Adam Czubak
Title
Cited by
Cited by
Year
On applications of wireless sensor networks
A Czubak, J Wojtanowski
Internet–technical development and applications, 91-99, 2009
252009
Minimal Büchi automata for certain classes of LTL formulas
J Cichon, A Czubak, A Jasinski
2009 Fourth International Conference on Dependability of Computer Systems, 17-24, 2009
242009
The dangers of key reuse: practical attacks on IPsec {IKE}
D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek
27th {USENIX} Security Symposium ({USENIX} Security 18), 567-583, 2018
82018
Algorithmic complexity vulnerability analysis of a stateful firewall
A Czubak, M Szymanek
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
42017
Lifespan-aware routing for wireless sensor networks
A Czubak, J Wojtanowski
KES International Symposium on Agent and Multi-Agent Systems: Technologies …, 2010
32010
Approximate Algorithm for Fast Capacity Provisioning in WANs with Trade-Off between Performance and Cost under Budget Constraint
M Gola, A Czubak
Proceedings of the Ninth International Conference on Dependability and …, 2014
12014
Designing Frame Relay WAN Networks with Trade-Off between Link Cost and Performance
M Gola, A Czubak
Man-Machine Interactions 3, 559-566, 2014
12014
The network balance realized by routing organization system
H Piech, A Czubak
KES International Symposium on Agent and Multi-Agent Systems: Technologies …, 2011
12011
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
A Czubak, A Jasiński, M Szymanek
International Conference on Computer Networks, 357-372, 2018
2018
The Dangers of Key Reuse-Practical Attacks on IPsec IKE
M Grothe, D Felsch, J Schwenk, A Czubak, M Szymanek
2018
A note on capacity provisioning in SDN service provider network
M Gola, A Czubak
Studia Informatica 36 (4), 17-28, 2015
2015
Metodologia projektowania sieci komputerowych
A Czubak
Strategiczne modelowanie i animowanie rozwoju oraz technologii., 17, 2014
2014
A Note on the Local Minimum Problem in Wireless Sensor Networks
A Czubak
International Conference on Computer Networks, 64-75, 2013
2013
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions
M Gola, A Czubak
New Results in Dependability and Computer Systems, 173-182, 2013
2013
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms
A Czubak
New Results in Dependability and Computer Systems, 109-118, 2013
2013
DRAFT VERSION
M Gola, A Czubak
Bezpieczeństwo sieci komputerowych
M Gola, J Wojtanowski, A Czubak
The system can't perform the operation now. Try again later.
Articles 1–17