Otwarty dostęp

Enhanced cryptographic performance and security using optimized edward-elgamal signature scheme for IoT and blockchain applications

, ,  oraz   
10 lis 2024

Zacytuj
Pobierz okładkę

Akhbarifar, S., Javadi, H.H.S., Rahmani, A.M., Hosseinzadeh, M. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput. 2023, 27, 697–713. AkhbarifarS. JavadiH.H.S. RahmaniA.M. HosseinzadehM. A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment Pers. Ubiquitous Comput. 2023 27 697 713 Search in Google Scholar

Medileh, S., Laouid, A., Euler, R., Bounceur, A., Hammoudeh, M., AlShaikh, M., Eleyan, A., Khashan, O.A. A flexible encryption technique for the internet of things environment. Ad. Hoc. Netw. 2020, 106, 102240. MedilehS. LaouidA. EulerR. BounceurA. HammoudehM. AlShaikhM. EleyanA. KhashanO.A. A flexible encryption technique for the internet of things environment Ad. Hoc. Netw. 2020 106 102240 Search in Google Scholar

Fuchsbauer, G., Plouviez, A., Seurin, Y. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Cham, Switzerland, 2020; pp. 63–95. FuchsbauerG. PlouviezA. SeurinY. Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques Zagreb, Croatia 10–14 May 2020 Springer Cham, Switzerland 2020 63 95 Search in Google Scholar

Zheng, R., Jia, H., Abualigah, L., Liu, Q., Wang, S. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization. Processes 2020. ZhengR. JiaH. AbualigahL. LiuQ. WangS. Deep ensemble of slime mold algorithm and arithmetic optimization algorithm for global optimization Processes 2020 Search in Google Scholar

Krichen, M., Mihoub, A., Alzahrani, M.Y., Adoni, W.Y.H., Nahhal, T. Are Formal Methods Applicable to Machine Learning And Artificial Intelligence? In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia, 9–11 May 2022; pp. 48–53. KrichenM. MihoubA. AlzahraniM.Y. AdoniW.Y.H. NahhalT. Are Formal Methods Applicable to Machine Learning And Artificial Intelligence? In Proceedings of the 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH) Riyadh, Saudi Arabia 9–11 May 2022 48 53 Search in Google Scholar

Raman, R., Gupta, N., Jeppu, Y. Framework for Formal Verification of Machine Learning Based Complex System-of-Systems. Insight 2023, 26, 91–102. RamanR. GuptaN. JeppuY. Framework for Formal Verification of Machine Learning Based Complex System-of-Systems Insight 2023 26 91 102 Search in Google Scholar

G.S. Reddy, S. Radha, K.T. Taufiq, K.D.S. Reddy, K.P.K. Reddy, P. Nagabushanam. Security based Electronic Voting Machine using Xilinx tool. 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (2022), pp. 1–4, 10.1109/PARC52418.2022.9726556 ReddyG.S. RadhaS. TaufiqK.T. ReddyK.D.S. ReddyK.P.K. NagabushanamP. Security based Electronic Voting Machine using Xilinx tool 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) 2022 1 4 10.1109/PARC52418.2022.9726556 Open DOISearch in Google Scholar

V. Bhatt, A.K. Bindal. Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) (2021), pp. 262–265, 10.1109/ISPCC53510.2021.9609399 BhattV. BindalA.K. Smart Hardware Development under Industrial IOT (IIOT) 4.0: A Survey Report 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) 2021 262 265 10.1109/ISPCC53510.2021.9609399 Open DOISearch in Google Scholar

X. Xu, H. Zhao, H. Yao, S. Wang. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT. IEEE Internet of Things Journal, 8 (4) (2021), pp. 2431–2443, 10.1109/JIOT.2020.3030080 XuX. ZhaoH. YaoH. WangS. A Blockchain-Enabled Energy-Efficient Data Collection System for UAV-Assisted IoT IEEE Internet of Things Journal 8 4 2021 2431 2443 10.1109/JIOT.2020.3030080 Open DOISearch in Google Scholar

