Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Sergey V. Zapechnikov"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 1, Pp 75-85 (2024)
This article addresses the privacy issue in distributed ledger technology (DLT) and blockchain. The research focuses on the applied use case of private transactions involving digital assets. The article provides a comparison of various privacy method
Externí odkaz:
https://doaj.org/article/148b97073f7141458ffc746cc78b7564
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 2, Pp 91-89 (2024)
Zero-knowledge proofs are being increasingly applied to a wide range of tasks in modern distributed information systems. Of particular interest are such areas of activity as digital asset management systems, anonymous electronic voting systems, and a
Externí odkaz:
https://doaj.org/article/bd3aca3ebd1040bc9dece35ee47374a2
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 2, Pp 46-56 (2022)
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure four-party computations. The advantages of the four-party computations over the two- and three-party computations are analyzed. The def
Externí odkaz:
https://doaj.org/article/2fad16dc3162494dbf0ea30e2c31f180
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 1, Pp 30-43 (2022)
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machin
Externí odkaz:
https://doaj.org/article/0c3b4aba1ff84e65bdf1aea0f9503cf5
Publikováno v:
Безопасность информационных технологий, Vol 28, Iss 4, Pp 39-51 (2021)
The paper is devoted to the analysis of privacy-preserving machine learning systems based on secure two-party computations. The paper provides introductory information about privacy-preserving machine learning systems, analyses the goals and objectiv
Externí odkaz:
https://doaj.org/article/9171d4e6675f410abc028ede6db2499d
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 27, Iss 4, Pp 108-123 (2020)
The paper is devoted to the actual problem of ensuring privacy during performing transactions in distributed ledgers. We discuss various aspects of transaction privacy, as well as the specifics of setting the problem for distributed ledgers with two
Externí odkaz:
https://doaj.org/article/4b26c3c7491e40099d56dfffae62b4d1
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 27, Iss 1, Pp 51-67 (2020)
The paper is devoted to the recent scientific problem of privacy-preserving machine learning. The problem actuality is determined by the growing need to use machine learning for personal data, as well as for data that make up commercial, medical, fin
Externí odkaz:
https://doaj.org/article/2e5304dae73340b8af673dd74516200b
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 26, Iss 4, Pp 37-53 (2019)
The paper is devoted to the problem of using distributed ledgers as a tool to ensure trust among business process participants. The purpose of the paper is to offer a systematic review of the applied aspects of modern distributed ledger technologies,
Externí odkaz:
https://doaj.org/article/022f9258260c4924968e9b6f129f4bcc
Publikováno v:
Безопасность информационных технологий, Vol 25, Iss 3, Pp 16-25 (2018)
Nowadays one should not underestimate importance of informational technologies across all fields of humans’ life. Computational technologies and tools became crucial parts of any human activity. However, since information is becoming a strategic re
Externí odkaz:
https://doaj.org/article/63eb41cff4674a54b2c30b18757e3d66
Publikováno v:
Безопасность информационных технологий, Vol 24, Iss 4, Pp 35-43 (2017)
The aim of this work is to analyze the available possibilities for improving secure messaging with end-to-end connections under conditions of external violator actions and distrusted service provider. We made a comparative analysis of cryptographic s
Externí odkaz:
https://doaj.org/article/25bbdcd047804f62a839c1ed47e79f84