Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Oleksiy Shapoval"'
Autor:
Oleksandr Kurbatov, Pavlo Kravchenko, Nikolay Poluyanenko, Oleksiy Shapoval, Tetiana Kuznetsova
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 2, Iss 6, Pp 19-31 (2019)
Ця стаття описує підхід до ідентифікації та сертифікації у децентралізованому середовищі. Протокол визначає шлях інтеграції блокчейн-
Externí odkaz:
https://doaj.org/article/d31242ae71264982a883d5d5f77fb21a
Autor:
Nikolay Alexandrovich Poluyanenko, Oleksiy Shapoval, Tetiana Kuznetsova, Pavlo Kravchenko, Oleksandr Kurbatov
Publikováno v:
Cybersecurity: Education, Science, Technique. 2:19-31
This article describes an approach to identification and certification in a decentralized environment. The protocol defines the way to integrate blockchain technology and web-of-trust concepts to create a decentralized public key infrastructure with
Autor:
Nikolay Alexandrovich Poluyanenko, Tetiana Kuznetsova, Oleksandr Kurbatov, Pavel Kravchenko, Oleksiy Shapoval
Publikováno v:
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).
This paper describes the mechanisms for using ring signatures to ensure anonymity in a decentralized e-voting system. Unlike standard signature algorithms that allow you to uniquely authenticate the authorship of the signature, a ring signature allow
Autor:
Alexandr Kuznetsov, Oleksiy Shapoval, Dmytro Prokopovych-Tkachenko, Vadim Yakovenko, Sergii Kavun, Nikolay Alexandrovich Poluyanenko
Publikováno v:
2019 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo).
It is presented theoretical statements about decentralized systems technology, blockchain networks, their structure as well as main functioning principles, structure and material about Hyperledger platform. It is examined Hyperledger services archite
Autor:
Kostyantyn Serdukov, Oleksiy Shapoval, Kyrylo Chernov, Alexandr Kuznetsov, Yehor Yeromin, Mariia Popova
Publikováno v:
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON).
The paper provides a state of current technologies, which are used for automated vulnerability testing in software. Features of fuzzing technology (which is based on making many inputs with different mutated data) are also studied. The essence of the