咨询与建议

限定检索结果

文献类型

  • 52 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 54 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 18 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 信息与通信工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 9 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 3 篇 理学
    • 3 篇 生物学

主题

  • 15 篇 semantics
  • 15 篇 cryptography
  • 13 篇 information mana...
  • 13 篇 protocols
  • 9 篇 pragmatics
  • 7 篇 companies
  • 6 篇 authentication
  • 6 篇 algorithm design...
  • 5 篇 computers
  • 5 篇 data analysis
  • 4 篇 data mining
  • 4 篇 pattern recognit...
  • 4 篇 visualization
  • 4 篇 biometrics (acce...
  • 4 篇 feature extracti...
  • 3 篇 information syst...
  • 3 篇 grammar
  • 3 篇 classification a...
  • 3 篇 encryption
  • 3 篇 encoding

机构

  • 22 篇 agh university o...
  • 13 篇 cryptography and...
  • 7 篇 pedagogical univ...
  • 2 篇 department of cr...
  • 2 篇 cryptography and...
  • 2 篇 agh university o...
  • 2 篇 pedagogical univ...
  • 2 篇 cryptography and...
  • 2 篇 pedagogical univ...
  • 2 篇 faculty of elect...
  • 2 篇 faculty of manag...
  • 2 篇 cryptography and...
  • 2 篇 institute of com...
  • 2 篇 institute of com...
  • 2 篇 cryptography and...
  • 2 篇 pedagogical univ...
  • 1 篇 department of cr...
  • 1 篇 department of cr...
  • 1 篇 department of ad...
  • 1 篇 cryptography and...

作者

  • 38 篇 marek r. ogiela
  • 23 篇 lidia ogiela
  • 11 篇 tomasz hachaj
  • 10 篇 ogiela marek r.
  • 10 篇 ogiela lidia
  • 9 篇 urszula ogiela
  • 4 篇 katarzyna koptyr...
  • 4 篇 marcin piekarczy...
  • 3 篇 ogiela urszula
  • 2 篇 takizawa makoto
  • 2 篇 hachaj tomasz
  • 1 篇 pawel s. hachaj
  • 1 篇 sulkowski piotr
  • 1 篇 marek r.ogiela
  • 1 篇 rados&#x0142
  • 1 篇 hoon ko
  • 1 篇 aw bu&#x0142
  • 1 篇 at
  • 1 篇 koptyra katarzyn...

语言

  • 53 篇 英文
  • 1 篇 中文
检索条件"机构=AGH University of Science and Technology Cryptography and Cognitive Informatics Laboratory"
54 条 记 录,以下是1-10 订阅
排序:
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 259-278页
作者: Hoon Ko Marek R.Ogiela Division of Computer Science and Engineering Sunmoon UniversityAsan31460Republic of Korea AGH University of Krakow Cryptography and Cognitive Informatics LaboratoryKrakow30-059Poland
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain *** combining the strengths of blockchain and generati... 详细信息
来源: 评论
DNA-based Secret Sharing and Hiding in Dispersed Computing
DNA-based Secret Sharing and Hiding in Dispersed Computing
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Marek R. Ogiela Urszula Ogiela AGH University of Science and Technology Cryptography and Cognitive Informatics Laboratory Krakow Poland
In this paper will be described a new security protocol for secret sharing and hiding, which use selected personal features. Such technique allows to create human-oriented personalized security protocols dedicated for... 详细信息
来源: 评论
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges
Knowledge-Based Approach for Unlocking Divided Secrets in Th...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Marek R. Ogiela Urszula Ogiela Cryptography and Cognitive Informatics Laboratory AGH University of Krakow Krakow Poland Institute of Computer Science AGH University of Krakow Krakow Poland
Among cryptographic techniques for securing information, threshold schemes of secret sharing are also used. Such methods allow the generation of a certain number of secret parts, which require to collect of a specific...
来源: 评论
Personalized cryptography Algorithms – A Comparison Between Classic and cognitive Methods
Personalized Cryptography Algorithms – A Comparison Between...
收藏 引用
IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S)
作者: Radosł aw Buł at Marek R. Ogiela Cryptography and Cognitive Informatics Laboratory AGH University of Science and Technology Krak&#x00F3 w Poland
The main goal of this work is to present a method of personalized cryptography that differs from the biometrical ones by putting in elements of cognitive cryptography and would be useful to work in an IoT environment.... 详细信息
来源: 评论
New cognitive sharing algorithms for cloud service management
New cognitive sharing algorithms for cloud service managemen...
收藏 引用
作者: Ogiela, Lidia Ogiela, Marek R. Pedagogical University of Krakow Kraków Poland Cryptography and Cognitive Informatics Laboratory AGH University of Science and Technology Kraków Poland
This article will present new classes of confidential data management algorithms for the protection and safeguarding of classified data. These algorithms will constitute a solution dedicated to supporting the process ... 详细信息
来源: 评论
Eye movement patterns as a cryptographic lock  12th
Eye movement patterns as a cryptographic lock
收藏 引用
12th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2020
作者: Ogiela, Marek R. Ogiela, Lidia Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology 30 Mickiewicza Ave Kraków30-059 Poland Department of Cryptography and Cognitive Informatics Pedagogical University of Krakow Podchorążych 2 St. Kraków30-084 Poland
Eye tracking technologies play increasing role in advance vision systems, and multimedia applications. Such technologies can be also applied for security purposes, as a contactless devices and user interfaces. High pr... 详细信息
来源: 评论
cognitive security paradigm for cloud computing applications
Cognitive security paradigm for cloud computing applications
收藏 引用
作者: Ogiela, Lidia Ogiela, Marek R. Cryptography and Cognitive Informatics Research Group Pedagogical University of Cracow Kraków Poland Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology Kraków Poland
This article presents new paradigms of confidential data protection. New classes of paradigms are dedicated to enhancing the already-known cryptographic solutions belonging to the group of data sharing schemes. Data s... 详细信息
来源: 评论
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols
Eye Tracking Sensors as a Contactless Interfaces in Wireless...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Marek R. Ogiela Lidia Ogiela Cryptography and Cognitive Informatics Laboratory AGH University of Science and Technology Kraków Poland Pedagogical University of Krakow Kraków Poland
This paper describes new possibilities of eye tracking technology and sensors application in wireless security protocols especially visual authentication codes. A new technique, which are dedicated to deep semantic an... 详细信息
来源: 评论
Eye Tracking technology in Personal Authentication Protocols  1
收藏 引用
34th International Conference on Advanced Information Networking and Applications, AINA 2020
作者: Ogiela, Marek R. Ogiela, Lidia Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology 30 Mickiewicza Avenue Kraków30-059 Poland Department of Cryptography and Cognitive Informatics Pedagogical University of Krakow Podchorążych 2 Street Kraków30-084 Poland
Eye tracking technologies play important role in many VR and AI applications. In this paper will be described some possible solutions based on these technologies, which are oriented for security areas, and user authen... 详细信息
来源: 评论
Eye Movements as a Key in cognitive Authentication Protocols
Eye Movements as a Key in Cognitive Authentication Protocols
收藏 引用
IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM)
作者: Marek R. Ogiela Lidia Ogiela Cryptography and Cognitive Informatics Research Group AGH University of Science and Technology Kraków Poland Department of Cryptography and Cognitive Informatics Pedagogical University of Krakow Kraków Poland
This paper presents new application of eye tracking devices oriented for creation of secure authentication protocols with visual CAPTCHA codes. Many classes of visual CAPTCHA can require specific information, knowledg... 详细信息
来源: 评论