Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Formal approach to practical problems of information hiding

2013/09/B/ST6/02251

Keywords:

information hiding differential privacy information theory

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing
  • ST6_4: Formal methods, foundations of computer science, including theoretical computer science, quantum algorithms
  • ST6_6: Algorithms, parallel, distributed and network algorithms, algorithmic game theory

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Politechnika Wrocławska, Wydział Podstawowych Problemów Techniki

woj. dolnośląskie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr hab. Marek Klonowski 

Number of co-investigators in the project: 5

Call: OPUS 5 - announced on 2013-03-15

Amount awarded: 223 990 PLN

Project start date (Y-m-d): 2014-03-03

Project end date (Y-m-d): 2015-09-02

Project duration:: 18 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Publication in academic press/journals (7)
  • Articles in post-conference publications (3)
  • Book publications / chapters in book publications (1)
  1. On the Dynamics of Systems of Urns
    Authors:
    Jacek Cichoń, Marek Klonowski, Rafał Kapelko
    Academic press:
    Disctreet Mathematics and Theoretical Computer Sciencie (rok: 2015, tom: Vol. 17 Issue 2, strony: 235-250), Wydawca: DMTCS
    Status:
    Published
  2. Information Hiding for Protocols Based on Bloom Filters
    Authors:
    Marek Klonowski, Anna Piotrowska
    Academic press:
    Computers & Security (rok: 2018, tom: 72, strony: 107-121), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.cose.2017.08.015 - link to the publication
  3. Enhancing Privacy for Ad Hoc Systems with Pre-deployment Key Distribution
    Authors:
    Marek Klonowski, Piotr Syga
    Academic press:
    Ad Hoc Networks (rok: 2017, tom: 59, strony: 35-47), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.adhoc.2017.01.003 - link to the publication
  4. Mixing in random digraphs with application to the forward-secure key evolution in wireless sensor networks.
    Authors:
    Marek Klonowski, Mirosław Kutylowski, Michal Ren, Katarzyna Rybarczyk
    Academic press:
    ACM Transactions on Sensor Networks (rok: 2015, tom: Vol. 11 Issue 2, strony: 29:1-29:27), Wydawca: ACM
    Status:
    Published
    DOI:
    10.1145/2637482 - link to the publication
  5. How to Obfuscate Execution of Protocols in a Single Hop Radio Network ?
    Authors:
    Marek Klonowski, Piotr Syga, Marcin Kardas
    Academic press:
    Ad Hoc networks , Wydawca: Elsevier
    Status:
    Submitted
  6. Percolation and best choice problem for powers of paths
    Authors:
    Fabricio Siqueira Benevides, Małgorzata Sulkowska
    Academic press:
    Journal of Applied Probability , Wydawca: Applied Probability Trust
    Status:
    Accepted for publication
  7. Special Encoding for Irreversible Data Erasing
    Authors:
    Marek Klonowski, Tomasz Strumiński, Małgorzata Sulkowska
    Academic press:
    Discrete Mathematics and Theoretical Computer Science , Wydawca: DMTCS
    Status:
    Submitted
  1. Optical PUF for Non Forward-able Vehicle Authentication
    Authors:
    Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Conference:
    The 14th IEEE International Symposium on Network Computing and Applications (IEEE NCA15) (rok: 2015, ), Wydawca: IEEE
    Data:
    konferencja 28-30.09.2015
    Status:
    Published
  2. Some Remarks and Ideas about Monetization of Sensitive Data
    Authors:
    Ania M. Piotrowska, Marek Klonowski
    Conference:
    10th DPM International Workshop on Data Privacy Management (rok: 2015, ), Wydawca: Springer Verlag
    Data:
    konferencja 21.09-22.09 2015
    Status:
    Published
  3. Anonymous Authentication Scheme based on PUF
    Authors:
    Łukasz Krzywiecki
    Conference:
    The 18th Annual International Conference on Information Security and Cryptology (ICISC -2015) (rok: 2015, ), Wydawca: Springer Verlag
    Data:
    konferencja 25-27.11.2015
    Status:
    Published
  1. Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage
    Authors:
    Łukasz Krzywiecki
    Book:
    Provable Security (rok: 2014, tom: 8782, strony: 334-341), Wydawca: Springer Verlag
    Status:
    Published