Michal Zielinski

  • Citations Per Year
Learn More
CRIME[1] and BREACH[2] attacks on TLS/SSL leverage the fact that compression ratio is not hidden by encryption to recover content of secrets. We introduce SafeDeflate—a modification of a standard Deflate algorithm which compression ratio does not leak information about secret tokens. The modification is compatible with existing Deflate and gzip(More)
Introduction Juvenile idiopathic arthritis (JIA) is not a rare disease in children. The etiology of the disease is unknown and various parameters are useful in establishing diagnosis. The research concerning reactive oxygen species in recent years shows that chronic oxidative stress may lead to chronic inflammation. Among the antioxidant systems present in(More)
End-to-end machine learning pipelines that run in shared environments are challenging to implement. Production pipelines typically consist of multiple interdependent processing stages. Between stages, the intermediate results are persisted to reduce redundant computation and to improve robustness. Those results might come in the form of datasets for data(More)
Nowadays, crucial parts of modern Building Automation and Control Systems (BACS) are active control and monitoring functions. Many of research have been conducted to investigate the support of location-based services (LBS) for individuals in the BACS. Since microlocation technology could be used to enable reliable and precise indoor positioning and(More)
  • 1