Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adrian Kapczyński is active.

Publication


Featured researches published by Adrian Kapczyński.


TAEBC-2009 | 2009

Internet - Technical Development and Applications

Ewaryst Tkacz; Adrian Kapczyński

Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among researchers, teachers and also students of computer science and related disciplines.


International Conference on Man–Machine Interactions | 2017

Pattern Lock Evaluation Framework for Mobile Devices: Human Perception of the Pattern Strength Measure

Agnieszka Bier; Adrian Kapczyński; Zdzisław Sroczyński

In this paper we present a multiplatform research framework for acquisition of pattern locks and evaluation of their strength. Along with the design features of the framework itself we provide the analysis of the data set of more than 300 pattern locks acquired by means of this solution. In particular we compare the subjective human rating of pattern memorizability and complexity with the numerical values of pattern strength measure.


intelligent data acquisition and advanced computing systems: technology and applications | 2011

Application of quantum cryptography protocols in authentication process

Marcin Sobota; Adrian Kapczyński; Arkadiusz Banasik

This article presents proposition of using quantum cryptography protocols in authentication process. Model is based on BB84 protocol. It is certain that protocol needs a little modification but most fundamental features are kept. Article presents an example model of authentication process.


intelligent data acquisition and advanced computing systems: technology and applications | 2011

Biometric logical access control enhanced by use of steganography over secured transmission channel

Adrian Kapczyński; Arkadiusz Banasik

In the paper we present a novel approach to logical access control to secured repository or container by integration of methods related to cryptography, steganography and biometrics.


CISIS | 2009

The Concept of Application of Fuzzy Logic in Biometric Authentication Systems

Anatoly Sachenko; Arkadiusz Banasik; Adrian Kapczyński

In the paper the key topics concerning architecture and rules of working of biometric authentication systems were described. Significant role is played by threshold which constitutes acceptance or rejection given authentication attempt. Application of elements of fuzzy logic was proposed in order to define threshold value of authentication system. The concept was illustrated by an example.


international conference on information technology new generations | 2008

Distributed Authentication Systems Enhanced by Quantum Protocols

Adrian Kapczyński; Marcin Sobota

In the article problem of securing distributed biometric authentication system was discussed. After introduction to biometric domain, the key issues connected with secure communication in distributed authentication environments were briefly described. In this work a concept of enhancement of biometric authentication system by application of quantum protocols was formulated. Two quantum protocols were analyzed. Obtained experimental results enable further development of research work in chosen area.


computer science on-line conference | 2018

Pattern Lock Evaluation Framework for Mobile Devices: Memorizability and Timing Issues

Agnieszka Bier; Adrian Kapczyński; Zdzisław Sroczyński

The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.


intelligent data acquisition and advanced computing systems: technology and applications | 2011

Fuzzy evaluation of biometric authentication systems

Arkadiusz Banasik; Adrian Kapczyński

This paper presents a new approach in evaluation of biometric identity verification system, which is based on three important indicators: false acceptance rate, false reject rate and failure to enroll rate. Those mentioned indicators are grouped by using fuzzy sets and linguistic variables to provide important pieces of information.


intelligent data acquisition and advanced computing systems: technology and applications | 2009

Model of intelligent detection mechanism against false biometric data injection in fingerprint-based authentication systems

Adrian Kapczyński; Arkadiusz Banasik

In this article we propose the novel approach related to detection false biometric data which relies on analyses of templates instead of fingerprint images.


Archive | 2009

Enhancement of Model of Electronic Voting System

Adrian Kapczyński; Marcin Sobota

This article presents issues related to electronic voting, which can be used in elections to the parliament, presidential elections or national referendums. The advantages and disadvantages of such voting and protocols implementing the voting via internet are discussed. On the basis of Kutylowski model of e-voting an enhancement related to assigning rights phase is introduced.

Collaboration


Dive into the Adrian Kapczyński's collaboration.

Top Co-Authors

Avatar

Arkadiusz Banasik

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Marcin Sobota

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Maciej Wolny

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Agnieszka Bier

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Zdzisław Sroczyński

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Anatoly Sachenko

Silesian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Tomasz Zurek

Silesian University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge