Adrian Kapczyński | Silesian University of Technology (original) (raw)

Adrian Kapczyński

Information security researcher and educator.
Phone: +48604363976
Address: Katowice, Poland

less

Related Authors

Armando Marques-Guedes

Andrew N Liaropoulos

Jasni  Mohamad Zain

Jose Ragas

Jose Ragas

Pontificia Universidad Catolica de Chile

Dr. Chandra  Rekha

Olayemi M Olaniyi

Ji-Jian Chin

Dr. Matthew Crosston

Sachin  Gupta

Graeme Jenkinson

Uploads

Papers by Adrian Kapczyński

Research paper thumbnail of Research on the development of digital signage systems and the factors that influence the effectiveness of the message

Zeszyty Naukowe - Politechnika Śląska. Organizacja i Zarządzanie, 2023

Research paper thumbnail of Analysis of the level of awareness among the academic community in the field of cybersecurity

Scientific Papers of Silesian University of Technology. Organization and Management Series

Research paper thumbnail of Ocena zastosowania wybranej metody biometrycznej w procesie autentyfikacji użytkowników

Studia Informatica, 2001

ABSTRACT In presented paper biometrics method using fingerprints in authentication process was de... more ABSTRACT In presented paper biometrics method using fingerprints in authentication process was described. Moreover Author provided characteristics and estimation of implementation of IDENTIX Biologon Security System v. 2.0 in Microsoft Windows environment basing on CHERRy GMBH model G81-12000 with integrated fingerprint reder.

Research paper thumbnail of Security Aspects of Chosen Web Based Authentication Mechanism

Prace Naukowe / Akademia Ekonomiczna w Katowicach, 2003

ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.

Research paper thumbnail of Pattern Lock Evaluation Framework for Mobile Devices: Memorizability and Timing Issues

Advances in Intelligent Systems and Computing, 2018

The paper concerns the influence of memory, forgetting and timing issues on the security of mobil... more The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.

Research paper thumbnail of Zarządzanie bezpieczeństwem w informacji

Research paper thumbnail of Modeling biometric authentication systems. Modelowanie biometrycznych systemów uwierzytelniania

In the paper basics of BANTAM were presented as well as an example of practical application of it... more In the paper basics of BANTAM were presented as well as an example of practical application of it in modeling of biometric authentication system constructed according to provided assumptions.

Research paper thumbnail of Relationship between IT Security and users’ needs

Research paper thumbnail of Data classification and analyses for performing biometric identification based on keystroke patterns

Research paper thumbnail of E-commerce Security

Research paper thumbnail of Wdrożenie lokalnej sieci komputerowej w przedsiębiorstwie produkcyjnym jako element procesu doskonalenia systemu informacyjnego

ABSTRACT Discussion in this article concerns the possibility of improvement of information system... more ABSTRACT Discussion in this article concerns the possibility of improvement of information system through implementation of local area network (LAN) in the enterprise. Funcionality of traditional information system is analyzed and the general parts of implementation plan are also described.

Research paper thumbnail of Security Aspects of Chosen Web Based Authentication Mechanism

ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.

Research paper thumbnail of Bezpieczeństwo rozwiązań zdalnego dostępu dla bankowości internetowej

Research paper thumbnail of Wykorzystanie sieci neuronowych w trójskładnikowym systemie uwierzytelniania

ABSTRACT In paper characteristics of most popularly applied authentication methods were described... more ABSTRACT In paper characteristics of most popularly applied authentication methods were described as well as an attempt of connecting them in triple-factor authentication system along with utilization of perceptron neural networks. Theoretical aspects were fulfilled with conclusions withdrawn from implementations basing on specified hardware-software solutions.

Research paper thumbnail of Zarządzanie bezpieczeństwem w informacji

Research paper thumbnail of Analiza protokołów uwierzytelniania stosowanych w wirtualnych sieciach prywatnych

ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of... more ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of security level provided by that solutions during communication in distributed (multidivision) enterprise with special covering of authentication protocols: PAP and CHAP.

Research paper thumbnail of Wybrane egzamplifikacje zastosowań metod sztucznej inteligencji

Research paper thumbnail of Dobór wartości progowej w systemach uwierzytelniania, opartych o mierzalne cechy organizmu

ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication ... more ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication system was taken up. A conflict situation concerning selection of threshold value which determines quantitative parameters i.e. false acceptance rate and false rejection rate was analyzed. Original concept of individualization of threshold value was introduced, which was verified in the experiment carried out for population of 30 people.

