Search Results - "Yakovlev, Viktor"
-
1
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback
Published in 2024 35th Conference of Open Innovations Association (FRUCT) (24-04-2024)“…It has been proven that several recently published protocols for exchanging by keys over noiseless channels of the same authors as in the current paper, have…”
Get full text
Conference Proceeding Journal Article -
2
Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions
Published in 2022 31st Conference of Open Innovations Association (FRUCT) (27-04-2022)“…Recently, we proposed similar key sharing protocol executed over the public noiseless channels and also without any cryptographic assumptions. Exchange by…”
Get full text
Conference Proceeding Journal Article -
3
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions
Published in 2022 32nd Conference of Open Innovations Association (FRUCT) (09-11-2022)“…A further development of the key sharing protocol presented at previous FRUCT -31 session is proposed in the current paper. In contrast to the previous…”
Get full text
Conference Proceeding Journal Article -
4
Influence of Accidental Impurities on the Spectroscopic and Luminescent Properties of ZnWO4 Crystal
Published in Materials (25-03-2023)“…Special techniques for deep purification of ZnO and WO3 have been developed in this work. A ZnWO4 single crystal has been grown by the Czochralski method using…”
Get full text
Journal Article -
5
Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance
Published in 2021 29th Conference of Open Innovations Association (FRUCT) (12-05-2021)“…It is well known that Diffie-Hellman key distribution protocol is vulnerable to a man-in-the-middle attack for which an adversary manages to share the key with…”
Get full text
Conference Proceeding Journal Article -
6
The Influence of Mesh Resolution on 3D RANS Flow Simulations in Turbomachinery Flow Parts
Published in Journal of mechanical engineering (Kharkiv. Online) (30-03-2021)“…The question of the difference mesh refinement degree influence on the results of calculation of the three-dimensional viscous gas flows in the flow parts of…”
Get full text
Journal Article -
7
Diagnostics of osteoporosis based on analysis of electromagnetic wave propagation in biological objects
Published in 2019 Antennas Design and Measurement International Conference (ADMInC) (01-10-2019)“…Osteoporosis is a disease characterized by the gradual deterioration of a trabecular bone, changing its density and composition. Dielectric constant of the…”
Get full text
Conference Proceeding -
8
Influence of Accidental Impurities on the Spectroscopic and Luminescent Properties of ZnWO 4 Crystal
Published in Materials (25-03-2023)“…Special techniques for deep purification of ZnO and WO have been developed in this work. A ZnWO single crystal has been grown by the Czochralski method using…”
Get full text
Journal Article -
9
Influence of Accidental Impurities on the Spectroscopic and Luminescent Properties of ZnWO[sub.4] Crystal
Published in Materials (01-03-2023)“…Special techniques for deep purification of ZnO and WO[sub.3] have been developed in this work. A ZnWO[sub.4] single crystal has been grown by the Czochralski…”
Get full text
Journal Article -
10
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
Published in Control systems and computers (Online) (01-12-2019)Get full text
Journal Article -
11
Oxygen Regime and Exchange of Ammonia in the Sensomotor Cortex of Cats During Blood Loss and Hyperbaric Oxygenation
Published in Obshchai͡a︡ reanimatologii͡a (24-04-2020)“…Purpose. To study the effect of hyperbaric oxygenation (HBO) on the oxygen regime and ammonia metabolism in the neurons of cat cortex in hemorrhagic shock…”
Get full text
Journal Article -
12
Authentication of Keys Distributed by the Diffie-Hellman Method for Mobile Devices based on Authentication Codes and Magnetometric Data
Published in Trudy SPIIRAN (Print) (05-06-2019)“…The wide distribution of mobile wireless devices (smartphones, tablets, etc.) warrants cryptographic protection of information transmitted by these devices,…”
Get full text
Journal Article -
13
NUMERICAL SIMULATION OF 3D FLOW IN VKI-GENOA TURBINE CASCADE INCLUDING LAMINAR-TURBULENT TRANSITION
Published in T.A.S.K. quarterly (01-01-2016)“…This study presents a numerical simulation of a 3D viscous flow in the VKI-Genoa cascade taking into account the laminar-turbulent transition. The numerical…”
Get full text
Journal Article -
14
-
15
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization
Published in IEEE transactions on information theory (01-06-2008)“…In this paper, we consider the information-theoretic secure key distribution problem over noisy wiretap channels with public discussion and in the presence of…”
Get full text
Journal Article -
16
Analysis of the traditional voting system and transition to the online voting system in the republic of Iraq
Published in 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (11-06-2021)“…Nowadays, technology has developed rapidly, several countries have changed the voting from traditional to electronic voting due to the potential advantages…”
Get full text
Conference Proceeding -
17
Mesh Resolution Effect on 3D RANS Turbomachinery Flow Simulations
Published 31-08-2016“…The paper presents the study of the effect of a mesh refinement on numerical results of 3D RANS computations of turbomachinery flows. The CFD solver F, which…”
Get full text
Journal Article -
18
Algebraic Patterns of Vulnerabilities in Binary Code
Published in 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) (01-06-2019)“…This paper presents an algebraic approach for formalizing and detecting vulnerabilities in binary code. It uses behaviour algebra equations for creating…”
Get full text
Conference Proceeding -
19
Аутентификация ключей, распределяемых методом Диффи — Хеллмана, для мобильных устройств на основе аутентифицирующих помехоустойчивых кодов и магнитометрических данных
Published in Informatika i avtomatizaciâ (Online) (01-06-2019)“…Широкое распространение мобильных беспроводных устройств (смартфонов, планшетов и пр.) остро ставит вопрос о криптографической защите передаваемой этими…”
Get full text
Journal Article -
20
Microwave diagnostics of osteoporosis
Published in 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (01-01-2018)“…A biological object is considered as a complicated dielectric structure with losses. Particularly, the dielectric properties of human bones depend on their…”
Get full text
Conference Proceeding