Kateryna Kuznetsova

According to our database1, Kateryna Kuznetsova authored at least 14 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications.
CoRR, 2024

Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms.
IEEE Access, 2024

2021
Full Non-Binary Constant-Weight Codes.
SN Comput. Sci., 2021

Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications".
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Fault Tolerance Computer System Structures Functioning in Residue Classes.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
The data errors control in the modular number system based on the nullification procedure.
Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), 2020

Data Hiding Scheme Based on Spread Sequence Addressing.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

2019
Information Hiding Using 3D-Printing Technology.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Biometric Images Attacks Detecting Using Convolutional Neural Networks.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Discrete Signals with Special Correlation Properties.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Methods for Comparing Numbers in Non-Positional Notation of Residual Classes.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

Statistical Testing of Blockchain Hash Algorithms.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...