Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Dang, Hung
,
Tien Dinh
,
Eechien Chang
,
Qian Lin
, and
Beng Ooi
.
Towards scaling blockchain systems via sharding
In
2019 International Conference on Management of Data (SIGMOD '19)
., 2019.
Mookherjee, Dilip
.
"
Decentralization, hierarchies, and incentives: A mechanism design perspective
."
Journal of Economic Literature
44, no. 2 (2006): 367-390.
Raval, Siraj
.
Decentralized Applications: Harnessing Bitcoin's Blockchain Technology
. O'Reilly Media, Inc., 2016.
Cullen, Andrew
,
Pietro Ferraro
,
Christopher King
, and
Robert Shorten
.
"
Distributed ledger technology for IoT: Parasite chain attacks
."
arXiv preprint arXiv:1904.00996
(2019).
BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace
In
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
. Paris, France, 2017.
Arapinis, Myrto
,
Andriana Gkaniatsou
,
Dimitris Karakostas
, and
Aggelos Kiayias
.
"
A Formal Treatment of Hardware Wallets
."
IACR Cryptology ePrint Archive
(2019): 34.
Pustišek, M.
, and
A. Kos
.
"
Approaches to front-end IoT application development for the ethereumblockchain
."
Procedia Computer Science
129 (2018): 410-419.
Rezaeighaleh, Hossein
, and
Cliff C. Zou
.
"
New Secure Approach to Backup Cryptocurrency Wallets
." In
IEEE Global Communications Conference-Communication & Information Systems Security Symposium
., 2019.
Kim, Mark
,
Brian Hilton
,
Zach Burks
, and
Jordan Reyes
.
Integrating Blockchain, Smart Contract-Tokens, and IoT to Design a Food Traceability Solution
In
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
., 2018.
Wołk, Krzysztof
.
"
Advanced social media sentiment analysis for short‐term cryptocurrency price prediction
."
Expert Systems
(2019).
Tsyganok, Vitaliy
, and
Sergii V. Kadenko
.
"
On sufficiency of the consistency level of group ordinal estimates
."
Journal of Automation and Information Sciences
42, no. 8 (2010): 42-47.
Savchenko, Nikita
.
Ethereum Delegated Transactions Service
. Crypatograph DApp github.com, 2019.
Stallings, William
.
Cryptography and Network Security: Principles and Practice
. USA.: Prentice Hall Press, 2010.
Murphy, Ann
, and
David Murphy
.
"
The Role of Cryptography in Security for Electronic Commerce
."
The ITB Journal
2, no. 1 (2001): 21-50.
Liskov, Moses
.
"
Miller–Rabin Probabilistic Primality Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2005.
Conrad, Keith
.
"
Miller-Rabin Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2011.
Kong, Fanyu
,
Jia Yu
, and
Lei Wu
.
Security analysis of an RSA key generation algorithm with a large private key
In
Proceedings of the 14th international conference on Information security (ISC’11)
. Berlin, Heidelberg: Springer-Verlag, 2011.
Encinas, Luis Hernandez
,
Jaime Masqué
, and
Araceli Queiruga-Dios
.
An algorithm to obtain an RSA modulus with a large private key
In
IACR Cryptology ePrint Archive
., 2003.
Menon, Vijay
.
Deterministic Primality Testing - understanding the AKS algorithm
., 2003.
Salembier, Robert G.
, and
Paul Southerington
.
"
An Implementation of the AKS Primality Test
."
IEEE
(2005).
Dietzfelbinger, Martin
.
Primality Testing in Polynomial Time: From Randomized Algorithms to “Primes Is in P”
In
Lecture Notes in Computer Science
. SpringerVerlag, 2004.
Mubarakov, Bulat
, and
Ramilya Rubtsova
.
"
On the Number of Witnesses in the Miller–Rabin Primality Test
."
Symmetry
12, no. 6 (2020).
Conrad, Keith
.
The Miller–Rabin test
., 2011.
Sierpiński, W.
.
"
Chapter IX Legendre's Symbol and Jacobi's Symbol
."
North-Holland Mathematical Library
31 (1988): 340-359.
French, Paddy James
.
"
Smart Sensors: Advantages and Pitfalls
." In
Advanced Materials and Technologies for Micro/Nano-Devices, Sensors and Actuators
, 249-259., 2010.
Pages
« първа
‹ предишна
…
418
419
420
421
422
423
424
425
426
…
следваща ›
последна »
347978 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all