PET waste classification method and plastic waste database-WaDaBa J Bobulski, J Piatkowski Image Processing and Communications Challenges 9: 9th International …, 2018 | 39 | 2018 |
Information Technologies supporting students’ mobility T Walasek, J Piątkowski, D Morawska-Walasek Journal of Achievements in Materials and Manufacturing Engineering 25 (1), 83-86, 2007 | 16 | 2007 |
Timed models of security protocols including delays in the network S Szymoniak, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 14 (3), 127--139, 2015 | 13 | 2015 |
ProToc—An universal language for security protocols specifications A Grosser, M Kurkowski, J Piątkowski, S Szymoniak Soft Computing in Computer and Information Science, 237-248, 2015 | 8 | 2015 |
ProToc-an universal language for security protocols specification,[in:] Advances in Intelligent Systems and Computing, eds. A. Wiliński, IE Fray, J. Pejas M Kurkowski, A Grosser, J Piątkowski, S Szymoniak Springer Verlag 342, 237-248, 2015 | 7 | 2015 |
Using probabilistic automata for security protocols verification O Siedlecka-Lamch, M Kurkowski, J Piątkowski Journal of Applied Mathematics and Computational Mechanics 15 (2), 2016 | 5 | 2016 |
The visualization of shaft vibration using the algorithm of phase-amplitude data interpolation J Piątkowski Journal of Applied Mathematics and Computational Mechanics 15 (1), 2016 | 1 | 2016 |
On-line support of students mobility T Walasek, J Piatkowski, O Stawska, D Morawska-Walasek Proceedings of the 2nd WSEAS/IASME International Conference on Educational …, 2006 | 1 | 2006 |
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework J Piątkowski, S Szymoniak Applied Sciences 13 (23), 12668, 2023 | | 2023 |
Trivializing verification of cryptographic protocols J Piątkowski, S Szymoniak Computer Assisted Methods in Engineering and Science 30 (4), 389-406, 2023 | | 2023 |