S. Pothumani, A. Arunachalam. Effective Security Mechanisms for Big Data Using Block Chain Technology 2021 International Conference on Computer Communication and Informatics (ICCCI) (2021), pp. 1–6, 10.1109/ICCCI50826.2021.9402458 PothumaniS. ArunachalamA. Effective Security Mechanisms for Big Data Using Block Chain Technology 2021 International Conference on Computer Communication and Informatics (ICCCI) 2021 1 6 10.1109/ICCCI50826.2021.9402458 Open DOISearch in Google Scholar

R. Shrivastava, A. Tiwary, P. Yadav. Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review 2021 International Conference on Advances in Technology, Management & Education (ICATME) (2021), pp. 238–243, 10.1109/ICATME50232.2021.9732730 ShrivastavaR. TiwaryA. YadavP. Challenges Block Chain Technology Using IOT for Improving Personal and Physical Safety – Review 2021 International Conference on Advances in Technology, Management & Education (ICATME) 2021 238 243 10.1109/ICATME50232.2021.9732730 Open DOISearch in Google Scholar

Reddy, G. S., Radha, S., Taufiq, K. T., Reddy, K. D. S., Reddy, K. P. K., & Nagabushanam, P. (2022). Security based electronic voting machine using Xilinx tool. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) (pp. 1–4). IEEE. https://doi.org/10.1109/PARC52418.2022.9726556 ReddyG. S. RadhaS. TaufiqK. T. ReddyK. D. S. ReddyK. P. K. NagabushanamP. 2022 Security based electronic voting machine using Xilinx tool In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC) 1 4 IEEE https://doi.org/10.1109/PARC52418.2022.9726556 Search in Google Scholar

Devibala, A. (2019). A survey on security issues in IoT for blockchain healthcare. In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (pp. 1–7). IEEE. https://doi.org/10.1109/ICECCT.2019.8869253 DevibalaA. 2019 A survey on security issues in IoT for blockchain healthcare In 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) 1 7 IEEE https://doi.org/10.1109/ICECCT.2019.8869253 Search in Google Scholar

Rajawat, A. S., Rawat, R., Barhanpurkar, K., Shaw, R. N., & Ghosh, A. (2021). Blockchain-based model for expanding IoT device data security. In J. C. Bansal, L. C. C. Fung, M. Simic, & A. Ghosh (Eds.), Advances in Applications of Data-Driven Computing (Vol. 1319). Springer, Singapore. https://doi.org/10.1007/978-981-33-6919-1_5 RajawatA. S. RawatR. BarhanpurkarK. ShawR. N. GhoshA. 2021 Blockchain-based model for expanding IoT device data security In BansalJ. C. FungL. C. C. SimicM. GhoshA. (Eds.), Advances in Applications of Data-Driven Computing 1319 Springer Singapore https://doi.org/10.1007/978-981-33-6919-1_5 Search in Google Scholar

Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. Falcon. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 31–41. SoniD. BasuK. NabeelM. AarajN. ManzanoM. KarriR. SoniD. BasuK. NabeelM. AarajN. Falcon In Hardware Architectures for Post-Quantum Digital Signature Schemes Springer Berlin/Heidelberg, Germany 2021 31 41 Search in Google Scholar

Soni, D., Basu, K., Nabeel, M., Aaraj, N., Manzano, M., Karri, R., Soni, D., Basu, K., Nabeel, M., Aaraj, N., et al. SPHINCS + . In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2021; pp. 141–162. SoniD. BasuK. NabeelM. AarajN. ManzanoM. KarriR. SoniD. BasuK. NabeelM. AarajN. SPHINCS + In Hardware Architectures for Post-Quantum Digital Signature Schemes Springer Berlin/Heidelberg, Germany 2021 141 162 Search in Google Scholar

Zhang, J., Chen, Y., Zhang, Z. Lattice-Based Programmable Hash Functions and Applications. J. Cryptol. 2024, 37, 4. ZhangJ. ChenY. ZhangZ. Lattice-Based Programmable Hash Functions and Applications J. Cryptol. 2024 37 4 Search in Google Scholar

Mehrabi M.A. and Doche C., “Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,” 2019. https://doi.org/10.3390/info10090285 MehrabiM.A. DocheC. “Low-Cost, Low-Power FPGA Implementation of ED25519 and CURVE25519 Point Multiplication,” 2019 https://doi.org/10.3390/info10090285 Search in Google Scholar

