[14] M.Srokosz, D.Rusinek, B.Ksiezopolski – A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment; 5th Conference on Cryptography and Security Systems – accepted paper.

[13] J.Pyda, W.Prokop, D.Rusinek, B.Ksiezopolski – Secure and reliable localization in Wireless Sensor Network based on RSSI mapping – 24th International Science Conference on Computer Networks CN2017, CCIS Springer

[12] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – AQoPA: Automated Quality of Protection Analysis framework for complex systems – 14th International Conference
on Computer Information Systems and Industrial Management Applications, Warsaw, Springer: LNCS, v.9339, p. 475-486, 2015

[11] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – On the balancing security against performance in database systems – 22nd International Science Conference on Computer Networks, Gliwice, Springer: CCIS, v.522, p. 102-116, 2015.

[10] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – Security trade-off and energy efficiency analysis in Wireless Sensor Networks – International Journal of Distributed Sensor Networks, v.2015, 943475, p.1-17, 2015.

[9] I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, B. Ksiezopolski – Multihop Node Authentication Mechanisms for Wireless Sensor Networks – AdHoc Now 2014, LNCS, 8487, pp. 402-418

[8] D.Rusinek, B.Księżopolski – On the Effect of Security and Communication Factors in the Reliability of Wireless Sensor Networks – J. Sens. Actuator Netw., 3(1), pp. 81-94, 2014

[7] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of the computer security impact on the reputation systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.526-531, 2014

[6] B.Księżopolski, D.Rusinek, A.Wierzbicki – On the efficiency modelling of  cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML) – AsiaARES 2013, LNCS, v. 7804, pp.261-270, 2013

[5] B.Księżopolski, D.Rusinek, A.Wierzbicki – On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) – Annales UMCS Informatica AI XII, 4, pp.69-81, 2012 [pdf]

[4] D.Rusinek, B.Ksiezopolski – Anonymity in E-Government – Information Systems in Management, pp.78-82, 2011 [pdf]

[3] D.Rusinek, B.Ksiezopolski – Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2 Annales UMCS Informatica AI XI, 3, pp.117-127, (2011) [bib]

[2] D.Rusinek, B.Ksiezopolski, Z.Kotulski – On effect of the communication factors on the protocols goal availability service in high performance real-time Wireless Sensor Networks , (In Polish), Studia Informatica 32(3A(98)) (2011).

[1] D.Rusinek, B.Ksiezopolski – Voter non-repudiation oriented scheme for the medium scale e-voting protocol, IEEE Xplore, 9th International Multidisciplinary Conference on e-Commerce and e-Government, Mragowo, Poland, 2009, pp. 325-330 [pdf] [bib]


B.Księżopolski – QoP-ML: Quality of Protection modelling language for cryptographic protocols – Elsevier: Computers & Security 31(4), pp.569-596, 2012 [PDF]