<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Approach to Improve Web Video Streaming Security and Prevent Personal Data Leakage</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">HLS</style></keyword><keyword><style  face="normal" font="default" size="100%">IPTV</style></keyword><keyword><style  face="normal" font="default" size="100%">live streaming</style></keyword><keyword><style  face="normal" font="default" size="100%">RTMP</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">78-88 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The invention of television changed the world and made information spread faster. For the past few years, broadcast television has remained digital only and IP networks have emerged as an additional broadcast option. Regardless of the infrastructure used by a given broadcaster, some channels or even special content require a specific payment scheme and implement conditional access. This study proposes an approach for secure video streaming and preventing video content from easily leaking due to cyber security issues. The proposed methods cover both aspects – the content itself and the protection of subscribers’ personal data when using live streaming services.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">78</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Todor Balabanov</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RSA Weaknesses Caused by the Specifics of Random Number Generation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">random numbers gen-eration</style></keyword><keyword><style  face="normal" font="default" size="100%">RSA algorithm</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">171-179 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The rapid entry in digital transformation and Covid-19 moved many activities to the Internet. The application of cybersecurity tools gives a sense of good security condition of the used digital services. This is often how things look on the surface, but the problems sometimes is hard to notice. The current study presents weaknesses in the still widely used cryptographic algorithm RSA, which allows RSA cryptographic keys to be compromised. It demonstrates the connection with RNG as the root of all the resulting controversies around the issues under consideration.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digitization</style></keyword><keyword><style  face="normal" font="default" size="100%">PRNG</style></keyword><keyword><style  face="normal" font="default" size="100%">RNG</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">62-76</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The provision of cybersecurity is of basic importance for every effective information system. It is possible to provide most rich information services, but only one neglected cybersecurity risk may compromise the system and all services it provides. Therefore, meeting the cybersecurity requirements is a prerequisite for the safety and security of IT infrastructures, digital resources, and the protection of private data. In that respect, the themes of cryptography and sufficiently robust random number generation are of particular interest. This article looks for the “golden ratio” between the provision of mass services and the efforts to meet cybersecurity requirements. It suggests a method and discusses the possibilities to increase the cryptographic protection in information systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">62</style></section></record></records></xml>