Faz-Hernandez A., Lopez J., and Dahab R., “High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,” ACM Transactions on Mathematical Software, vol. 45, no. 3, pp. 1–35, 2019. https://doi.org/10.1145/3309759 Faz-HernandezA. LopezJ. DahabR. “High performance Implementation of Elliptic Curve Cryptography Using Vector Instructions,” ACM Transactions on Mathematical Software 45 3 1 35 2019 https://doi.org/10.1145/3309759 Search in Google Scholar

Hu Z., Gnatyuk S., Kovtun M., and Seilova N., “Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,” Advances in Intelligent Systems and Computing, pp. 309–319, 2018. https://doi.org/10.1007/978-3-319-91008-6_31 HuZ. GnatyukS. KovtunM. SeilovaN. “Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields,” Advances in Intelligent Systems and Computing 309 319 2018 https://doi.org/10.1007/978-3-319-91008-6_31 Search in Google Scholar

Islam M.M., Hossain M.S., Hasan M.K., Shahjalal M., and Jang Y.M., “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019. https://doi.org/10.1109/access.2019.2958491 IslamM.M. HossainM.S. HasanM.K. ShahjalalM. JangY.M. “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field,” IEEE Access 7 178811 178826 2019 https://doi.org/10.1109/access.2019.2958491 Search in Google Scholar

Franck C. and Grosschadl J., “Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,” Mobile, Secure, and Programmable Networking, pp. 1–17, 2017. https://doi.org/10.1007/978-3-319-67807-8_1 FranckC. GrosschadlJ. “Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves,” Mobile, Secure, and Programmable Networking 1 17 2017 https://doi.org/10.1007/978-3-319-67807-8_1 Search in Google Scholar

Liu Z., Grosschadl J., Hu Z., Jarvinen K., Wang H., and Verbauwhede I., “Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,” IEEE Transactions on Computers, vol. 66, no. 5, pp. 773–785, 2017. https://doi.org/10.1109/tc.2016.2623609 LiuZ. GrosschadlJ. HuZ. JarvinenK. WangH. VerbauwhedeI. “Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things,” IEEE Transactions on Computers 66 5 773 785 2017 https://doi.org/10.1109/tc.2016.2623609 Search in Google Scholar

Liu Z., Weng J., Hu Z., and Seo H., “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Transactions on Embedded Computing Systems, vol. 16, no. 2, pp. 1–18, 2017. https://doi.org/10.1145/2967103 LiuZ. WengJ. HuZ. SeoH. “Efficient Elliptic Curve Cryptography for Embedded Devices,” ACM Transactions on Embedded Computing Systems 16 2 1 18 2017 https://doi.org/10.1145/2967103 Search in Google Scholar

Naresh V.S., Reddi S., and Allavarpu V.D., “Blockchain-based patient centric health care communication system,” International Journal of Communication Systems, vol. 34, no. 7, pp. 34–34, 2021. https://doi.org/10.1002/dac.4749 NareshV.S. ReddiS. AllavarpuV.D. “Blockchain-based patient centric health care communication system,” International Journal of Communication Systems 34 7 34 34 2021 https://doi.org/10.1002/dac.4749 Search in Google Scholar

Saini A., Zhu Q., Singh N., Xiang Y., Gao L., and Zhang Y., “A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,” IEEE IoT Journal, vol. 8, no. 7, pp. 5914–5925, 2021. https://doi.org/10.1109/jiot.2020.3032997 SainiA. ZhuQ. SinghN. XiangY. GaoL. ZhangY. “A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System,” IEEE IoT Journal 8 7 5914 5925 2021 https://doi.org/10.1109/jiot.2020.3032997 Search in Google Scholar

Jasem F.M., Sagheer A.M., and Awad A.M., “Enhancement of digital signature algorithm in bitcoin wallet,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 1, pp. 449–457, 2021. https://doi.org/10.11591/eei.v10i1.2339 JasemF.M. SagheerA.M. AwadA.M. “Enhancement of digital signature algorithm in bitcoin wallet,” Bulletin of Electrical Engineering and Informatics 10 1 449 457 2021 https://doi.org/10.11591/eei.v10i1.2339 Search in Google Scholar

