1. Communications in Computer and Information Science;B Ksiezopolski,2009
2. Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems. In: European Teletraffic Seminar, pp. 195–202 (2011)
3. Stubblefield, A., Rubin, A.D., Wallach, D.S.: Managing the performance impact of web security. Electron. Commer. Res. 5, 99–116 (2005)
4. Sklavos, N., Kitsos, P., Papadopoulos, K., Koufopavlou, O.: Design, architecture and performance evaluation of the wireless transport layer security. J. Supercomputing 36(1), 33–50 (2006)
5. Ksiezopolski, B., Kotulski, Z.: On scalable security model for sensor networks protocols. In: 22nd CIB-W78 Conference Information Technology in Construction, Dresden, pp. 463–469 (2005)