Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Kurkowski, M." wg kryterium: Autor


Wyświetlanie 1-10 z 10
Tytuł:
SAT-based cryptanalysis of modified versions of Feistel Network
Autorzy:
Dudek, P.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/121634.pdf
Data publikacji:
2011
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
Feistel network
sat-based cryptanalysis
cryptographic functions
sieć Feistela
satelitarna kryptoanaliza
funkcje kryptograficzne
Opis:
It is well known that Feistel Network (FN) is the foundation of many symmetric ciphers used in practice. In this paper we present some remarks and experimental results on SAT based cryptanalysis of several modified versions of FN. We investigate different cryptographic functions used in FN schema for better understanding their properties from a security point of view. In our work we study the notions widely used in many ciphers: the xor function, bits rotations, permutations and S-boxes.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2011, 16; 103-110
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On some specification languages of cryptographic protocols
Autorzy:
Dudek, P.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/122012.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
cryptographic protocol
HLPSL language
VerICS system
protokół kryptograficzny
język HLPSL
system VerICS
Opis:
A key element of the security systems in computer networks are cryptographic protocols (CP). These protocols are concurrent algorithms used to provide relevant system security goals. Their main purpose is, for example, amutual authentication (identification) of communicating parties (users, servers), distribution of new keys and session encryption. Literature indicates numerous errors in protocol constructions. Thus, there is a need to create methods for CP specification and verification. In this paper, we investigate a problem of CP specification. The paper discusses the so-called Common Language - the simplest language of CP specification and HLPSL - a specification language used in the European verification project Avispa. Finally, we introduce PTL - the new language developed for CP specification which allows fully automatic verification.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2010, 15; 121-130
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Security Properties of RC5 cipher’s Non Standard Modifications
Autorzy:
Kozakiewicz, A.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/122024.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
sieć komputerowa
kryptografia
bezpieczeństwo danych
computer network
cryptography
data security
Opis:
The RC5 algorithm is the cipher from the family of symmetric ciphers created by Ronald Rivest. Unlike other encryption algorithms, RC5 is designed this way, that a user or a security system architect can change some of its parameters. RC5 is a block cipher processing cipher-text blocks in the sequential rounds, where input of each round is the output of the previous one. In each round data is processed with usage of the key. The parameters of the cipher that can be changed are following: length of the key, length of the processed block and number of rounds. These parameters should be chosen based on the required level of security of communication. However there are such structures in RC5 that use of them is not entirely clear from the point of view for algorithm’s security. The aim of this paper is to examine how a cryptographic power of the cipher is affected by modifications to these structures. For this purpose will be used the well-known NIST tests.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2016, 21; 115-122
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An approach to exponentiation with interval-valued power
Autorzy:
Tikhonenko-Kędziak, A.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/122552.pdf
Data publikacji:
2016
Wydawca:
Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
Tematy:
IVFS
interval-values fuzzy sets
DST
Dempster-Shafer theory
operations on IVFS’s
teoria Dempster-Shafera
zbiory rozmyte
interwałowe zbiory rozmyte
Opis:
The main aim of the work is introducing an operation of raising intuitionistic fuzzy values to intuitionistic fuzzy power, which not requiring to conversion of intuitionistic fuzzy values. Introducing an operation of raising intuitionistic fuzzy values to intuitionistic fuzzy power, which does not require conversion of intuitionistic fuzzy values is the main aim of the work. It is known that, in the classical intuitionistic fuzzy sets theory, the use of all aggregation modes is not always possible because of the lack of definition of raising intuitionistic fuzzy values to intuitionistic fuzzy power. Therefore, the specific aim of the work is to present the heuristic method of raising intuitionistic fuzzy values to intuitionistic fuzzy power, and the consideration of its properties.
Źródło:
Journal of Applied Mathematics and Computational Mechanics; 2016, 15, 4; 157-169
2299-9965
Pojawia się w:
Journal of Applied Mathematics and Computational Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Some Remarks of Different Aggregation Modes Applications Within the Framework of Intuitionistic Fuzzy Weights
Autorzy:
Tikhonenko-Kędziak, A.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/121800.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
zbiór rozmyty
liczba rzeczywista
MCDM
fuzzy set
real numbers
Opis:
In the classical intuitionistic fuzzy sets theory it is known, that the use of all aggregation modes is not always possible, because of the lack of definition of raising intuitionistic fuzzy values to the intuitionistic fuzzy power. The main aim of this work is to introduct an operation of raising of intuitionistic fuzzy values to an intuitionistic fuzzy power,which does not require conversion to intuitionistic fuzzy values. Additionally, we will present a heuristic method of raising an intuitionistic fuzzy values to the intuitionistic fuzzy power and consideration about its properties.
Źródło:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics; 2016, 21; 145-159
2450-9302
Pojawia się w:
Scientific Issues of Jan Długosz University in Częstochowa. Mathematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Timed models of security protocols including delays in the network
Autorzy:
Szymoniak, S.
