Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Adversary immune data processing algorithms for ad hoc systems

2013/08/M/ST6/00928

Keywords:

adhoc system population protocol sensor field self-organization self-stabilization cryptography privacy protection

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing
  • ST6_2: Computer systems, parallel/distributed systems, sensor networks, embedded systems, cyber-physical systems
  • ST6_6: Algorithms, parallel, distributed and network algorithms, algorithmic game theory

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Politechnika Wrocławska, Wydział Podstawowych Problemów Techniki

woj. dolnośląskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

prof. Mirosław Kutyłowski 

Number of co-investigators in the project: 7

Call: HARMONIA 4 - announced on 2012-12-15

Amount awarded: 797 760 PLN

Project start date (Y-m-d): 2013-09-03

Project end date (Y-m-d): 2017-09-02

Project duration:: 48 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Publication in academic press/journals (3)
  • Articles in post-conference publications (15)
  1. Dynamic attribute based vehicle authentication
    Authors:
    Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Academic press:
    Wireless Networks (rok: 2017, tom: 23-4, strony: 1045--1062), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s11276-016-1203-5 - link to the publication
  2. Restricted Identification Secure in the Extended Canetti-Krawczyk Model
    Authors:
    Lucjan Hanzlik, Mirosław Kutyłowski
    Academic press:
    Journal of Universal Computer Science (rok: 2015, tom: 21, strony: 419-439), Wydawca: vol. 21, no. 3 (2015), 419-43
    Status:
    Published
  3. Optical PUF for Non-Forwardable Vehicle Authentication
    Authors:
    Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal
    Academic press:
    Computer Communications (rok: 2016, tom: 93 (1), strony: 52-67), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.comcom.2016.05.016 - link to the publication
  1. Braid Chain Radio Communication
    Authors:
    Jacek Cichoń, Mirosław Kutyłowski, Kamil Wolny
    Conference:
    Algosensors 2017 (rok: 2017, ), Wydawca: Springer
    Data:
    konferencja 7-8.09
    Status:
    Published
  2. How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data Aggregation
    Authors:
    Krzysztof Grining, Marek Klonowski, Małgorzata Sulkowska
    Conference:
    2017 IEEE Trustcom (rok: 2017, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 1-4.08
    Status:
    Published
  3. RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits
    Authors:
    Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga
    Conference:
    ISPEC Information Security Practice and Experience (rok: 2016, ), Wydawca: Springer
    Data:
    konferencja 16-18.11.2016
    Status:
    Published
  4. Stand-by Attacks on E-ID Password Authentication
    Authors:
    Lucjan Hanzlik, Przemysław Kubiak, Mirosław Kutyłowski
    Conference:
    10th International Conference on Information Security and Cryptology (INSCRYPT) (rok: 2015, ), Wydawca: Springer Verlag
    Data:
    konferencja 13-15 grudnia, 2014
    Status:
    Published
  5. Lightweight Protocol for Trusted Spontaneous Communication
    Authors:
    Przemysław Błaśkiewicz, Marek Klonowski, Mirosław Kutyłowski, Piotr Syga,
    Conference:
    The 6th International Conference on Trustworthy Systems (INTRUST) (rok: 2015, ), Wydawca: Springer Verlag
    Data:
    konferencja 16-17 grudnia 2014
    Status:
    Published
  6. Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2
    Authors:
    Lucjan Hanzlik, Mirosław Kutyłowski
    Conference:
    ISC (International Conference on Information Security) (rok: 2016, ), Wydawca: Springer
    Data:
    konferencja 3-6 września
    Status:
    Published
  7. Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage
    Authors:
    Łukasz Krzywiecki, Marcin Słowik
    Conference:
    SECIT (rok: 2017, ), Wydawca: Springer
    Data:
    konferencja 30,07
    Status:
    Published
  8. Brief announcement: Anonymous Credentials Secure to Ephemeral Leakage
    Authors:
    Łukasz Krzywiecki, Marta Wszoła, Mirosław Kutyłowski
    Conference:
    Cyber Security Cryptography and Machine Learning - First International Conference, Beer-Sheva, Israel (rok: 2017, ), Wydawca: Springer
    Data:
    konferencja 29-30.06
    Status:
    Published
  9. Efficient and robust data aggregation using untrusted infrastructure
    Authors:
    Marek Klonowski, Michał Koza, Mirosław Kutyłowski
    Conference:
    SIN '13, 6th International Conference on Security of Information and Networks (rok: 2013, ), Wydawca: ACM, Association for Computing Machinery
    Data:
    konferencja 26-28 listopad 2013
    Status:
    Published
  10. Ghost Train for Anonymous Communication
    Authors:
    Przemysław Błaśkiewicz,Mirosław Kutyłowski,Jakub Lemiesz,Małgorzata Sulkowska
    Conference:
    International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016: (rok: 2016, ), Wydawca: Springer
    Data:
    konferencja listopad 16-18
    Status:
    Published
  11. On Distributed Cardinality Estimation: Random Arcs Recycled
    Authors:
    Marcin Kardas, Miroslaw Kutylowski, Jakub Lemiesz
    Conference:
    Meeting on Analytic Algorithmics and Combinatorics (ANALCO) (rok: 2015, ), Wydawca: SIAM (Society for Industrial and Applied Mathematics)
    Data:
    konferencja 4.01.2015
    Status:
    Published
  12. Local Self-Organization with Strong Privacy Protection
    Authors:
    Lucjan Hanzlik ; Kamil Kluczniak ; Miroslaw Kutylowski ; Shlomi Dolev
    Conference:
    IEEE TRUSTCOM (rok: 2016, ), Wydawca: IEEE
    Data:
    konferencja 23-26 sierpnia
    Status:
    Published
  13. Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats
    Authors:
    Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak
    Conference:
    ACISP (Australasian Conference on Information Security and Privacy) (rok: 2016, ), Wydawca: Springer
    Data:
    konferencja 4-6 lipiec
    Status:
    Published
  14. Controlled Randomness – A Defense Against Backdoors in Cryptographic Devices
    Authors:
    Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski,
    Conference:
    MYCRYPT 2016 - Paradigms shifting Cryptology (rok: 2016, ), Wydawca: Springer, LNCS 10311
    Data:
    konferencja 1-2.12
    Status:
    Published
  15. Fault tolerant protocol for data collecting in wireless sensor networks
    Authors:
    Jacek Cichoń, Maciej Gębala, Marcin Zawada
    Conference:
    2017 IEEE Symposium on Computers and Communications (ISCC) (rok: 2017, ), Wydawca: IEEE Computer Society
    Data:
    konferencja 3-6.07
    Status:
    Published