Oleksandr Kuznetsov
Orcid: 0000-0003-2331-6326
According to our database1,
Oleksandr Kuznetsov
authored at least 42 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Efficient Denial of Service Attack Detection in IoT using Kolmogorov-Arnold Networks.
CoRR, February, 2025
Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification.
Future Internet, 2025
Advancing Visual Recognition with Kolmogorov-Arnold Networks: A Novel Hybrid Architecture for Edge Computing Applications.
Proceedings of the 11th Sapienza Yearly Symposium of Technology, 2025
Proceedings of the 10th International Conference of Yearly Reports on Informatics, 2025
2024
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.
Cryptogr., September, 2024
Cryptogr., September, 2024
NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization.
Future Internet, July, 2024
Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis.
Multim. Tools Appl., June, 2024
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
Cryptogr., June, 2024
Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography.
Appl. Intell., April, 2024
Deep learning-based biometric cryptographic key generation with post-quantum security.
Multim. Tools Appl., 2024
Efficient Zero-Knowledge Proofs for Set Membership in Blockchain-Based Sensor Networks: A Novel OR-Aggregation Approach.
J. Sens. Actuator Networks, 2024
Merkle trees in blockchain: A Study of collision probability and security implications.
Internet Things, 2024
Eng. Appl. Artif. Intell., 2024
Probabilistic Analysis and Empirical Validation of Patricia Tries in Ethereum State Management.
CoRR, 2024
Scalable Zero-Knowledge Proofs for Verifying Cryptographic Hashing in Blockchain Applications.
CoRR, 2024
Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities.
CoRR, 2024
Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability.
CoRR, 2024
Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes.
Comput., 2024
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection.
Comput. Secur., 2024
Corrections to "On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security".
IEEE Access, 2024
On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security.
IEEE Access, 2024
Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms.
IEEE Access, 2024
Trust-Based Security Architecture for Edge Computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection.
Proceedings of the Selected Papers of the XI International Scientific Conference "Information Technology and Implementation" (IT&I 2024). Conference Proceedings, 2024
Proceedings of the Artificial Intelligence and Soft Computing, 2024
Proceedings of the Artificial Intelligence and Soft Computing, 2024
Utilizing Evolutionary Algorithms for the Synthesis of Cryptographic Substitution Patterns.
Proceedings of the Artificial Intelligence and Soft Computing, 2024
Proceedings of the Artificial Intelligence and Soft Computing, 2024
Scalable zero-knowledge proofs for verifying cryptographic hashing in blockchain applications (short paper).
Proceedings of the Classic, 2024
Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers.
Proceedings of the Classic, 2024
Enhancing blockchain scalability through zero-knowledge proofs: A novel block finality system for near protocol.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
2023
Integrating Non-Positional Numbering Systems into E-Commerce Platforms: A Novel Approach to Enhance System Fault Tolerance.
J. Theor. Appl. Electron. Commer. Res., 2023
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023
Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Conference Proceedings, Kyiv, Ukraine, November 20, 2023
Trade-offs in Post-Quantum Cryptography: A Comparative Assessment of BIKE, HQC, and Classic McEliece.
Proceedings of the Workshop on Classic, 2023
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023
A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015