Reviewers
Zoltan Bologh, Jarosław Bosy, Apostolos P. Fournaris, Jacques Fournier, Emil Gatial, Gabriela Gheorghe, Bernard Kontny, Marian Kopczewski, Foued Melakessou, Jan Pawlak, Adam Rybka, Jaroslaw Teska, Gyula Tóth
Authors: Adam J. Lipiński, Alicja A. Żejmo
Keywords: willow biomass, Salix viminalis willow, eastern Poland, crop potential
Article
Authors: Zygmunt Wierciński, Aldona Skotnicka-Siepsiak
Keywords: energy conversion in building, exergy balance, passive house
Article
Author: Karol Dawidowicz
Keywords: ASG-EUPOS, EUPOS, GBAS, GNSS satellite levelling, geoid
Article
Author: Adam Łyszkowicz
Keywords: geopotential models, geoid, quasigeoid, deflections of the vertical
Article
Authors: Wojciech Wojciechowicz, Jacques Fournier, Mirosław Konecny, Stefan Vanya, John Stoodley, Phil Entwisle, Daniel M. Hein, Aurel Machalek, Apostolos Fournaris, Mikel Uriarte, Oscar Lopez, Shaun O’Neill, Hans Bradl, Zoltan Balogh, Eemil Gatial, Ladislav Hluchy, Tomasz Mirosław, Jan Zych
Keywords: SECRICOM, Seamless communication, crisis management, Multi Bearer Router(MBR), Push To Talk (PTT), SECRICOM Silentel, Secure Docking Module (SDM), Secure Agent Infrastructure (SAI), Communication Security Monitoring and Control Centre (CSMCC), Seventh Framework Programme (FP7), Trusted Computing
Article
Authors: Shaun O’Neill, Jim Strother, Jan Zych, Wojciech Wojciechowicz
Keywords: SECRICOM, Interoperability, Crisis Management, Requirements Engineering, Critical system
Article
Authors: Wojciech Wojciechowicz, Jan Zych, Witold Hołubowicz
Keywords: crisis management, ICT, communication
Article
Authors: Emil Gatial, Zoltan Balogh, Daniel M. Hein, Ladislav Hluchy, Martin Pirker, Ronald Toegl
Keywords: mobile agents, trusted computing, crisis management support
Article
Authors: Apostolos P. Fournaris, Jacques Fournier, Daniel Hein ,Guillaume Reymond
Keywords: Hardware, Security Module, Physical attacks, AES, RSA, security counter – measures
Article
Authors: Cyril Roscian, Florian Praden, Jean-Max Dutertre, Jacques Fournier, Assia Tria
Keywords: Advanced Encryption Standard (AES), fault attacks, laser, security characterization, DFA
Article
Author: Aurel Machalek
Keywords: Internet Protocol version 4, Internet Protocol version 6, Seamless communication, TETRA
Article
Authors: Vladimir Hudek, Miroslav Konecny, Stefan Vanya
Keywords: crisis management, Secure Docking Module (SDM), Secure Agent Infrastructure(SAI), SECRICOM, first responder, push to talk, PTT, seamless communication, end-to-end security
Article
Authors: Saioa Ros, Oscar López, Mikel Uriarte
Keywords: Communication Infrastructure, Risk Assessment, Security Mechanisms, Security Model, Awareness, Control
Article
Authors: Phil Entwisle, Steve Lawrence, Ondrej Habala
Keywords: Secure Agent Infrastructure (SAI), Multi Bearer Router (MBR), seamless data transfer, network optimization
Article