Research paper thumbnail of Wspomaganie podejmowania decyzji z wykorzystaniem systemów ekspertowych z wnioskowaniem przybliżonym

Research paper thumbnail of Doskonalenie systemów kontroli dostępu w przedsiębiorstwie poprzez wykorzystanie metod biometrycznych

ABSTRACT In the article the current state of the art in the area of solutions providing protectio... more ABSTRACT In the article the current state of the art in the area of solutions providing protection of assets from unauthorized access was presented. Authors described the key results of implementation and examination of biometric system based on fingerprint characteristics.

Research paper thumbnail of Research on the development of digital signage systems and the factors that influence the effectiveness of the message

Zeszyty Naukowe - Politechnika Śląska. Organizacja i Zarządzanie, 2023

Research paper thumbnail of Analysis of the level of awareness among the academic community in the field of cybersecurity

Scientific Papers of Silesian University of Technology. Organization and Management Series

Research paper thumbnail of Ocena zastosowania wybranej metody biometrycznej w procesie autentyfikacji użytkowników

Studia Informatica, 2001

ABSTRACT In presented paper biometrics method using fingerprints in authentication process was de... more ABSTRACT In presented paper biometrics method using fingerprints in authentication process was described. Moreover Author provided characteristics and estimation of implementation of IDENTIX Biologon Security System v. 2.0 in Microsoft Windows environment basing on CHERRy GMBH model G81-12000 with integrated fingerprint reder.

Research paper thumbnail of Security Aspects of Chosen Web Based Authentication Mechanism

Prace Naukowe / Akademia Ekonomiczna w Katowicach, 2003

ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.

Research paper thumbnail of Pattern Lock Evaluation Framework for Mobile Devices: Memorizability and Timing Issues

Advances in Intelligent Systems and Computing, 2018

The paper concerns the influence of memory, forgetting and timing issues on the security of mobil... more The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.

Research paper thumbnail of Zarządzanie bezpieczeństwem w informacji

Research paper thumbnail of Modeling biometric authentication systems. Modelowanie biometrycznych systemów uwierzytelniania

In the paper basics of BANTAM were presented as well as an example of practical application of it... more In the paper basics of BANTAM were presented as well as an example of practical application of it in modeling of biometric authentication system constructed according to provided assumptions.

Research paper thumbnail of Relationship between IT Security and users’ needs

Research paper thumbnail of Data classification and analyses for performing biometric identification based on keystroke patterns

Research paper thumbnail of E-commerce Security

Research paper thumbnail of Wdrożenie lokalnej sieci komputerowej w przedsiębiorstwie produkcyjnym jako element procesu doskonalenia systemu informacyjnego

ABSTRACT Discussion in this article concerns the possibility of improvement of information system... more ABSTRACT Discussion in this article concerns the possibility of improvement of information system through implementation of local area network (LAN) in the enterprise. Funcionality of traditional information system is analyzed and the general parts of implementation plan are also described.

Research paper thumbnail of Security Aspects of Chosen Web Based Authentication Mechanism

ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.

Research paper thumbnail of Bezpieczeństwo rozwiązań zdalnego dostępu dla bankowości internetowej

Research paper thumbnail of Wykorzystanie sieci neuronowych w trójskładnikowym systemie uwierzytelniania

ABSTRACT In paper characteristics of most popularly applied authentication methods were described... more ABSTRACT In paper characteristics of most popularly applied authentication methods were described as well as an attempt of connecting them in triple-factor authentication system along with utilization of perceptron neural networks. Theoretical aspects were fulfilled with conclusions withdrawn from implementations basing on specified hardware-software solutions.

Research paper thumbnail of Zarządzanie bezpieczeństwem w informacji

Research paper thumbnail of Analiza protokołów uwierzytelniania stosowanych w wirtualnych sieciach prywatnych

ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of... more ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of security level provided by that solutions during communication in distributed (multidivision) enterprise with special covering of authentication protocols: PAP and CHAP.

Research paper thumbnail of Wybrane egzamplifikacje zastosowań metod sztucznej inteligencji

Research paper thumbnail of Dobór wartości progowej w systemach uwierzytelniania, opartych o mierzalne cechy organizmu

ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication ... more ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication system was taken up. A conflict situation concerning selection of threshold value which determines quantitative parameters i.e. false acceptance rate and false rejection rate was analyzed. Original concept of individualization of threshold value was introduced, which was verified in the experiment carried out for population of 30 people.

Research paper thumbnail of Wspomaganie podejmowania decyzji z wykorzystaniem systemów ekspertowych z wnioskowaniem przybliżonym

Research paper thumbnail of Doskonalenie systemów kontroli dostępu w przedsiębiorstwie poprzez wykorzystanie metod biometrycznych

ABSTRACT In the article the current state of the art in the area of solutions providing protectio... more ABSTRACT In the article the current state of the art in the area of solutions providing protection of assets from unauthorized access was presented. Authors described the key results of implementation and examination of biometric system based on fingerprint characteristics.

Log In