Follow
Sabina Szymoniak
Title
Cited by
Cited by
Year
Timed analysis of security protocols
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
212017
Security protocols analysis including various time parameters
S Szymoniak
Mathematical Biosciences and Engineering 18 (2), 1136-1153, 2021
202021
Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar
Applied Sciences 13 (1), 404, 2022
152022
ProToc—An universal language for security protocols specifications
A Grosser, M Kurkowski, J Piątkowski, S Szymoniak
Soft Computing in Computer and Information Science, 237-248, 2015
15*2015
Amelia—A new security protocol for protection against false links
S Szymoniak
Computer Communications 179, 73-81, 2021
132021
Timed models of security protocols including delays in the network
S Szymoniak, M Kurkowski, J Piątkowski
Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015
132015
User authentication protocol based on the location Factor for a mobile environment
M Bartłomiejczyk, I El Fray, M Kurkowski, S Szymoniak, ...
IEEE Access 10, 16439-16455, 2022
122022
A fast method for security protocols verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski
Computer Information Systems and Industrial Management: 18th International …, 2019
122019
Sat and smt-based verification of security protocols including time aspects
S Szymoniak, O Siedlecka-Lamch, AM Zbrzezny, A Zbrzezny, ...
Sensors 21 (9), 3055, 2021
112021
On some time aspects in security protocols analysis
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018
102018
Using a security protocol to protect against false links
S Szymoniak
Moving technology ethics at the forefront of society, organisations and …, 2021
72021
Versectis-an agent based model checker for security protocols
AM Zbrzezny, A Zbrzezny, S Szymoniak, O Siedlecka-Lamch, ...
Proceedings of the 19th International Conference on Autonomous Agents and …, 2020
72020
Efficient verification of security protocols time properties using SMT solvers
AM Zbrzezny, S Szymoniak, M Kurkowski
International Joint Conference: 12th International Conference on …, 2020
72020
SAT-based verification of NSPK protocol including delays in the network
S Szymoniak, O Siedlecka-Lamch, M Kurkowski
2017 IEEE 14th International Scientific Conference on Informatics, 388-393, 2017
72017
Practical approach in verification of security systems using satisfiability modulo theories
AM Zbrzezny, S Szymoniak, M Kurkowski
Logic Journal of the IGPL 30 (2), 289-300, 2022
42022
Towards Most Efficient Method for Untimed Security Protocols Verification
O Siedlecka-Lamch, S Szymoniak, M Kurkowski, I El Fray
42020
Securing Meetings in D2D IoT Systems
S Szymoniak, O Siedlecka-Lamch
ETHICOMP 2022, 31, 2022
32022
How to Be on Time with Security Protocol?
S Szymoniak
Societal Challenges in the Smart Society, 225-238, 2020
32020
SMT solvers as efficient tools for automatic time properties verification of security protocols
AM Zbrzezny, O Siedlecka-Lamch, S Szymoniak, M Kurkowski
2019 20th International Conference on Parallel and Distributed Computing …, 2019
32019
Kaochow protocol timed analysis
S Szymoniak
Advances in Soft and Hard Computing, 346-357, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20