Prof. Zbigniew Kotulski, PhD, DSc |
|
Doctoral thesis
1984 | Funkcjonały charakterystyczne stochastycznych procesów falowych
| 400 |
Habilitation thesis
1993 | Analiza fal stochastycznych w ośrodkach warstwowych metodą macierzy przejścia |
Professor
2008-06-30 | Title of professor |
Supervision of doctoral theses
1. | 2015-10-29 | Oryńczak Grzegorz (UJ) | System agentowy dla wspomagania bezpiecznych usług czasu rzeczywistego | 678 | ||
2. | 2008-10-30 | Kotlarz Piotr (PW) | Sieci neuronowe we wspomaganiu rozwiązywania problemów kryptologii | 614 | ||
3. | 2005 | Kulesza Kamil | Secret sharing schemes for graphs (Schematy podziału sekretu dla grafów) |
Recent publications
1. | Szałachowski P.♦, Kotulski Z., One-Time Broadcast Encryption Schemes in Distributed Sensor Networks, International Journal of Distributed Sensor Networks, ISSN: 1550-1329, DOI: 10.1155/2012/536718, pp.1-9, 2012 Abstract: Broadcasting is a message-transferring method characteristic for majority of sensor networks. Broadcast encryption (BE) is broadcasting encrypted messages in such a way that only legitimate nodes of a network can decrypt them. It has many potential applications in distributed wireless sensor networks (WSNs) but perfect deploying of that method is very difficult. This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. Furthermore, an attacker in this environment is powerful. He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient. This paper describes several BE schemes from the point of view of WSNs. We present in details the schemes called onetime, and we show how these methods can be applied in distributed sensor networks. We mainly focus on data origin authentication and rekeying processes, crucial for security in such a hostile environment. An analysis and evaluations of proposed schemes are also provided. Affiliations:
| |||||||||||||||||||
2. | Ciszkowski T.♦, Mazurczyk W.♦, Kotulski Z., Hoßfeld T.♦, Fiedler M.♦, Collange D.♦, Towards Quality of Experience-based reputation models for future web service provisioning, TELECOMMUNICATION SYSTEMS, ISSN: 1018-4864, DOI: 10.1007/s11235-011-9435-2, Vol.51, pp.283-295, 2012 Abstract: This paper concerns the applicability of reputations systems for assessing Quality of Experience (QoE) for web services in the Future Internet. Reputation systems provide mechanisms to manage subjective opinions in societies and yield a general scoring of a particular behavior. Thus, they are likely to become an important ingredient of the Future Internet. Parameters under evaluation by a reputation system may vary greatly and, particularly, may be chosen to assess the users’ satisfaction with (composite) web services. Currently, this satisfaction is usually expressed by QoE, which represents subjective users’ opinions. The goal of this paper is to present a novel framework of web services where a reputation system is incorporated for tracking and predicting of users’ satisfaction. This approach is a beneficial tool which enables providers to facilitate service adaptation according to users’ expectations and maintain QoE at a satisfactory level. Presented reputation systems operate in an environment of composite services that integrate client and server-side. This approach is highly suitable for effective QoE differentiating and maximizing user experience for specific customer profiles as even the service and network resources are shared. Keywords:Reputation systems, Quality of Experience (QoE), Web services, Service composition, Future Internet Affiliations:
| |||||||||||||||||||
3. | Iwankiewicz R.♦, Kotulski Z., Preface to Probabilistic Engineering Mechanics, PROBABILISTIC ENGINEERING MECHANICS, ISSN: 0266-8920, DOI: 10.1016/j.probengmech.2010.07.004, Vol.26, No.1, pp.1-4, 2011 | |||||||||||||||||||
4. | Ciszkowski T.♦, Dunajewski I., Kotulski Z., Reputation as optimality measure in Wireless Sensor Network-based monitoring systems, PROBABILISTIC ENGINEERING MECHANICS, ISSN: 0266-8920, DOI: 10.1016/j.probengmech.2010.06.009, Vol.26, No.1, pp.67-75, 2011 Abstract: In this paper we propose a new optimality measure for Wireless Sensor Network-based structural monitoring systems. First, we present the results of experiments showing the reasons for random effects in Wireless Sensor Network (WSN) functioning. Then, the formulas for calculating a network’s reputation measure are given. Finally, we conclude with arguments for the application of the reputation-based optimality measure in WSNs. We propose significantly new recommendations for the design and usage of WSNs. Keywords:Optimal sensors’ location, Wireless Sensor Network, Reputation system, Structural monitoring Affiliations:
| |||||||||||||||||||
5. | Kucharzewski Ł.♦, Kotulski Z.♦, Mobile identity management system in heterogeneous wireless networks, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.141-153, 2011 | |||||||||||||||||||
6. | Szałachowski P.♦, Kotulski Z., Secure time information in the Internet Key Exchange Protocol, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.41-56, 2011 | |||||||||||||||||||
7. | Oryńczak G.♦, Kotulski Z., Non cryptographic methods for improving real time transmission security and integrity, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.71-86, 2011 | |||||||||||||||||||
8. | Oryńczak G.♦, Kotulski Z., Agent based infrastructure for real-time applications, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI XI, No.4, pp.33-47, 2011 | |||||||||||||||||||
9. | Kukiełka P.♦, Kotulski Z., Systemy wykrywania intruzów wykorzystujące metody sztucznej inteligencji, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIV, No.4, pp.114-121, 2011 | |||||||||||||||||||
10. | Cabaj K.♦, Kołaczek G.♦, Konorski J.♦, Pacyna P.♦, Kotulski Z.♦, Kucharzewski Ł.♦, Szałachowski P.♦, Architektura bezpieczeństwa Systemu IIP na poziomie wirtualizacji zasobów, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIV LXXX, pp.846-851, 2011 | |||||||||||||||||||
11. | Rusinek D.♦, Księżopolski B.♦, Kotulski Z., Wpływ czynników komunikacyjnych na usługę dostępności w bezprzewodowych sieciach sensorycznych czasu rzeczywistego, STUDIA INFORMATICA, ISSN: 0208-7286, Vol.32, No.3A(98), pp.187-198, 2011 | |||||||||||||||||||
12. | Oryńczak G.♦, Kotulski Z., Agent-based VoIP application with reputation mechanisms, Advances in Electronics and Telecommunications, ISSN: 2081-8580, Vol.2, No.3, pp.88-92, 2011 | |||||||||||||||||||
13. | Szałachowski P.♦, Księżopolski B.♦, Kotulski Z., CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, INFORMATION PROCESSING LETTERS, ISSN: 0020-0190, DOI: 10.1016/j.ipl.2010.01.004, Vol.110, No.7, pp.247-251, 2010 Abstract: Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented. Keywords:Wireless sensor network, Cryptographic protocols, Block cipher modes, Sensor's security, Utilization efficiency Affiliations:
| |||||||||||||||||||
14. | Polak L.♦, Kotulski Z., Sending Hidden Data Through www Pages: Detection and Prevention, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.58, No.1–2, pp.75-89, 2010 | |||||||||||||||||||
15. | Kotulski Z.♦, Kucharzewski Ł.♦, Margasiński I.♦, Bezpieczeństwo w sieciach telekomunikacyjnych, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, No.4, pp.137-138, 2010 | |||||||||||||||||||
16. | Kucharzewski Ł.♦, Kotulski Z.♦, Mobilne sieci przyszłości-architektura i bezpieczeństwo WiMAX i LTE, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, pp.919-928, 2010 | |||||||||||||||||||
17. | Kotlarz P.♦, Kotulski Z., Neuronowy układ dec2bin perspektywy implementacji w języku Erlang, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, pp.1115-1123, 2010 | |||||||||||||||||||
18. | Kucharzewski Ł.♦, Kotulski Z., WiMAX Networks - architecture and data security, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, DOI: 10.2478/v10065-011-0022-7, Vol.X, No.2, pp.177-185, 2010 | |||||||||||||||||||
19. | Księżopolski B.♦, Kotulski Z., Middleware non-repudiation service for the data warehouse, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, DOI: 10.2478/v10065-010-0043-7, Vol.AI X, No.1, pp.131-144, 2010 | |||||||||||||||||||
20. | Kukiełka P.♦, Kotulski Z., Analysis of neural networks usage for detection of a new attack in IDS, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI X, No.1, pp.51-59, 2010 | |||||||||||||||||||
21. | Jastrzębski K.♦, Kotulski Z., On improved image encryption scheme based on chaotic map lattices, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.57, No.2, pp.89-104, 2009 | |||||||||||||||||||
22. | Dunajewski I., Kotulski Z., Optimal wireless sensors` location for monitoring of structures in randomly disturbed environment, Proceedings in Applied Mathematics and Mechanics, ISSN: 1617-7061, DOI: 10.1002/pamm.200910251, Vol.9, pp.557-558, 2009 Abstract: In the paper we present the specific conditions that appear in structures' monitoring by means of Wireless Sensor Networks (WSN). First, we introduce the problem of optimal sensors' location for structures monitoring and its specific constraints if one uses WSN. We formulate the conditions that must be taken into account during optimization. Then, we give an example of temperature measurements and formulate the procedure that leads to finding optimal wireless sensors locations. Finally, we present the experimental observations of wireless sensors in the network that strongly affect on the temperature estimation on a basis of the collected measurements. We conclude with remarks concerning WSN practical design for permanent structures' monitoring to obtain exact and reliable results. Affiliations:
| |||||||||||||||||||
23. | Majkowski P.♦, Wojciechowski T.♦, Wojtyński M.♦, Kotulski Z.♦, Rawski M.♦, Analiza możliwości sprzętowej kryptoanalizy szyfrów opartych na krzywych eliptycznych, POMIARY AUTOMATYKA KONTROLA, ISSN: 0032-4140, Vol.54, No.8, pp.536-539, 2008 | |||||||||||||||||||
24. | Kotlarz P.♦, Kotulski Z., Neuronowa realizacja nieliniowych przekształceń szyfrujących, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXI, pp.1293-1303, 2008 | |||||||||||||||||||
25. | Księżopolski B.♦, Kotulski Z., Adaptable security mechanism for dynamic environments, COMPUTERS AND SECURITY, ISSN: 0167-4048, DOI: 10.1016/j.cose.2006.11.002, Vol.26, No.3, pp.246-255, 2007 Abstract: Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security by applying the present-day information technology. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. In this paper we present a mechanism of adaptable security for, digital information transmission systems (being usually the crucial part of e-service). It makes it possible to guarantee the adequate level of protection for actual level of threats dynamically changing in the environment. In our model the basic element of the security is the Public Key Infrastructure (PKI) is enriched with specific cryptographic modules. Keywords:Network security, Information security, Cryptographic protocol, Cryptography, Risk management, Scalable security Affiliations:
| |||||||||||||||||||
26. | Kulesza K., Kotulski Z., On ASGS framework: general requirements and an example of implementation, Journal of Zhejiang University-SCIENCE A, ISSN: 1673-565X, DOI: 10.1631/jzus.2007.A0511, Vol.8, No.4, pp.511-521, 2007 Abstract: In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are portable into the realm of quantum computing. Secret sharing, Security protocols, Dependable systems, Authentication management Affiliations:
| |||||||||||||||||||
27. | Mazurczyk W.♦, Kotulski Z., Lightweight security mechanism for PSTN-IP telephony convergence, IJCSNS International Journal of Computer Science and Network Security, ISSN: 1738-7906, Vol.7, No.5, pp.35-41, 2007 | |||||||||||||||||||
28. | Zwierko A.♦, Kotulski Z., Integrity of mobile agents: a new approach, International Journal of Network Security, ISSN: 1816-3548, Vol.4, No.2, pp.201-211, 2007 Abstract: The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not only secure the compiled program, but also the data, that can be gathered during its journey and even the execution state. Some other approaches base on prevention rather than detection. This paper describes a new idea of securing mobile agents. The presented method protects all: the code, the data and the execution state. The proposal is based on a zero-knowledge proof system and a secure secret sharing scheme, two powerful cryptographic primitives. The paper also includes security analysis of the new method and comparison to currently most widespread solutions. Keywords:Agent systems, cryptographic protocols, integrity, mobile code Affiliations:
| |||||||||||||||||||
