Search Results - "Kogos, Konstantin G."
-
1
Prospective approaches to detecting network covert channels
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01-04-2021)“…The purpose of this study is to analyze the existing timing covert channels detection methods. Preventive measures are often used to counteract storage covert…”
Get full text
Journal Article -
2
Network covert channels capacity limitation by adding random delays before packet sending
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01-12-2021)“…Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that…”
Get full text
Journal Article -
3
Method for identifying network covert channels
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01-09-2021)“…The aim of this paper is to describe the created method for identifying network covert channels. Traditionally, the scheme for countering information leakage…”
Get full text
Journal Article -
4
Module for Collecting, Processing and Aggregating Data of the Transaction Analysis System on the Bitcoin Network
Published in 2023 IEEE XVI International Scientific and Technical Conference Actual Problems of Electronic Instrument Engineering (APEIE) (10-11-2023)“…The paper presents the study and systematization of the subject area, as well as the implementation of the module for automating the collection, processing and…”
Get full text
Conference Proceeding -
5
New Approach in the Rainbow Tables Method for Human-Like Passwords
Published in 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (01-01-2020)“…This paper represents a new approach to rainbow tables, a method of password recovery that was originally developed by Martin E. Hellman and then improved by…”
Get full text
Conference Proceeding -
6
Mobile authentication over hand-waving
Published in 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS) (01-09-2017)“…This article contains information about the ability to authenticate a user on the movements of the smartphone in his hand during user interaction with the…”
Get full text
Conference Proceeding -
7
Incoming call user authentication by screen interaction analysis
Published in 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS) (01-09-2017)“…This article contains information about the ability to authenticate a user based on the underscore of finger movement over the touch screen. Currently, users…”
Get full text
Conference Proceeding -
8
Fully homomorphic encryption schemes: The state of the art
Published in 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (2017)“…The challenge of maintaining confidentiality of stored and processed data in a remote database or cloud is quite urgent. Using homomorphic encryption may solve…”
Get full text
Conference Proceeding -
9
Research of homomorphic encryption algorithms over integers
Published in 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (2017)“…The authors research partly and full homomorphic cryptosystems. The purpose of the work is realization and analysis of homomorphic encryption algorithms over…”
Get full text
Conference Proceeding -
10
Review of covert channels over HTTP: Communication and countermeasures
Published in 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (2017)“…Many innovations in the field of cryptography have been made in recent decades, ensuring the confidentiality of the message's content. However, sometimes it's…”
Get full text
Conference Proceeding -
11
Continuous User Authentication in Mobile Phone Browser Based on Gesture Characteristics
Published in 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (01-10-2018)“…Conventional authentication methods like passwords, PINs, graphical keys do not provide the required level of security. Those authentication methods might be…”
Get full text
Conference Proceeding