Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Tashev, Tasho
, and
Vladimir Monov
.
Large-Scale Simulation of Uniform Load Traffic for Modeling of Throughput on a Crossbar Switch Node
In
8-th Int. Confл “Large-Scale Scientific Computations”
. Vol. LNCS, 7116. Sozopol, Bulgaria: Springer, 2012.
Pseudo-Random Number Generators
., 2020.
Badrignans, Benoit
,
Jean Luc Danger
,
Viktor Fischer
,
Guy Gogniat
, and
Lionel Torres
.
Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems
. Netherlands: Springer, 2011.
Robert G. Brown's General Tools Page
., 2020.
King, Sunny
, and
Scott Nadal
.
Ppcoin: Peer-to-peer crypto-currency with proof-of-stake
., 2012.
Schueffel, Patrick
.
Alternative distributed ledger technologies Blockchain vs. Tangle vs. Hashgraph-A high-level overview and comparison
In
Tangle vs. Hashgraph-A High-Level Overview and Comparison
., 2017.
Savchenko, Mykyta
,
Vitaliy Tsyganok
, and
Oleh Andriichuk
.
Decision Support Systems' Security Model Based on Decentralized Data Platforms
In
Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2018)
., 2018.
Dang, Hung
,
Tien Dinh
,
Eechien Chang
,
Qian Lin
, and
Beng Ooi
.
Towards scaling blockchain systems via sharding
In
2019 International Conference on Management of Data (SIGMOD '19)
., 2019.
Mookherjee, Dilip
.
"
Decentralization, hierarchies, and incentives: A mechanism design perspective
."
Journal of Economic Literature
44, no. 2 (2006): 367-390.
Raval, Siraj
.
Decentralized Applications: Harnessing Bitcoin's Blockchain Technology
. O'Reilly Media, Inc., 2016.
Cullen, Andrew
,
Pietro Ferraro
,
Christopher King
, and
Robert Shorten
.
"
Distributed ledger technology for IoT: Parasite chain attacks
."
arXiv preprint arXiv:1904.00996
(2019).
BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace
In
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
. Paris, France, 2017.
Arapinis, Myrto
,
Andriana Gkaniatsou
,
Dimitris Karakostas
, and
Aggelos Kiayias
.
"
A Formal Treatment of Hardware Wallets
."
IACR Cryptology ePrint Archive
(2019): 34.
Pustišek, M.
, and
A. Kos
.
"
Approaches to front-end IoT application development for the ethereumblockchain
."
Procedia Computer Science
129 (2018): 410-419.
Rezaeighaleh, Hossein
, and
Cliff C. Zou
.
"
New Secure Approach to Backup Cryptocurrency Wallets
." In
IEEE Global Communications Conference-Communication & Information Systems Security Symposium
., 2019.
Kim, Mark
,
Brian Hilton
,
Zach Burks
, and
Jordan Reyes
.
Integrating Blockchain, Smart Contract-Tokens, and IoT to Design a Food Traceability Solution
In
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
., 2018.
Wołk, Krzysztof
.
"
Advanced social media sentiment analysis for short‐term cryptocurrency price prediction
."
Expert Systems
(2019).
Tsyganok, Vitaliy
, and
Sergii V. Kadenko
.
"
On sufficiency of the consistency level of group ordinal estimates
."
Journal of Automation and Information Sciences
42, no. 8 (2010): 42-47.
Savchenko, Nikita
.
Ethereum Delegated Transactions Service
. Crypatograph DApp github.com, 2019.
Stallings, William
.
Cryptography and Network Security: Principles and Practice
. USA.: Prentice Hall Press, 2010.
Murphy, Ann
, and
David Murphy
.
"
The Role of Cryptography in Security for Electronic Commerce
."
The ITB Journal
2, no. 1 (2001): 21-50.
Liskov, Moses
.
"
Miller–Rabin Probabilistic Primality Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2005.
Conrad, Keith
.
"
Miller-Rabin Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2011.
Kong, Fanyu
,
Jia Yu
, and
Lei Wu
.
Security analysis of an RSA key generation algorithm with a large private key
In
Proceedings of the 14th international conference on Information security (ISC’11)
. Berlin, Heidelberg: Springer-Verlag, 2011.
Encinas, Luis Hernandez
,
Jaime Masqué
, and
Araceli Queiruga-Dios
.
An algorithm to obtain an RSA modulus with a large private key
In
IACR Cryptology ePrint Archive
., 2003.
Pages
« първа
‹ предишна
…
418
419
420
421
422
423
424
425
426
…
следваща ›
последна »
498313 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance