Adrian Kapczyński | Silesian University of Technology (original) (raw)
Information security researcher and educator.
Phone: +48604363976
Address: Katowice, Poland
less
Related Authors
Pontificia Universidad Catolica de Chile
Uploads
Papers by Adrian Kapczyński
Zeszyty Naukowe - Politechnika Śląska. Organizacja i Zarządzanie, 2023
Scientific Papers of Silesian University of Technology. Organization and Management Series
Studia Informatica, 2001
ABSTRACT In presented paper biometrics method using fingerprints in authentication process was de... more ABSTRACT In presented paper biometrics method using fingerprints in authentication process was described. Moreover Author provided characteristics and estimation of implementation of IDENTIX Biologon Security System v. 2.0 in Microsoft Windows environment basing on CHERRy GMBH model G81-12000 with integrated fingerprint reder.
Prace Naukowe / Akademia Ekonomiczna w Katowicach, 2003
ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.
Advances in Intelligent Systems and Computing, 2018
The paper concerns the influence of memory, forgetting and timing issues on the security of mobil... more The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.
In the paper basics of BANTAM were presented as well as an example of practical application of it... more In the paper basics of BANTAM were presented as well as an example of practical application of it in modeling of biometric authentication system constructed according to provided assumptions.
ABSTRACT Discussion in this article concerns the possibility of improvement of information system... more ABSTRACT Discussion in this article concerns the possibility of improvement of information system through implementation of local area network (LAN) in the enterprise. Funcionality of traditional information system is analyzed and the general parts of implementation plan are also described.
ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.
ABSTRACT In paper characteristics of most popularly applied authentication methods were described... more ABSTRACT In paper characteristics of most popularly applied authentication methods were described as well as an attempt of connecting them in triple-factor authentication system along with utilization of perceptron neural networks. Theoretical aspects were fulfilled with conclusions withdrawn from implementations basing on specified hardware-software solutions.
ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of... more ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of security level provided by that solutions during communication in distributed (multidivision) enterprise with special covering of authentication protocols: PAP and CHAP.
ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication ... more ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication system was taken up. A conflict situation concerning selection of threshold value which determines quantitative parameters i.e. false acceptance rate and false rejection rate was analyzed. Original concept of individualization of threshold value was introduced, which was verified in the experiment carried out for population of 30 people.
ABSTRACT In the article the current state of the art in the area of solutions providing protectio... more ABSTRACT In the article the current state of the art in the area of solutions providing protection of assets from unauthorized access was presented. Authors described the key results of implementation and examination of biometric system based on fingerprint characteristics.
Zeszyty Naukowe - Politechnika Śląska. Organizacja i Zarządzanie, 2023
Scientific Papers of Silesian University of Technology. Organization and Management Series
Studia Informatica, 2001
ABSTRACT In presented paper biometrics method using fingerprints in authentication process was de... more ABSTRACT In presented paper biometrics method using fingerprints in authentication process was described. Moreover Author provided characteristics and estimation of implementation of IDENTIX Biologon Security System v. 2.0 in Microsoft Windows environment basing on CHERRy GMBH model G81-12000 with integrated fingerprint reder.
Prace Naukowe / Akademia Ekonomiczna w Katowicach, 2003
ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.
Advances in Intelligent Systems and Computing, 2018
The paper concerns the influence of memory, forgetting and timing issues on the security of mobil... more The paper concerns the influence of memory, forgetting and timing issues on the security of mobile applications. The designed framework system was used to further elaboration of the automatic measure, which estimates the quality (strength) of unlock gesture patterns. The data analysis described in detail presents the relations between human subjective ratings of patterns’ complexity and memorizability levels in regards to computed values of quality measure and real-life time spans needed to enter and re-enter the pattern.
In the paper basics of BANTAM were presented as well as an example of practical application of it... more In the paper basics of BANTAM were presented as well as an example of practical application of it in modeling of biometric authentication system constructed according to provided assumptions.
ABSTRACT Discussion in this article concerns the possibility of improvement of information system... more ABSTRACT Discussion in this article concerns the possibility of improvement of information system through implementation of local area network (LAN) in the enterprise. Funcionality of traditional information system is analyzed and the general parts of implementation plan are also described.
ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and... more ABSTRACT Presented paper focuses on aspects concerning authentication in business-to-business and business-to-consumer solutions. The aim of that paper is to present general rules of secure authentication in case of using single-sign in mechan-isms.
ABSTRACT In paper characteristics of most popularly applied authentication methods were described... more ABSTRACT In paper characteristics of most popularly applied authentication methods were described as well as an attempt of connecting them in triple-factor authentication system along with utilization of perceptron neural networks. Theoretical aspects were fulfilled with conclusions withdrawn from implementations basing on specified hardware-software solutions.
ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of... more ABSTRACT In the paper basics of virtual private networks were presented as well as an analysis of security level provided by that solutions during communication in distributed (multidivision) enterprise with special covering of authentication protocols: PAP and CHAP.
ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication ... more ABSTRACT In the article the problem of adjustment of threshold value of biometric authentication system was taken up. A conflict situation concerning selection of threshold value which determines quantitative parameters i.e. false acceptance rate and false rejection rate was analyzed. Original concept of individualization of threshold value was introduced, which was verified in the experiment carried out for population of 30 people.
ABSTRACT In the article the current state of the art in the area of solutions providing protectio... more ABSTRACT In the article the current state of the art in the area of solutions providing protection of assets from unauthorized access was presented. Authors described the key results of implementation and examination of biometric system based on fingerprint characteristics.