International Journal of Electronics and Telecommunications
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 64 No. 2 (2018)
Vol. 64 No. 2 (2018)
Published:
2018-04-27
Applications
Proposal of a Secure Modbus RTU communication with Adi Shamir’s secret sharing method
Éva Ádámkó, Gábor Jakabóczki, Péter Tamás Szemes
107-114
PDF
Applied Informatics
Benchmark tests on heuristic methods in the darts game
Marcin Woźniak, Kamil Ksiazek, Dawid Połap
115-121
PDF
Cryptography and Cybersecurity
Pure Infinitely Self-Modifying Code is Realizable and Turing-complete
Gregory Morse
123-129
PDF
Phase-shift Fault Analysis of Grain v1
Viliam Hromada, Tibor Petho
131-136
PDF
Tabu search against permutation based stream ciphers
Iwona Polak
137-145
PDF
Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Search
Ashutosh Dhar Dwivedi, Paweł Morawiecki, Sebastian Wójtowicz
147-150
PDF
PixSel: Images as Book Cipher Keys
Mykel Shumay, Gautam Srivastava
151-158
PDF
Improving security of lightweith SHA-3 against preimage attacks
Serhii Onopa, Zbigniew Kotulski
159-166
PDF
Scalable method of searching for full-period Nonlinear Feedback Shift Registers with GPGPU. New List of Maximum Period NLFSRs.
Krzysztof Kanciak, Paweł Augustynowicz
167-171
PDF
Block cipher based Public Key Encryption viaIndistinguishability Obfuscation
Aleksandra Horubała, Michał Andrzejczak, Piotr Sapiecha, Daniel Waszkiewicz
173-178
PDF
Confidential greedy graph algorithm
Daniel Waszkiewicz, Aleksandra Horubała, Piotr Sapiecha, Michał Andrzejczak
179-183
PDF
A first Catalgorithm ?
Jean-François Geneste
185-188
PDF
Security, Safety, Military
Efficency evaluating method for the devices with infrasound impact on the computer equipment functioning
Alexander Korchenko, Igor Tereykovcky, Evgenia Aytkhozhaevа, Nurgul Seilova, Yevgeny Kosyuk, Waldemar Wójcik, Paweł Komada, Jan Sikora
189-196
PDF
Context data acquisition using adaptive non-repudiation model
Marcin Alan Tunia
197-202
PDF
Signals, Circuits, Systems
Application of Neural Network for Testing selected specification parameters of Voltage-Controlled Oscillator
Sebastian Temich, Damian Grzechca
203-207
PDF
Telecommunications
A Novel Software-Defined Networking Controller: the Distributed Active Information Model (DAIM)
Pakawat Pupatwibul, Ameen Reda Banjar, Md. Imam Hossain, Robin Braun, Bruce Moulton
209-216
PDF
Detailed Consideration of Graphical Calculation of Min-Plus Convolution in Deterministic Network Calculus
Andrzej Marek Borys
217-222
PDF
Wireless and Mobile Communications
Remote system for reading traffic signs and information
Konrad Janisz, Jacek Stępień, Szczepan Odrobina
223-228
PDF
When Can a Narrowband Power Amplifier Be Considered to Be Memoryless and when Not?
Andrzej Marek Borys
229-242
PDF
Digital Signal Processing
Inertial navigation static calibration
Slawomir Niespodziany
243-248
PDF
Control, Automation and Robotics
Modelling of Parameterized Discrete Control Algorithms With Use of Finite State Machines in TIA Portal Environment
Grzegorz Andrzejewski, Wojciech Zając
249-254
PDF
Information
For Readers
For Authors
For Librarians
Current Issue