Identification Mechanism for Small Devices. STA 2011: 37-44 - [c83]Lukasz Krzywiecki, Miroslaw Kutylowski:
Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48-62 - [p1]Przemyslaw Blaskiewicz, Miroslaw Kutylowski:
Security and Trust in Sensor Networks. Theoretical Aspects of Distributed Computing in Sensor Networks 2011: 697-739 - 2010
- [j28]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. KSII Trans. Internet Inf. Syst. 4(3): 380-399 (2010) - [c82]Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao:
How to Construct State Registries-Matching Undeniability with Public Security. ACIIDS (1) 2010: 64-73 - [c81]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. ACISP 2010: 391-402 - [c80]Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutylowski:
From Key Predistribution to Key Redistribution. ALGOSENSORS 2010: 92-104 - [c79]Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks-Dutka, Michal Tabor:
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework. BIS (Workshops) 2010: 298-309 - [c78]Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski:
Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386 - [c77]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Digital Signatures for e-Government - A Long-Term Security Architecture. e-Forensics 2010: 256-270 - [c76]Przemyslaw Blaskiewicz, Przemyslaw Kubiak, Miroslaw Kutylowski:
Two-Head Dragon Protocol: Preventing Cloning of Signature Keys - Work in Progress. INTRUST 2010: 173-188 - [c75]Miroslaw Kutylowski, Przemyslaw Kubiak:
Polish Concepts for Securing E-Government Document Flow. ISSE 2010: 399-407 - [c74]Lukasz Krzywiecki, Miroslaw Kutylowski:
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123 - [c73]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E Voting over the Internet. Towards Trustworthy Elections 2010: 343-356 - [e5]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents]
2000 – 2009
- 2009
- [j27]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-out group signatures. Computing 85(1-2): 137-151 (2009) - [c72]Zbigniew Golebiewski, Michal Koza, Marek Klonowski, Miroslaw Kutylowski:
Leader Election for Multi-channel Radio Networks - Dependent versus Independent Trials. ACIIDS 2009: 477-482 - [c71]Zbigniew Golebiewski, Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Towards Fair Leader Election in Wireless Networks. ADHOC-NOW 2009: 166-179 - [c70]Jacek Cichon, Jaroslaw Grzaslewicz, Miroslaw Kutylowski:
Key Levels and Securing Key Predistribution against Node Captures. ALGOSENSORS 2009: 64-75 - [c69]Marek Klonowski, Miroslaw Kutylowski, Jan Zatopianski:
Energy Efficient Alert in Single-Hop Networks of Extremely Weak Devices. ALGOSENSORS 2009: 139-150 - [c68]Jacek Cichon, Maciej Gebala, Miroslaw Kutylowski:
On Optimal One-dimensional Routing Strategies in Sensor Networks. BroadBandCom 2009: 209-214 - [c67]Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka:
Attacking and Repairing the Improved ModOnions Protocol. ICISC 2009: 258-273 - [e4]Miroslaw Kutylowski, Witold Charatonik, Maciej Gebala:
Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings. Lecture Notes in Computer Science 5699, Springer 2009, ISBN 978-3-642-03408-4 [contents] - [i8]Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Security Challenges for Wireless Sensor Networks. ERCIM News 2009(76) (2009) - 2008
- [j26]Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem:
General anonymous key broadcasting via Lagrangian interpolation. IET Inf. Secur. 2(3): 79-84 (2008) - [j25]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Adaptive initialization algorithm for ad hoc radio networks with carrier sensing. Theor. Comput. Sci. 402(1): 16-28 (2008) - [c66]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model. ACISP 2008: 128-140 - [c65]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks:
Repelling Detour Attack Against Onions with Re-encryption. ACNS 2008: 296-308 - [c64]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Random Fault Attack against Shrinking Generator. ALGOSENSORS 2008: 87-99 - [c63]Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz Luczak, Filip Zagórski:
Self-stabilizing population of mobile agents. IPDPS 2008: 1-8 - [c62]Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks:
Step-Out Ring Signatures. MFCS 2008: 431-442 - [c61]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Power of Discrete Nonuniformity - Optimizing Access to Shared Radio Channel in Ad Hoc Networks. MSN 2008: 9-15 - [c60]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection for RFID with Hidden Subset Identifiers. Pervasive 2008: 298-314 - [c59]Jacek Cichon, Miroslaw Kutylowski, Bogdan Weglorz:
Short Ballot Assumption and Threeballot Voting Protocol. SOFSEM 2008: 585-598 - [c58]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski:
Practical Deniable Encryption. SOFSEM 2008: 599-609 - [e3]Miroslaw Kutylowski, Jacek Cichon, Przemyslaw Kubiak:
Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4837, Springer 2008, ISBN 978-3-540-77870-7 [contents] - [e2]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i7]Miroslaw Kutylowski, Filip Zagórski:
Scratch, Click & Vote: E2E voting over the Internet. IACR Cryptol. ePrint Arch. 2008: 314 (2008) - 2007
- [j24]Miroslaw Kutylowski:
Tagung "Frontiers of E-Voting", 29. Juli bis 3. August auf Schloss Dagstuhl. Datenschutz und Datensicherheit 31(9): 718 (2007) - [c57]Miroslaw Kutylowski:
Algorithmic Challenges for Sensor Networks - Foreword to ALGOSENSORS 2007. ALGOSENSORS 2007: 1-5 - [c56]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-Secure Key Evolution in Wireless Sensor Networks. CANS 2007: 102-120 - [c55]Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic attacks on a cascade of mix servers. AsiaCCS 2007: 57-62 - [c54]Jacek Cichon, Miroslaw Kutylowski:
Anonymity and k-Choice Identities. Inscrypt 2007: 283-297 - [c53]Miroslaw Kutylowski, Filip Zagórski:
Verifiable Internet Voting Solving Secure Platform Problem. IWSEC 2007: 199-213 - [c52]Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Privacy Protection in Dynamic Systems Based on RFID Tags. PerCom Workshops 2007: 235-240 - [i6]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i5]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007 - [i4]Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk:
Forward-secure Key Evolution in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2007: 237 (2007) - 2006
- [c51]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Initialization for Ad Hoc Radio Networks with Carrier Sensing and Collision Detection. ADHOC-NOW 2006: 308-320 - [c50]Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada:
Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier Sensing. ALGOSENSORS 2006: 35-46 - [c49]Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski:
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. CANS 2006: 191-202 - [c48]Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski:
A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143 - [c47]Marcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Kleptographic Attacks on E-Voting Schemes. ETRICS 2006: 494-508 - [c46]Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski:
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. ICSNC 2006: 26 - [c45]Jedrzej Kabarowski, Miroslaw Kutylowski, Wojciech Rutkowski:
Adversary Immune Size Approximation of Single-Hop Radio Networks. TAMC 2006: 148-158 - [c44]Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks:
How to Protect a Signature from Being Shown to a Third Party. TrustBus 2006: 192-202 - [c43]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Fault Cryptanalysis and the Shrinking Generator. WEA 2006: 61-72 - [i3]Marcin Gomulkiewicz, Miroslaw Kutylowski, Pawel Wlaz:
Fault Jumping Attacks against Shrinking Generator. Complexity of Boolean Functions 2006 - 2005
- [j23]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Efficient simulation of synchronous systems by multi-speed systems. RAIRO Theor. Informatics Appl. 39(2): 403-419 (2005) - [c42]Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication. ESORICS 2005: 475-488 - [c41]Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz:
Robust Undetectable Interference Watermarks. ICCSA (2) 2005: 517-526 - [c40]Marek Klonowski, Miroslaw Kutylowski:
Provable Anonymity for Networks of Mixes. Information Hiding 2005: 26-38 - [c39]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
A Practical Voting Scheme with Receipts. ISC 2005: 490-497 - [c38]Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rózanski:
Hiding Data Sources in P2P Networks. IWAP 2005: 225-239 - [c37]Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz:
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109 - [c36]Marek Klonowski, Miroslaw Kutylowski, Filip Zagórski:
Anonymous Communication with On-line and Off-line Onion Encoding. SOFSEM 2005: 229-238 - [c35]Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski:
Conditional Digital Signatures. TrustBus 2005: 206-215 - [c34]Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich Theodor Vierhaus, Pawel Wlaz:
Synchronization Fault Cryptanalysis for Breaking A5/1. WEA 2005: 415-427 - 2004
- [c33]Jan Iwanik, Marek Klonowski, Miroslaw Kutylowski:
Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion Protocols. Communications and Multimedia Security 2004: 1-15 - [c32]Miroslaw Kutylowski, Wojciech Rutkowski:
Secure Initialization in Single-Hop Radio Networks. ESAS 2004: 31-41 - [c31]Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak:
Mobile Mixing. ICISC 2004: 380-393 - [c30]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! ISC 2004: 354-366 - [c29]Maciej Gebala, Miroslaw Kutylowski, Bartlomiej Rózanski, Marcin Zawada, J. Vossnacker, T. Winter:
Optimized UTRAN Topology Planning Including Point-to-Multipoint Equipment. MMB 2004: 87-92 - [c28]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. WISA 2004: 400-410 - 2003
- [j22]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Weak communication in single-hop radio networks: adjusting algorithms to industrial standards. Concurr. Comput. Pract. Exp. 15(11-12): 1117-1131 (2003) - [c27]Miroslaw Kutylowski, Wojciech Rutkowski:
Adversary Immune Leader Election in ad hoc Radio Networks. ESA 2003: 397-408 - [c26]Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Rapid Mixing and Security of Chaum's Visual Electronic Voting. ESORICS 2003: 132-145 - [c25]Miroslaw Kutylowski, Daniel Letkiewicz:
Computing Average Value in Ad Hoc Networks. MFCS 2003: 511-520 - 2002
- [c24]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Energy-Efficient Size Approximation of Radio Networks with No Collision Detection. COCOON 2002: 279-289 - [c23]Marcin Gomulkiewicz, Miroslaw Kutylowski:
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. ESORICS 2002: 90-103 - [c22]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Weak Communication in Radio Networks. Euro-Par 2002: 965-972 - [c21]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Efficient algorithms for leader election in radio networks. PODC 2002: 51-57 - 2001
- [c20]Tomasz Jurdzinski, Miroslaw Kutylowski:
Communication Gap for Finite Memory Devices. ICALP 2001: 1052-1064 - [c19]Tomasz Jurdzinski, Miroslaw Kutylowski, Jan Zatopianski:
Communication Complexity for Asynchronous Systems of Finite Devices. IPDPS 2001: 139 - 2000
- [j21]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka:
Periodification scheme: constructing sorting networks with constant period. J. ACM 47(5): 944-967 (2000) - [j20]Artur Czumaj, Miroslaw Kutylowski:
Delayed path coupling and generating random permutations. Random Struct. Algorithms 17(3-4): 238-259 (2000) - [c18]Friedhelm Meyer auf der Heide, Miroslaw Kutylowski, Prabhakar Ragde:
Complexity Theory and Algorithms. Euro-Par 2000: 455
1990 – 1999
- 1999
- [c17]Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys:
Multi-party Finite Computations. COCOON 1999: 318-329 - [c16]Marcin Kik, Miroslaw Kutylowski, Marek Piotrów:
Correction Networks. ICPP 1999: 40-47 - [c15]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys:
Delayed Path Coupling and Generating Random Permutations via Distributed Stochastic Processes. SODA 1999: 271-280 - [e1]Miroslaw Kutylowski, Leszek Pacholski, Tomasz Wierzbicki:
Mathematical Foundations of Computer Science 1999, 24th International Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999, Proceedings. Lecture Notes in Computer Science 1672, Springer 1999, ISBN 3-540-66408-4 [contents] - 1998
- [j19]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys:
Fast Generation of Random Permutations Via Networks Simulation. Algorithmica 21(1): 2-20 (1998) - [j18]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff:
Periodic Merging Networks. Theory Comput. Syst. 31(5): 551-578 (1998) - [c14]Pavol Duris, Tomasz Jurdzinski, Miroslaw Kutylowski, Krzysztof Lorys:
Power of Cooperation and Multihead Finite Systems. ICALP 1998: 896-907 - [c13]Micah Adler, Wolfgang Dittrich, Ben H. H. Juurlink, Miroslaw Kutylowski, Ingo Rieping:
Communication-Optimal Parallel Minimum Spanning Tree Algorithms (Extended Abstract). SPAA 1998: 27-36 - 1997
- [j17]Torben Hagerup, Miroslaw Kutylowski:
Fast Integer Merging on the EREW PRAM. Algorithmica 17(1): 55-66 (1997) - [c12]Miroslaw Kutylowski, Rolf Wanka:
Playing Tetris on Meshes and Multi-Dimensional SHEARSORT. ISAAC 1997: 32-41 - 1996
