Damian Rusinek

Damian Rusinek
  • MsC, PhD student
  • Research Assistant at Maria Curie-Skłodowska University

About

19
Publications
4,496
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
76
Citations
Current institution
Maria Curie-Skłodowska University
Current position
  • Research Assistant
Additional affiliations
January 2009 - December 2012
Maria Curie-Skłodowska University

Publications

Publications (19)
Article
Full-text available
American philosopher John Dewey, in one of his most famous theories about the hands-on approach to learning, said that practical problem-solving and theoretical teaching should go hand-in-hand. This means students must interact with their environment to adapt and learn. Today, we almost take for granted that laboratory classes are an essential part...
Conference Paper
Full-text available
Cybersecurity is frequently mentioned today as one of the necessary competences of the future in the field of information technology. Along with the global digitization of services, the demand for cybersecurity specialists continues to grow. At the same time, there are still very few specialists in this field, with 5 million jobs currently going un...
Conference Paper
The growing number of mobile devices and the popularity of Internet of Things (IoT) applications have caused an increase of local-area location-aware protocols and applications. Localization has become a popular topic in the literature and many localization algorithms in wireless sensor networks (WSN) have been proposed. However, the most of them a...
Conference Paper
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible secur...
Conference Paper
Full-text available
Analysis of security economics for the IT systems is one of the important issues to be solved. The quality of protection (QoP) of IT System can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, se- curity engineers configure IT systems with the strongest possible sec...
Conference Paper
Full-text available
Balancing security against performance for IT systems is one of the most important issues to be solved. The quality of protection of systems can be achieved on different levels. One can choose factors which have a different impact on the overall system security. Traditionally, security engineers configure IT systems with the strongest possible secu...
Article
Full-text available
With a rapid progress of numerous applications in wireless sensor networks (WSNs), performance evaluation and analysis techniques face new challenges in energy efficiency area in WSN applications. One of the key issues is to perform the security trade-off and energy efficiency analysis. In this paper, the energy analysis module for the QoP-ML (Qual...
Conference Paper
Full-text available
Designing secure authentication mechanisms in wireless sensor networks in order to associate a node to a secure network is not an easy task due to the limitations of this type of networks. In this paper, we propose different multihop node authentication protocols for wireless sensor networks. For each protocol, we provide a formal proof using Scyth...
Conference Paper
Reputation systems are an important factor for building trust in virtual communities. In the article we introduce reputation module for Quality of Protection Modelling Language which allows to represent the reputation system as a part of the protocol, where all operations and communication steps can be consistently modelled. Owing to the proposed a...
Article
Full-text available
The ensuring reliability of wireless sensor networks (WSN) is one of most important problems to be solved. In this article, the influence of the security and communication factors in the reliability of wireless sensor networks was analyzed. Balancing security against performance in WSN is another issue to be solved. These factors should be consider...
Conference Paper
The problem of efficiency in the IT systems is now widely discussed. One of the factors affecting the performance of IT systems is implementation and maintaining a high level of security. In many cases the guaranteed security level is too high in relation to the real threats. The implementation and maintenance of this protection level is expensive...
Article
Full-text available
In this paper we examine the inuence of dierent types of encryption and authentication on the quality of transmitted data in high-performance WSN based on Imote2. The performance has been tested in wireless sensor network using Collection Tree Protocol. The examined types and modes of encryption are provided by the hardware of used sensor platforms...
Article
Full-text available
The security modelling of IT systems is a very complicated task. One of the issues which must be analysed is the performance of IT systems. In many cases the guaranteed security level is too high in relation to the real threats. The overestimation of security measures can decrease system performance. The paper presents the analysis of Kerberos cryp...
Conference Paper
Full-text available
Recently, we have observed the growth of the E-voting cryptographic protocols. The researchers have presented many solutions and extended the list of requirements. With the expandig of the internet the protocols must improve it's safety. The aim of this paper is to deliver an analysis of a new e-voting protocol based on Cetinkaya's DynaVote solutio...

Questions

Question (1)
Question
Hi,
I have a question regarding a customized version of ElGamal encryption.
Let g, h, x be the generator, the public key (g^x) and the secret key in ElGamal.
To encrypt the message we select random number r and publish (g^r, m * g^{rx}), where m is the message.
Additionally, we select another random number s and publish: s+x, g^{rs}, public key and ecneypted message.
Is it possible to get s, x or g^{rx}?
Thanks,
Damian

Network

Cited By