Search Results - "Kogos, Konstantin G."

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Prospective approaches to detecting network covert channels by Kogos, Konstantin G., Finoshin, Mihail A.

    “…The purpose of this study is to analyze the existing timing covert channels detection methods. Preventive measures are often used to counteract storage covert…”
    Get full text
    Journal Article
  2. 2

    Network covert channels capacity limitation by adding random delays before packet sending by Belozubova, Anna I., Kogos, Konstantin G., Lebedev, Philipp V.

    “…Attention to covert channels has largely increased due to the documents published by E. Snowden, which described the software and hardware embedding that…”
    Get full text
    Journal Article
  3. 3

    Method for identifying network covert channels by Kogos, Konstantin G., Finoshin, Mihail A., Airapetyan, Sergey V.

    “…The aim of this paper is to describe the created method for identifying network covert channels. Traditionally, the scheme for countering information leakage…”
    Get full text
    Journal Article
  4. 4

    Module for Collecting, Processing and Aggregating Data of the Transaction Analysis System on the Bitcoin Network by Basinya, Evgeny A., Karapetyants, Nikolay, Karapetyants, Mark, Kogos, Konstantin G.

    “…The paper presents the study and systematization of the subject area, as well as the implementation of the module for automating the collection, processing and…”
    Get full text
    Conference Proceeding
  5. 5

    New Approach in the Rainbow Tables Method for Human-Like Passwords by Alpatskiy, Mark A., Borzunov, Georgii I., Epishkina, Anna V., Kogos, Konstantin G.

    “…This paper represents a new approach to rainbow tables, a method of password recovery that was originally developed by Martin E. Hellman and then improved by…”
    Get full text
    Conference Proceeding
  6. 6

    Mobile authentication over hand-waving by Filina, Alina N., Kogos, Konstantin G.

    “…This article contains information about the ability to authenticate a user on the movements of the smartphone in his hand during user interaction with the…”
    Get full text
    Conference Proceeding
  7. 7

    Incoming call user authentication by screen interaction analysis by Valatskayte, Yana V., Kogos, Konstantin G.

    “…This article contains information about the ability to authenticate a user based on the underscore of finger movement over the touch screen. Currently, users…”
    Get full text
    Conference Proceeding
  8. 8

    Fully homomorphic encryption schemes: The state of the art by Kogos, Konstantin G., Filippova, Kseniia S., Epishkina, Anna V.

    “…The challenge of maintaining confidentiality of stored and processed data in a remote database or cloud is quite urgent. Using homomorphic encryption may solve…”
    Get full text
    Conference Proceeding
  9. 9

    Research of homomorphic encryption algorithms over integers by Gerasimov, Alexandr N., Epishkina, Anna V., Kogos, Konstantin G.

    “…The authors research partly and full homomorphic cryptosystems. The purpose of the work is realization and analysis of homomorphic encryption algorithms over…”
    Get full text
    Conference Proceeding
  10. 10

    Review of covert channels over HTTP: Communication and countermeasures by Kogos, Konstantin G., Seliverstova, Elena I., Epishkina, Anna V.

    “…Many innovations in the field of cryptography have been made in recent decades, ensuring the confidentiality of the message's content. However, sometimes it's…”
    Get full text
    Conference Proceeding
  11. 11

    Continuous User Authentication in Mobile Phone Browser Based on Gesture Characteristics by Iuzbashev, Artem V., Filippov, Alexander I., Kogos, Konstantin G.

    “…Conventional authentication methods like passwords, PINs, graphical keys do not provide the required level of security. Those authentication methods might be…”
    Get full text
    Conference Proceeding