Volgen
Yevhen Zolotavkin
Yevhen Zolotavkin
Barkhausen Institut
Geverifieerd e-mailadres voor barkhauseninstitut.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools
Y Zolotavkin, J García, C Rudolph
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
202017
A new two-dimensional quantization method for digital image watermarking
Y Zolotavkin, M Juhola
2015 17th International Conference on Advanced Communication Technology …, 2015
152015
Examining the current status and emerging trends in continuous authentication technologies through citation network analysis
JJ Jeong, Y Zolotavkin, R Doss
ACM Computing Surveys 55 (6), 1-31, 2022
82022
Weak-key analysis for bike post-quantum key encapsulation mechanism
MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ...
IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023
72023
A new blind adaptive watermarking method based on singular value decomposition
Y Zolotavkin, M Juhola
PROCEEDINGS OF 2013 International Conference on Sensor Network Security …, 2013
62013
Game theoretic analysis of reputation approach on block withholding attack
L Yu, J Yu, Y Zolotavkin
International Conference on Network and System Security, 149-166, 2020
52020
A new scalar quantization method for digital image watermarking
Y Zolotavkin, M Juhola
Journal of Electrical and Computer Engineering 2016, 1-1, 2016
52016
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
N Lalchandani, F Jiang, JJ Jeong, Y Zolotavkin, R Doss
2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021
42021
Towards a conceptual framework for privacy protection in the use of interactive 360 video surveillance
S Chaudhary, E Berki, P Nykänen, Y Zolotavkin, M Helenius, J Kela
2016 22nd International Conference on Virtual System & Multimedia (VSMM), 1-10, 2016
32016
Quantization based watermarking approach with gain attack recovery
Y Zolotavkin, M Juhola
2014 International Conference on Digital Image Computing: Techniques and …, 2014
32014
Time-dependent decision-making and decentralization in proof-of-work cryptocurrencies
Y Zolotavkin, J Garcia, JK Liu
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 108-10813, 2019
22019
SVD-based digital image watermarking on approximated orthogonal matrix
Y Zolotavkin, M Juhola
2013 International Conference on Security and Cryptography (SECRYPT), 1-10, 2013
22013
A novel approach to the security of data hidden in multimedia objects
Y Zolotavkin, V Lukichov, A Vasyura
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
22008
Improving unlinkability of attribute-based authentication through game theory
Y Zolotavkin, JJ Jeong, V Kuchta, M Slavnenko, R Doss
ACM Transactions on Privacy and Security 25 (2), 1-36, 2022
12022
Incentives for stable mining in pay per last N shares pools
Y Zolotavkin, J Garcia
2019 IFIP Networking Conference (IFIP Networking), 1-9, 2019
12019
Incentives for harvesting attack in proof of work mining pools
Y Zolotavkin, V Kuchta
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
12019
New Methods for Digital Image Watermarking
Y Zolotavkin
Tampere University Press, 2015
12015
A new QIM-based watermarking method robust to gain attack
Y Zolotavkin, M Juhola
International Journal of Digital Multimedia Broadcasting 2014, 2014
12014
Improvement of pattern hiding method of data application in JPEG-files
V Lukitchov, A Vasyura, Y Zolotavkin
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
12008
Guidelines and Multidisciplinary Knowledge Advice for Cyber Protection in e-Learning: Hey, Teachers! Don’t Leave the Kids Alone Online!
E Berki, S Chaudhary, M Panteri, T Valkanou, JP Valtanen, J Bamford, ...
1
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20