Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Chmielewski, Łukasz"'
With 5394 security certificates of IT products and systems, the Common Criteria for Information Technology Security Evaluation have bred an ecosystem entangled with various kind of relations between the certified products. Yet, the prevalence and nat
Externí odkaz:
http://arxiv.org/abs/2404.14246
Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural language processing, speech recognition, forecasting, etc. These applications are also used in resou
Externí odkaz:
http://arxiv.org/abs/2401.13575
Over the last decade, applications of neural networks (NNs) have spread to various aspects of our lives. A large number of companies base their businesses on building products that use neural networks for tasks such as face recognition, machine trans
Externí odkaz:
http://arxiv.org/abs/2312.07783
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
Computers & Security, Volume 143, 2024, 103895, ISSN 0167-4048
Products certified under security certification frameworks such as Common Criteria undergo significant scrutiny during the costly certification process. Yet, critical vulnerabilities, including private key recovery (ROCA, Minerva, TPM-Fail...), get d
Externí odkaz:
http://arxiv.org/abs/2311.17603
Autor:
Shelton, Madura A., Chmielewski, Łukasz, Samwel, Niels, Wagner, Markus, Batina, Lejla, Yarom, Yuval
Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist,
Externí odkaz:
http://arxiv.org/abs/2109.11741
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
In Computers & Security August 2024 143
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state
Externí odkaz:
http://arxiv.org/abs/1712.05745
Publikováno v:
Zarządzanie Mediami / Media Management. 8(4):453-463
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1005299
Autor:
Stolecka‐Warzecha, Anna1 (AUTHOR) astolecka@sum.edu.pl, Chmielewski, Łukasz2 (AUTHOR), Wilczyński, Sławomir1 (AUTHOR), Koprowski, Robert3 (AUTHOR)
Publikováno v:
Skin Research & Technology. Jan2023, Vol. 29 Issue 1, p1-10. 10p.
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password
Externí odkaz:
http://arxiv.org/abs/0906.4668