Kurkowski, M.
Piątkowski, J.
Powiązania:
https://bibliotekanauki.pl/articles/122609.pdf
Data publikacji:
2015
Wydawca:
Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
Tematy:
computer science
mathematical models
informatyka
modele matematyczne
Opis:
A very important part of the network and computer systems is to ensure an appropriate level of information transmission security. Security is based primarily on properly selected communication in security protocol. Unfortunately, the time-dependent protocols are vulnerable to attacks; therefore there is a need to verify these protocols. For verification purposes, protocols can be modeled using timed automata. During the modeling and verification of the protocols, one should also keep in mind delays in the network. So far, delays in the network were not modeled.
Źródło:
Journal of Applied Mathematics and Computational Mechanics; 2015, 14, 3; 127-139
2299-9965
Pojawia się w:
Journal of Applied Mathematics and Computational Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sensory Termoanemometryczne w pomiarach parametrów medium w układzie hydraulicznym
Recent developments in the construction of the thermoanemometric devices
Autorzy:
Biernacki, Z.
Złoto, T.
Kurkowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/158552.pdf
Data publikacji:
2001
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Źródło:
Pomiary Automatyka Kontrola; 2001, R. 47, nr 6, 6; 14-16
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Using probabilistic automata for security protocols verification
Autorzy:
Siedlecka-Lamch, O.
Kurkowski, M.
Piątkowski, J.
Powiązania:
https://bibliotekanauki.pl/articles/122825.pdf
Data publikacji:
2016
Wydawca:
Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
Tematy:
verification of security protocols
probabilistic methods
weryfikacja protokołów bezpieczeństwa
metody probabilistyczne
protokoły uwierzytelniania
Opis:
The article discusses the issues of modeling and the analysis of executions, which is a substantial part of modern communication protocols - authentication protocols, which are generally referred to herein as security protocols. The article presents a way of security protocols executions analysis with the use of probabilistic automata, without well known and widely used perfect cryptography assumption (we assume allowing the possibility of breaking a key with a specified probability). This type of analysis leads to interesting observations about the operation of the protocol and its weaknesses.
Źródło:
Journal of Applied Mathematics and Computational Mechanics; 2016, 15, 2; 119-125
2299-9965
Pojawia się w:
Journal of Applied Mathematics and Computational Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new mathematical model for analytical risk assessment and prediction in IT systems
Autorzy:
Fray, I. E.
Kurkowski, M.
Pejaś, J.
Maćków, W.
Powiązania:
https://bibliotekanauki.pl/articles/206238.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
risk analysis
risk analysis methods
formal model for risk analysis
Opis:
In this paper, we propose a new formal model to describe risk analysis and measurement process for IT systems. Our model complies with international standards and recommendations for non-profit organisations. The model accounts for solutions used in widely known and recommended risk analysis methods and provides for evaluation of efficacy of these solutions. A simple example illustrates the application of the proposed model for effective risk analysis of any IT system.
Źródło:
Control and Cybernetics; 2012, 41, 1; 241-268
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination of heat treatment parameters for heavily - loaded aircraft engine components
Autorzy:
Rokicki, P.
Dychtoń, K.
Nowotnik, A.
Drajewicz, M.
Sieniawski, J.
Kurkowski, D.
Wierzbińska, M
Jakubowicz, G.
Budzik, G.
Powiązania:
https://bibliotekanauki.pl/articles/243068.pdf
Data publikacji:
2013
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
aircraft engine components
vacuum carburizing
heat treatment
quenching
alloy steel microstructure
Opis:
Gears, due to their complex shape, carried load and required accuracy are ones of most complex aircraft engine parts. Single tooth damage usually breaks the power transmission and causes failure of the entire gear system. Adequate sustainability and guarantees of transmission is therefore a condition for secure operation of whole device. Particularly high requirements for reliability are put to transmissions used in the aerospace industry. Due to the loads which are transmitted through the gears, the materials used by the manufacturer must have not only high strength but also show the abrasion resistance of the surface layer and the ductility of the core. Proper parameters matching allows to create an element that can operate at higher stresses and loads. In addition, factor strength and abrasion resistance of the surface layer has a significant impact on the life of the gear. Thermo-chemical treatment of industrial gears is a fundamental process, which gives them adequate mechanical properties regarding loads they carry and the surface conditions of work. Among many methods of thermo-chemical treatment used in the industry, the most distinctive are innovative technologies designed to reduce process costs and being more environmentally friendly. The most promising methods in the discussed field are vacuum carburizing and high-pressure hardening, which by their specification of work significantly reduce the emission of CO2 and the duration of the process, without reducing the quality of the final product. The main aim of the paper is to present criteria for selection of heat treatment parameters as a part of thermo-chemical treatment process performed using vacuum methods. Proper heat treatment parameters are crucial in programming of some of final material characteristics as grain size and retained austenite morphology.
Źródło:
Journal of KONES; 2013, 20, 2; 349-354
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-10 z 10

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies