Search Results - "Klonowski, Marek"
-
1
Energy-optimal algorithms for computing aggregative functions in random networks
Published in Discrete mathematics and theoretical computer science (25-07-2016)“…We investigate a family of algorithms minimizing energetic effort in random networks computing aggregative functions. In contrast to previously considered…”
Get full text
Journal Article -
2
Provable Unlinkability Against Traffic Analysis with Low Message Overhead
Published in Journal of cryptology (01-07-2015)“…Rackoff and Simon proved that a variant of Chaum’s protocol for anonymous communication, later developed as the Onion Routing Protocol, is unlinkable against a…”
Get full text
Journal Article -
3
On the Dynamics of Systems of Urns
Published in Discrete mathematics and theoretical computer science (16-10-2015)“…In this paper we present an analysis of some generalization of the classic urn and balls model. In our model each urn has a fixed capacity and initially is…”
Get full text
Journal Article -
4
Extremely compact video representation for efficient near-duplicates detection
Published in Pattern recognition (01-02-2025)“…With the influx of online video uploads, a robust method for detecting video copies under various distortions is essential for copyright protection and search…”
Get full text
Journal Article -
5
Restrained medium access control on adversarial shared channels
Published in Journal of computer and system sciences (01-12-2023)“…We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are…”
Get full text
Journal Article -
6
User authorization based on hand geometry without special equipment
Published in Pattern recognition (01-01-2018)“…•We present a biometric identification protocol based on hand geometry that does not require any special devices (we use standard office scanners).•Our method…”
Get full text
Journal Article -
7
Enhancing privacy for ad hoc systems with predeployment key distribution
Published in Ad hoc networks (01-05-2017)“…Achieving security in distributed systems of constrained devices (like Wireless Sensor Networks) requires methods that can be performed while very limited…”
Get full text
Journal Article -
8
Generalized framework for Group Testing: Queries, feedbacks and adversaries
Published in Theoretical computer science (05-06-2022)“…In the Group Testing problem, the objective is to learn a subset K of some much larger domain N, using the shortest-possible sequence of queries Q. A feedback…”
Get full text
Journal Article -
9
New View on Adversarial Queueing on MAC
Published in IEEE communications letters (01-04-2021)“…This work proposes an average-case performance measurement as a meaningful and non-trivial way of evaluating and comparing queueing protocols on a…”
Get full text
Journal Article -
10
How to obfuscate execution of protocols in an ad hoc radio network?
Published in Ad hoc networks (01-03-2019)“…We consider an ad hoc radio network in which nodes perform some distributed algorithms. We provide a framework, that at the cost of increasing time complexity,…”
Get full text
Journal Article -
11
On practical privacy-preserving fault-tolerant data aggregation
Published in International journal of information security (01-06-2019)“…In this paper, we propose a fault-tolerant privacy-preserving data aggregation protocol which utilizes limited local communication between nodes. As a starting…”
Get full text
Journal Article -
12
Stronger trust and privacy in social networks via local cooperation1
Published in Journal of complex networks (09-10-2020)“…In our article, we present several protocols that allow to efficiently construct large groups of users based only on local relations of trust. What is more,…”
Get full text
Journal Article -
13
Light-weight and secure aggregation protocols based on Bloom filters
Published in Computers & security (01-01-2018)“…In this paper we present a light-weight data aggregation protocol based on probabilistic data structure used for representing a subset of elements called Bloom…”
Get full text
Journal Article -
14
Energy-Efficient Leader Election Protocols for Single-Hop Radio Networks
Published in 2013 42nd International Conference on Parallel Processing (01-10-2013)“…In this paper we investigate leader election protocols for single-hop radio networks from the perspective of energetic complexity. We discuss different models…”
Get full text
Conference Proceeding -
15
Ordered and delayed adversaries and how to work against them on a shared channel
Published in Distributed computing (01-10-2019)“…An execution of a distributed algorithm is often seen as a game between the algorithm and a conceptual adversary causing specific distractions to the…”
Get full text
Journal Article -
16
Contention resolution on a restrained channel
Published in 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS) (01-12-2020)“…We examine deterministic contention resolution on a multiple-access channel when packets are injected continuously by an adversary to the buffers of n…”
Get full text
Conference Proceeding -
17
Exact and Efficient Protective Jamming in SINR-based Wireless Networks
Published in 2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS) (03-11-2021)“…A majority of research in communication in wireless networks is devoted to maximizing information flow, improving connectivity, or making the system robust…”
Get full text
Conference Proceeding -
18
Distributed Alarming in the On-Duty and Off-Duty Models
Published in IEEE/ACM transactions on networking (01-02-2016)“…Decentralized monitoring and alarming systems can be an attractive alternative to centralized architectures. Distributed sensor nodes (e.g., in the smart…”
Get full text
Journal Article -
19
Preliminary Report: On Information Hiding in Multi-Hop Radio Networks
Published 20-11-2023“…In this paper, we consider the problem of an adversary aiming to learn information about the network topology or the executed algorithm from some signals…”
Get full text
Journal Article -
20
Randomized mutual exclusion on a multiple access channel
Published in Distributed computing (01-10-2016)“…In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed…”
Get full text
Journal Article