- [j16]Faith E. Fich, Russell Impagliazzo, Bruce M. Kapron, Valerie King, Miroslaw Kutylowski:
Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution. J. Comput. Syst. Sci. 53(1): 104-111 (1996) - [j15]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk:
Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write Parallel Random-Access Machines. SIAM J. Comput. 25(6): 1196-123 (1996) - [c11]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys:
Fast Generation of Random Permutations via Networks Simulation. ESA 1996: 246-260 - [c10]Miroslaw Kutylowski, Krzysztof Lorys:
Limitations of the QRQW and EREW PRAM Models. FSTTCS 1996: 310-321 - [c9]Miroslaw Kutylowski, Tomasz Wierzbicki:
Approximate Compaction and Padded-Sorting on Exclusive Write PRAMs. IPPS 1996: 174-181 - [c8]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff:
Periodic Merging Networks. ISAAC 1996: 336-345 - [i2]Artur Czumaj, Przemyslawa Kanarek, Miroslaw Kutylowski, Krzysztof Lorys:
Fast Generation of Random Permutations via Networks Simulation. Universität Trier, Mathematik/Informatik, Forschungsbericht 96-26 (1996) - 1995
- [j14]Faith E. Fich, Miroslaw Kowaluk, Miroslaw Kutylowski, Krzysztof Lorys, Prabhakar Ragde:
Retrieval of Scattered Information by EREW, CREW, and CRCW PRAMs. Comput. Complex. 5(2): 113-131 (1995) - [i1]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk:
Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write PRAMs. Electron. Colloquium Comput. Complex. TR95 (1995) - 1994
- [j13]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk:
Exact Lower Time Bounds for Computing Boolean Functions on CREW PRAMs. J. Comput. Syst. Sci. 48(2): 231-254 (1994) - [j12]Paul Beame, Miroslaw Kutylowski, Marcin Kik:
Information Broadcasting by Exclusive-Read Prams. Parallel Process. Lett. 4: 159-169 (1994) - [c7]Miroslaw Kutylowski, Krzysztof Lorys, Brigitte Oesterdiekhoff, Rolf Wanka:
Fast and Feasible Periodic Sorting Networks of Constant Depth. FOCS 1994: 369-380 - [c6]Marcin Kik, Miroslaw Kutylowski, Grzegorz Stachowiak:
Periodic Constant Depth Sorting Networks. STACS 1994: 201-212 - 1993
- [j11]Miroslaw Kutylowski:
Stack versus Sensitivity for One-Way Automata. Theor. Comput. Sci. 119(2): 233-245 (1993) - [c5]Faith E. Fich, Russell Impagliazzo, Bruce M. Kapron, Valerie King, Miroslaw Kutylowski:
Limits on the Power of Parallel Random Access Machines with Weak Forms of Write Conflict Resolution. STACS 1993: 386-397 - 1992
- [j10]Miroslaw Kutylowski, Rolf Wanka:
Periodic Sorting on Two-Dimensional Meshes. Parallel Process. Lett. 2: 213-220 (1992) - [c4]Miroslaw Kutylowski:
Complexity of Boolean Functions on PRAMs - Lower Bound Techniques. Data Structures and Efficient Algorithms 1992: 309-329 - [c3]Faith E. Fich, Miroslaw Kowaluk, Krzysztof Lorys, Miroslaw Kutylowski, Prabhakar Ragde:
Retrieval of scattered information by EREW, CREW and CRCW PRAMs. SWAT 1992: 30-41 - 1991
- [j9]Miroslaw Kutylowski:
Time Complexity of Boolean Functions on CREW PRAMs. SIAM J. Comput. 20(5): 824-833 (1991) - [j8]Miroslaw Kutylowski:
Multihead One-Way Finite Automata. Theor. Comput. Sci. 85(1): 135-153 (1991) - 1990
- [j7]Miroslaw Kutylowski:
Remarks on Sorting and One-Way Multihead Finite Automata. Inf. Process. Lett. 36(4): 215-218 (1990) - [j6]Miroslaw Kutylowski:
One-Way Multihead Finite Automata and 2-Bounded Languages. Math. Syst. Theory 23(2): 107-139 (1990) - [j5]Miroslaw Kutylowski, Maciej Liskiewicz, Krzysztof Lorys:
Reversal Complexity Classes for Alternating Turing Machines. SIAM J. Comput. 19(2): 207-221 (1990) - [c2]Martin Dietzfelbinger, Miroslaw Kutylowski, Rüdiger Reischuk:
Exact Time Bounds for Computing Boolean Functions on PRAMs Without Simultaneous Writes. SPAA 1990: 125-135 - [c1]Miroslaw Kutylowski:
Computational Power of One-Way Multihead Finite Automata. STACS 1990: 176-187
1980 – 1989
- 1988
- [j4]Miroslaw Kutylowski:
Finite Automata, Real Time Processes and Counting Problems in Bounded Arithmetics. J. Symb. Log. 53(1): 243-258 (1988) - 1987
- [j3]Miroslaw Kutylowski:
A Generalized Grzegorczyk Hierarchy and Low Complexity Classes. Inf. Comput. 72(2): 133-149 (1987) - [j2]Miroslaw Kutylowski, Krzysztof Lorys:
A Note on "ℰ. Math. Log. Q. 33(2): 115-121 (1987) - 1986
- [j1]Miroslaw Kutylowski:
Restricted Collection and Comprehension Schemata in Weak Set Theories. Math. Log. Q. 32(35-36): 545-549 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint