Dr Chez Ciechanowicz

  1. 2010
  2. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticle

  3. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticle

  4. Published

    The status of national PKIs - A European overview

    Patsos, D., Ciechanowicz, C. & Piper, F., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 13-20 8 p.

    Research output: Contribution to journalArticle

  5. 2006
  6. Published

    Information Security Technical Report: Editorial

    Ciechanowicz, C., 1 Jan 2006, In : Information Security Technical Report. 11, 1

    Research output: Contribution to journalArticle

  7. 2003
  8. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jun 2003, In : Information Security Technical Report. 8, 2, p. 5

    Research output: Contribution to journalArticle

  9. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Apr 2003, In : Information Security Technical Report. 8, 4, p. 5

    Research output: Contribution to journalArticle

  10. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. 2002
  12. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In : Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticle

  13. 2000
  14. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In : Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticle

  15. 1997
  16. Published

    Risk analysis: Requirements, conflicts and problems

    Ciechanowicz, Z., 1 Jan 1997, In : Computers and Security. 16, 3, p. 223-232 10 p.

    Research output: Contribution to journalArticle