Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Sokolov, Volodymyr"'
Autor:
Bessalov, Anatoly1 (AUTHOR) a.bessalov17@gmail.com, Sokolov, Volodymyr1 (AUTHOR) v.sokolov@kubg.edu.ua, Abramov, Serhii1 (AUTHOR)
Publikováno v:
Cryptography (2410-387X). Sep2024, Vol. 8 Issue 3, p38. 17p.
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 8(4), 2020
An analysis is made of the properties and conditions for the existence of 3- and 5-isogenies of complete and quadratic supersingular Edwards curves. For the encapsulation of keys based on the SIDH algorithm, it is proposed to use isogeny of minimal o
Externí odkaz:
http://arxiv.org/abs/2006.16111
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 7(3), 2020
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the developing communication fake and trick calls, bringing about signific
Externí odkaz:
http://arxiv.org/abs/2004.00318
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 6(2), 2019
The problem of data security in IEEE 802.15.4 systems on Pololu Wixel devices is solved, examples of hardware and software implementation of encryption and decryption of different devices on the same platform are given. The proposed approaches can be
Externí odkaz:
http://arxiv.org/abs/1912.12043
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 5, 2019
The article presents the research and comparative analysis of the bandwidth of low-power wireless IoT devices as wireless switches. The following IoT devices were investigated: Raspberry Pi 3 Model B and Raspberry Pi Zero W. The DS18B20 and INA219 se
Externí odkaz:
http://arxiv.org/abs/1910.13892
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 4, 2019
The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in
Externí odkaz:
http://arxiv.org/abs/1907.00793
Publikováno v:
Mathematics. Information Technologies. Education (MoMLeT&DS), 2019
The paper examines quantitative assessment of wireless distribution system security, as well as an assessment of risks from attacks and security violations. Furthermore, it describes typical security breach and formal attack models and five methods f
Externí odkaz:
http://arxiv.org/abs/1906.10877
Publikováno v:
Mathematics. Information Technologies. Education (MoMLeT&DS), 2019
The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless w
Externí odkaz:
http://arxiv.org/abs/1906.10878
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 3, 2019
To date, there is a need for the development of efficient data and device exchange protocols that this exchange will provide, since standard protocols used in traditional networks can not fully meet the needs of a new type of network. The article des
Externí odkaz:
http://arxiv.org/abs/1904.01700
Autor:
Sokolov, Volodymyr Yu.
Publikováno v:
Cybersecurity: Education, Science, Technique (ISSN: 2663-4023), no. 2, 2018
The article deals with the development, implementation and research of the spectrum analyzers that can be used in sensor networks and Internet systems of things. As an operating frequency range, 2.4-2.5 GHz ISM is selected. At the stage of hardware s
Externí odkaz:
http://arxiv.org/abs/1904.01696