Sadiq A., Javed M.U., Khalid R., Almogren A., Shafiq M., and Javaid N., “Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,” IEEE Access, vol. 9, pp. 7000–7020, 2021. https://doi.org/10.1109/access.2020.3048169 SadiqA. JavedM.U. KhalidR. AlmogrenA. ShafiqM. JavaidN. “Blockchain Based Data and Energy Trading in Internet of Electric Vehicles,” IEEE Access 9 7000 7020 2021 https://doi.org/10.1109/access.2020.3048169 Search in Google Scholar

Arulprakash M. and Jebakumar R., “Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,” The Journal of Supercomputing, 2021. https://doi.org/10.1007/s11227-021-03756-x ArulprakashM. JebakumarR. “Peoplecentric collective intelligence: decentralised and enhanced privacy mobile crowd sensing based on blockchain,” The Journal of Supercomputing 2021 https://doi.org/10.1007/s11227-021-03756-x Search in Google Scholar

Kavin BP, Ganapathy S., Kanimozhi U., and Kannan A., “An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA,” 2020. https://doi.org/10.1007/s11277-020-07613-7 KavinBP GanapathyS. KanimozhiU. KannanA. An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC Access Control and LDSA 2020 https://doi.org/10.1007/s11277-020-07613-7 Search in Google Scholar

Benil T. and Jasper J., “Cloud-based security on outsourcing using blockchain in E-health systems Computer Networks, vol. 178, pp. 107344–107344, 2020. https://doi.org/10.1016/j.comnet.2020.107344 BenilT. JasperJ. Cloud-based security on outsourcing using blockchain in E-health systems Computer Networks 178 107344 107344 2020 https://doi.org/10.1016/j.comnet.2020.107344 Search in Google Scholar

Wang H., He D., and Ji Y., “Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, “Future Generation Computer Systems, vol. 107, pp. 854–862, 2020. https://doi.org/10.1016/j.future.2017.06.028 WangH. HeD. JiY. Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography Future Generation Computer Systems 107 854 862 2020 https://doi.org/10.1016/j.future.2017.06.028 Search in Google Scholar

Kumar M., Chand S., and Katti C.P., “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal, vol. 14, no. 2, pp. 2032–2041, 2020. https://doi.org/10.1109/jsyst.2019.2940474 KumarM. ChandS. KattiC.P. “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal 14 2 2032 2041 2020 https://doi.org/10.1109/jsyst.2019.2940474 Search in Google Scholar

Li X., Mei Y., Gong J., Xiang F., and Sun Z., “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access, vol. 8, pp. 76765–76772, 2020. https://doi.org/10.1109/access.2020.2987831 LiX. MeiY. GongJ. XiangF. SunZ. “A Blockchain Privacy Protection Scheme Based on Ring Signature,” IEEE Access 8 76765 76772 2020 https://doi.org/10.1109/access.2020.2987831 Search in Google Scholar

Ernest B. and Shiguang J., “Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,” IEEE Access, vol. 8, pp. 25863–25876, 2020. https://doi.org/10.1109/access.2020.2968621 ErnestB. ShiguangJ. “Privacy Enhancement Scheme (PES) in a Blockchain-Edge Computing Environment,” IEEE Access 8 25863 25876 2020 https://doi.org/10.1109/access.2020.2968621 Search in Google Scholar

Zhang X., Zhou Z., Zhang J., Xu C., and Zhang X., “Efficient lightweight private auditing scheme for cloud-based wireless body area networks,” International Journal of Electronic Security and Digital Forensics, vol. 12, no. 2, pp. 139–139, 2020. https://doi.org/10.1504/ijesdf.2020.10027592 ZhangX. ZhouZ. ZhangJ. XuC. ZhangX. “Efficient lightweight private auditing scheme for cloud-based wireless body area networks,” International Journal of Electronic Security and Digital Forensics 12 2 139 139 2020 https://doi.org/10.1504/ijesdf.2020.10027592 Search in Google Scholar