29. | Kotulski Z., Szczepiński W., On a model for prediction of the movements of a crowd in narrow exits, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.53, No.4, pp.347-361, 2005 | |||||||||||||||||||
30. | Szczepański J., Kotulski Z., Pseudorandom Number Generators Based on Chaotic Dynamical Systems, Open Systems & Information Dynamics, ISSN: 1230-1612, DOI: 10.1023/A:1011950531970, Vol.8, No.2, pp.137-146, 2001 Abstract: Pseudorandom number generators are used in many areas of contemporary technology such as modern communication systems and engineering applications. In recent years a new approach to secure transmission of information based on the application of the theory of chaotic dynamical systems has been developed. In this paper we present a method of generating pseudorandom numbers applying discrete chaotic dynamical systems. The idea of construction of chaotic pseudorandom number generators (CPRNG) intrinsically exploits the property of extreme sensitivity of trajectories to small changes of initial conditions, since the generated bits are associated with trajectories in an appropriate way. To ensure good statistical properties of the CPRBG (which determine its quality) we assume that the dynamical systems used are also ergodic or preferably mixing. Finally, since chaotic systems often appear in realistic physical situations, we suggest a physical model of CPRNG. Affiliations:
| |||||||||||||||||||
31. | Kotulski Z., Szczepański J., Górski K.♦, Paszkiewicz A.♦, Zugaj A.♦, Application of discrete chaotic dynamical systems in cryptography - DCC method, International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, ISSN: 0218-1274, DOI: 10.1142/S0218127499000778, Vol.9, No.6, pp.1121-1135, 1999 Abstract: In the paper we propose a method of constructing cryptosystems, utilizing a nonpredictability property of discrete chaotic systems. We point out the requirements for such systems to ensure their security. The presented algorithms of encryption and decryption are based on multiple iteration of a certain dynamical chaotic system coming from gas dynamics models. A plaintext message specifies a part of the initial condition of the system (a particle's initial position). A secret key specifies the remaining part of initial condition (the particle's initial angle) as well as a sequence of discrete choices of the pre-images in the encryption procedure. We also discuss problems connected with the practical realization of such chaotic cryptosystems. Finally we demonstrate numerical experiments illustrating the basic properties of the proposed cryptosystem. Affiliations:
| |||||||||||||||||||
32. | Kotulski Z., Analiza fal w stochastycznych ośrodkach warstwowych metodą macierzy przejścia (Praca habilitacyjna), Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.10, pp.1-198, 1993 | |||||||||||||||||||
33. | Kotulski Z., Szczepiński W., On Two Methods of Determining the Ellipses and Ellipsoids of Positioning Accuracy of Robot Manipulators, Prace IPPT - IFTR Reports, ISSN: 2299-3657, DOI: 10.1007/BF00787907, No.15, pp.1-32, 1992 Abstract: When analysing the problem of the positioning accuracy of robot manipulators it is important to know how far random deviations of the hand may be from the desired position if the joint positioning errors possess a normal distribution. Two methods of determining the ellipses and ellipsoids of probability concentration are compared. The first of them is based on the standard procedure of the probability calculus. The second approximate method consists in finding at first the polygon or polyhedron of the positioning accuracy, and then in finding the ellipse or ellipsoid with principal axes and second order moments coinciding with those of the polygon or polyhedron, respectively. Examples of application demonstrate that these two methods give very close results. Affiliations:
| |||||||||||||||||||
34. | Kotulski Z., On the Effective Reflection Properties of the Randomly Segmented Elastic Bar, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.31, pp.1-43, 1992 | |||||||||||||||||||
35. | Kotulski Z., Sobczyk K., Non-local Description of Pollution Transport in Random Medium, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.34, pp.1-22, 1992 | |||||||||||||||||||
36. | Kotulski Z., Equations for the characteristic Functional and Moments of the Complex Stochastic Evolutions, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.38, pp.1-20, 1988 | |||||||||||||||||||
37. | Kotulski Z., Funkcjonały charakterystyczne stochastycznych procesów falowych (Praca doktorska), Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.14, pp.1-166, 1984 |
List of recent monographs
1. 26 | Kotulski Z., Szczepiński W., Error Analysis with Applications in Engineering, Series: Solid Mechanics and Its Applications, Springer, 169, pp.1-284, 2010 |
2. 77 | Kotulski Z., Kowalczyk P., Sosnowski W., Selected topics of contemporary solid mechanics. Proceedings of the 36th Solid Mechanics Conference, Gdańsk, Poland, September 9–12, 2008, IPPT PAN (Warszawa), Kotulski Z.A., Kowalczyk P., Sosnowski W. (Red.), pp.1-442, 2008 |
3. 120 | Kotulski Z., Nowicki A., Szczepiński W., Wprowadzenie do teorii fal naprężeń i deformacji w zastosowaniach technicznych i do diagnostyki ultradźwiękowej, BEL Studio (Warszawa), pp.1-271, 2008 |
List of chapters in recent monographs
1. 50 | Szałachowski P.♦, Kotulski Z., Księżopolski B.♦, CN 2011, Communications in Computer and Information Science, rozdział: Secure position-based addressing scheme for WSN communication, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 160, pp.386-397, 2011 | |
2. 39 | Szałachowski P.♦, Księżopolski B.♦, Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: On authentication method impact upon data sampling delay in Wireless Sensor Networks, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.280-289, 2010 | |
3. 37 | Księżopolski B.♦, Szałachowski P.♦, Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: SPOT: Optimization tool for network adaptable security, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.269-279, 2010 | |
4. 138 | Księżopolski B.♦, Kotulski Z., Szałachowski P.♦, Computer networks, communications in computer and information science, rozdział: Approach to network security, Springer, Kwiecień A., Gaj P., Stera P. (Eds.), 39, pp.233-241, 2009 | |
5. 230 | Kotlarz P.♦, Kotulski Z., Multimedia w biznesie i zarządzaniu, rozdział: Sieć S-P w implementacji neuronowej, Difin (Warszawa), Kiełtyk L. (Ed.), pp.490-497, 2009 | |
6. 151 | Ciszkowski T.♦, Kotulski Z., Handbook of research on wireless security, rozdział: Secure routing with reputation in MANET, Idea Group Inc. (United States), Yan ZHANG, Jun ZHENG, Miao MA (Eds.), pp.449-460, 2008 | |
7. 152 | Kotulski Z., Zwierko A.♦, Handbook of research on wireless security, rozdział: Security of mobile code, Idea Group Inc. (United States), Yan ZHANG, Jun ZHENG, Miao MA (Eds.), pp.28-43, 2008 | |
8. 173 | Kotulski Z., Zwierko A.♦, Mobile computing: Concepts, methodologies, tools, and applications, rozdział: Security of mobile code, Idea Group Inc. (United States), Taniar D. (Ed.), pp.2583-2599, 2008 | |
9. 177 | Zwierko A.♦, Kotulski Z., Next generation internet networks, 1st EuroNGI Conference on Next Generation Internet Networks - Traffic Engineering /NGI 2005 / Rome, April 18-20, rozdział: A new protocol for group authentication providing partial anonymity, IEEE Press, pp.356-363, 2005 |
Conference papers
1. | Księżopolski B.♦, Kotulski Z., Szałachowski P.♦, On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.195-202, 2011 Abstract: Cryptographic protocols are secure due to application of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In the real-time protocols as the video conference, the goal is both secure data transmission and good signal quality. When one of the goals is not ensured, the availability of the goal of the protocol is not guaranteed and the cryptographic protocol can not be realized. In this article we present the methodology of obtaining the balance between the quality of the signal in real-time systems and accomplishment of the required security services. Finally, the case study of video conference secured by VPN connections, is presented. Affiliations:
| ||||||||||
2. | Oryńczak G.♦, Kotulski Z., Agent-based VoIP application with reputation mechanisms, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.203-207, 2011 | ||||||||||
3. | Piekarski A.♦, Kotulski Z., Społeczne uwarunkowania dostępu do usług i sieci następnych generacji we wschodniej Polsce, Konferencja Usługi i sieci teleinformatyczne następnej generacji - aspekty techniczne, aplikacyjne i rynkowe, 2010-11-23/11-24, Warszawa (PL), pp.1-7, 2010 | ||||||||||
4. | Zwierko A.♦, Kotulski Z., A light-weight e-voting system with distributed trust, Electronic Notes in Theoretical Computer Science, ISSN: 1571-0661, DOI: 10.1016/j.entcs.2006.12.004, Vol.168, pp.109-126, 2007 Abstract: A new agent-based scheme for secure electronic voting is proposed in the paper. The scheme is universal and can be realized in a network of stationary and mobile electronic devices. The proposed mechanism supports the implementation of a user interface simulating traditional election cards, semi-mechanical voting devices or utilization purely electronic voting booths. The security mechanisms applied in the system are based on verified cryptographic primitives: the secure secret sharing scheme and Merkle's puzzles. Due to pre-computations during the generation of agent, the voter need not to do computations. The proposed distributed trust architecture makes the crucial stage of sending votes elastic, reliable, and effective. Keywords:electronic elections, secret sharing scheme, Merkle's puzzles, mixnets, mobile agent security, distributed trust Affiliations:
| ||||||||||
5. | Mazurczyk W.♦, Kotulski Z., New VoIP traffic security scheme with digital watermarking, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11875567_13, Vol.4166, pp.170-181, 2006 Abstract: In this paper we propose a new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is based on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security. Affiliations:
| ||||||||||
6. | Kulesza K., Kotulski Z., On mobile agents resistant to traffic analysis, Electronic Notes in Theoretical Computer Science, ISSN: 1571-0661, DOI: 10.1016/j.entcs.2004.12.044, Vol.142, pp.181-193, 2006 Abstract: This paper will concern itself with a formulation of a traffic analysis problem for mobile agents. It is an interesting theoretical problem as well as a critical feature when using agents on a massive scale in decision making systems. The decision making systems are applied to demanding and complex environments such as stock markets. The mobile agents used are natural targets for attacks because they provide information for decision making. The resulting information can have a value measured in millions of dollars and information of such a high value attracts potential attacks. An efficient way to attack the user of decision making systems is to learn her strategy and respond in kind. In this respect even passive observation of agents can provide useful data, namely what information they are gathering. A common first defense is to provide anonymity for mobile agents. However, what happens when anonymity is gone? What information then becomes available and what steps will the user take? Yet, the problem has not been previously formulated for such a framework. We formulate it in terms of various factors used for traffic analysis. These factors originate from different side channels that provide information on the operating agents. At the end we state a paradox, which links an excessive use of countermeasures against traffic analysis with weakening system security. Keywords:Mobile agents security, security protocols, traffic analysis, side channel attacks Affiliations:
| ||||||||||
7. | Kotlarz P.♦, Kotulski Z., On application of neural networks for S-boxes design, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11495772_38, Vol.3528, pp.243-248, 2005 | ||||||||||
8. | Zwierko A.♦, Kotulski Z., Mobile agents: preserving privacy and anonymity, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11558637_25, Vol.3490, pp.246-258, 2005 | ||||||||||
9. | Kulesza K., Kotulski Z., Addressing new challenges by building security protocols around graphs, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11542322_36, Vol.3364, pp.301-306, 2005 | ||||||||||
10. | Wierzbicki A.♦, Zwierko A.♦, Kotulski Z., Authentication with controlled anonymity in P2P systems, WCU-UI-2005, World Congress on Ultrasonics - Ultrasonics International 2005, 2005-08-29/09-01, Pekin (CN), DOI: 10.1109/PDCAT.2005.95, pp.871-875, 2005 |