Latest Communications of International Proceedings articles

31
Dec
2025

The Fujisaki–Okamoto Transform in the Context of Quantum Threats

Security, Privacy & Cryptographic Solutions: 46SP 2025
This paper investigates a Hierarchical Identity Based Encryption () scheme, with emphasis on the construction of D. Cash, D. Hofheinz, E. Kiltz, and Ch. Peikert. The scheme is founded on -ary lattices and its security relies on the hardness of the Learning With Errors ()…
31
Dec
2025

Hierarchical Identity-Based Encryption over q-Ary Lattices in the Random Oracle Model

Security, Privacy & Cryptographic Solutions: 46SP 2025
This paper investigates a Hierarchical Identity Based Encryption () scheme, with emphasis on the construction of D. Cash, D. Hofheinz, E. Kiltz, and Ch. Peikert. The scheme is founded on -ary lattices and its security relies on the hardness of the Learning With Errors ()…
31
Dec
2025

Analysis and Counteraction of Ransomware Attacks Literature Review and Case Studies

Security, Privacy & Cryptographic Solutions: 46SP 2025
Ransomware attacks constitute one of the most critical and rapidly evolving threats in today’s cybersecurity landscape. This highly sophisticated form of malware can result in severe financial and operational losses, particularly for individuals and organizations that are insufficiently prepared to address such risks. The study…
31
Dec
2025

RUTMath – a Free and Open-Source Educational Application for Learning Mathematics

Software Engineering & Development Practices: 46SE 2025
The aim of this work is to present an open-source, cross-platform educational application designed to support the acquisition of mathematical skills by early school-age children. The tool combines classical arithmetic exercises (addition, multiplication, multiplication tables, unit conversion) with gamification elements such as duel mode and…
31
Dec
2025

Integrated, Containerized JupyterHub Environment for a Higher Education Institution: A Case Study of Deployment

Software Engineering & Development Practices: 46SE 2025
The article presents a case study of deploying the JupyterHub platform at Rzeszów University of Technology for teaching purposes. The system was designed as a modular container-based environment built on Docker and Docker Compose, fully integrated with the university’s Central Authentication Service (CAS). The architecture…
31
Dec
2025

Autodesk Software in the Design of Virtual Prototypes of Machines and Mechanisms

Software Engineering & Development Practices: 46SE 2025
The study aims to evaluate the effectiveness of Autodesk software (Inventor and Fusion 360) in the design of virtual prototypes of machines and mechanisms. A mixed-method research design was adopted, combining quantitative efficiency metrics with empirical validation against a physical prototype. Using a belt conveyor…
31
Dec
2025

Software Architecture Entropy

Software Engineering & Development Practices: 46SE 2025
In software architecture design, proper attention is often not paid to the relationships between elements across diagrams. However, IT designers, more or less consciously, introduce elements representing the same object instance in different diagrams with nearly identical names. These relationships are called consistency rules and…
31
Dec
2025

Design of Photographic Lens for a Nanosatellite Used in Commercial Remote Monitoring of the Earth

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
The growing use of nanosatellite platforms for Earth observation missions requires optical systems that combine compactness, low mass, and high imaging performance under extreme environmental conditions. Existing research has primarily focused on satellite integration and sensor electronics, leaving a gap in detailed methodologies for the…
31
Dec
2025

Approximation of Compressed Flows by Equivalent Stream-Based Flows in Multi-Rate Systems with Compression Mechanism

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
This paper presents considerations concerning the development of an equivalent model for flows subject to compression mechanisms, namely elastic and adaptive flows. The necessity of constructing such a model stems from the fact that, during the transmission of these flows, their parameters — such as…
31
Dec
2025

Disturbances of Time Measurement in UWB Localization Systems – Comparison of Protective Mechanisms in DW1000 and DW3000 Modules

Smart Networks and Security - IoT, Wireless Systems, and Positioning: 46ICT 2025
This study investigates the application potential of the DW1000 and DW3000 UWB transceiver platforms in the design of high-accuracy indoor positioning systems. As industrial environments increasingly adopt cyber-physical automation, indoor localization technologies are evolving into critical components of intelligent manufacturing and warehouse management infrastructures. Accurate…