Ansah AKK and Gyamfi D.A., “Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,” International Journal of Computational Science and Engineering, vol. 23, no. 4, 2020. https://doi.org/10.1504/ijcse.2020.10035561 AnsahAKK GyamfiD.A. “Enhancing user and transaction privacy in bitcoin with un linkable coin mixing scheme,” International Journal of Computational Science and Engineering 23 4 2020 https://doi.org/10.1504/ijcse.2020.10035561 Search in Google Scholar

Chen C.L., Deng Y.Y., Weng W., Chen C.H., Chiu Y.J., and Wu C.M., “A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,” Electronics, vol. 9, no. 1, 2020. https://doi.org/10.3390/electronics9010062 ChenC.L. DengY.Y. WengW. ChenC.H. ChiuY.J. WuC.M. “A Traceable and Privacy-Preserving Authentication for UAV Communication Control System,” Electronics 9 1 2020 https://doi.org/10.3390/electronics9010062 Search in Google Scholar

Ullah I., Amin N.U., Almogren A., Khan M.A., Uddin M.I., and Hua Q., “A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,” IEEE Access, vol. 8, pp. 199197–199212, 2020. https://doi.org/10.1109/access.2020.3033758 UllahI. AminN.U. AlmogrenA. KhanM.A. UddinM.I. HuaQ. “A Lightweight and Secured Certificate-Based Proxy Signcryption (CBPS) Scheme for E-Prescription Systems,” IEEE Access 8 199197 199212 2020 https://doi.org/10.1109/access.2020.3033758 Search in Google Scholar

Zhang X., Zhao J., Mu L., Tang Y., and Xu C., “Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,” Pervasive and Mobile Computing, vol. 56, pp. 18–28, 2019. https://doi.org/10.1016/j.pmcj.2019.03.004 ZhangX. ZhaoJ. MuL. TangY. XuC. “Identity-based proxy-oriented outsourcing with public auditing in the cloud-based medical cyber-physical systems,” Pervasive and Mobile Computing 56 18 28 2019 https://doi.org/10.1016/j.pmcj.2019.03.004 Search in Google Scholar

Taleb N., “Prospective applications of blockchain and bitcoin cryptocurrency technology,” TEM Journal, vol. 8, no. 03, pp. 48–55, 2019. https://dx.doi.org/10.18421/TEM81-06 TalebN. “Prospective applications of blockchain and bitcoin cryptocurrency technology,” TEM Journal 8 03 48 55 2019 https://dx.doi.org/10.18421/TEM81-06 Search in Google Scholar

Gousteris, S., Stamatiou, Y. C., Halkiopoulos, C., Antonopoulou, H., & Kostopoulos, N. (2023). Secure distributed cloud storage based on blockchain technology and smart contracts. Emerging Science Journal, 7(2). GousterisS. StamatiouY. C. HalkiopoulosC. AntonopoulouH. KostopoulosN. 2023 Secure distributed cloud storage based on blockchain technology and smart contracts Emerging Science Journal 7 2 Search in Google Scholar

Singh, S., Rosak-Szyrocka, J., & Tamàndl, L. (2023). Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applications. HighTech and Innovation Journal, 4(1). SinghS. Rosak-SzyrockaJ. TamàndlL. 2023 Development, service-oriented architecture, and security of blockchain technology for Industry 4.0 IoT applications HighTech and Innovation Journal 4 1 Search in Google Scholar

Ruangkanjanases, A., Hariguna, T., Adiandari, A. M., & Alfawaz, K. M. (2022). Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading need. Emerging Science Journal, 6(5). RuangkanjanasesA. HarigunaT. AdiandariA. M. AlfawazK. M. 2022 Assessing blockchain adoption in supply chain management: Antecedents of technology readiness, knowledge sharing, and trading need Emerging Science Journal 6 5 Search in Google Scholar

Lee, G. Kim, K & Kim, S. (2020). A Study on the Application of Blockchain Technology in the Construction Industry. KSCE J Civ Eng 24, 2561–2571. LeeG. KimK KimS. 2020 A Study on the Application of Blockchain Technology in the Construction Industry KSCE J Civ Eng 24 2561 2571 Search in Google Scholar

Język:
Angielski
Częstotliwość wydawania:
1 razy w roku
Dziedziny czasopisma:
Inżynieria, Wstępy i przeglądy, Inżynieria, inne