Sergey Bezzateev

Orcid: 0000-0002-0924-6221

According to our database1, Sergey Bezzateev authored at least 72 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Finding Enumerators for Generalized (L, G)-Code.
Autom. Control. Comput. Sci., December, 2023

Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods.
Autom. Control. Comput. Sci., December, 2023

Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices.
Cryptogr., July, 2023

Using Generalized (L, G)-Codes for Implementation the Classic McEliece Cryptosystem.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Blockchain-Based Device Authentication Method in Industrial Internet of Things.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Continuous Authentication in a UAVs Swarm.
Proceedings of the 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2023

Blockchain Based Fog Computing Network Architecture.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains.
Autom. Control. Comput. Sci., December, 2022

2021
Modern McEliece Cryptosystem Using Generalized ($L, G$)-Codes.
Proceedings of the 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2021

Multi-Layer Message Signature Scheme with Threshold-based Distributed PKG and Dynamic Leader Selection.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
Measurements of Mobile Blockchain Execution Impact on Smartphone Battery.
Data, 2020

On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication.
Cryptogr., 2020

An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends.
IEEE Access, 2020

Method of Comparison of Neural Network Resistance to Adversarial Attacks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2020

Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Accident Detection in Internet of Vehicles using Blockchain Technology.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario.
Sensors, 2019

Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective.
Sensors, 2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications.
IEEE Netw., 2019

Totally decomposed cumulative Goppa codes with improved estimations.
Des. Codes Cryptogr., 2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications.
CoRR, 2019

Blockchain Technology for Smartphones and Constrained IoT Devices: A Future Perspective and Implementation.
Proceedings of the 21st IEEE Conference on Business Informatics, 2019

Steganographic WF5 Method for Weighted Embedding: An Overview and Comparison.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation.
Proceedings of the 9th International Conference on Localization and GNSS, 2019

2018
Lower Bounds on the Covering Radius of the Non-Binary and Binary Irreducible Goppa Codes.
IEEE Trans. Inf. Theory, 2018

Multi-Factor Authentication: A Survey.
Cryptogr., 2018

Secure Information Exchange in Defining the Location of the Vehicle.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Signing Documents by Hand: Model for Multi-Factor Authentication.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

MLSB optimal effective weighted container construction for WF5 embedding algorithm.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Traceability Schemes Usings Finite Geometry.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure.
Proceedings of the 22nd Conference of Open Innovations Association, 2018

2017
Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study.
J. Sens. Actuator Networks, 2017

Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things.
IEEE Internet Things J., 2017

Lower Bound of the Covering Radius of Irreducible Goppa Codes.
Electron. Notes Discret. Math., 2017

Lower bound of covering radius of binary irreducible Goppa codes.
Des. Codes Cryptogr., 2017

Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets.
Cryptogr. Commun., 2017

Digital Watermarking Method Based on Image Compression Algorithms.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

HEPPA: Highly Efficient Privacy Preserving Authentication for ITS.
Proceedings of the Computer Network Security, 2017

Multi-factor authentication: A survey and challenges in V2X applications.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Lightweight structures of big numbers for cryptographic primitives in limited devices.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Image encryption in code based compression algorithms based on multilevel image structure model.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function.
Proceedings of the Second International Conference on Advanced Wireless Information, 2017

2016
The Use of European Internet Communication Properties for IP Geolocation.
Inf. Technol. Control., 2016

Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Effectiveness of LSB and MLSB information embedding for BMP images.
Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

2015
Using the Structure of Subfields in the Construction of Goppa Codes and Extended Goppa Codes.
IEEE Trans. Inf. Theory, 2015

Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Wireless authentication using OPACITY protocol.
Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2015

Multi-level Significant Bit (MLSB) Embedding Based on Weighted Container Model and Weighted F5 Concept.
Proceedings of the Second International Afro-European Conference for Industrial Advancement, 2015

2014
A Generalized Construction of Extended Goppa Codes.
IEEE Trans. Inf. Theory, 2014

McEliece in the world of Escher.
IACR Cryptol. ePrint Arch., 2014

A new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codes.
Des. Codes Cryptogr., 2014

Cyclic Generalized Separable (<i>L, G</i>) Codes.
Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014

2013
A Generalized Construction and Improvements on Nonbinary Codes From Goppa Codes.
IEEE Trans. Inf. Theory, 2013

A Unified View on Known Algebraic Decoding Algorithms and New Decoding Concepts.
IEEE Trans. Inf. Theory, 2013

Subclass of Cyclic Goppa Codes.
IEEE Trans. Inf. Theory, 2013

A new subclass of cyclic Goppa codes.
Probl. Inf. Transm., 2013

Some new codes from binary Goppa codes and a method of shortening linear codes.
IET Commun., 2013

Class of generalized Goppa codes perfect in weighted Hamming metric.
Des. Codes Cryptogr., 2013

Generalizing bounds on the minimum distance of cyclic codes using cyclic product codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Joint safety and security analysis for complex systems.
Proceedings of the 13th Conference of Open Innovations Association FRUCT, 2013

2012
Decoding Cyclic Codes up to a New Bound on the Minimum Distance.
IEEE Trans. Inf. Theory, 2012

Binary generalized (<i>L, G</i>) codes that are perfect in a weighted hamming metric.
Probl. Inf. Transm., 2012

Describing a cyclic code by another cyclic code.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Efficient decoding of some classes of binary cyclic codes beyond the Hartmann-Tzeng bound.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
Special classes of separable Goppa codes with improved parameter estimates.
Probl. Inf. Transm., 2010

Cumulative-Separable Codes
CoRR, 2010

2008
Chain of Separable Binary Goppa Codes and Their Minimal Distance.
IEEE Trans. Inf. Theory, 2008

Decoding of interleaved RS codes with the Euclidean algorithm.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2006
Privacy Homomorphism for Delegation of the Computations.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

1998
A Subclass of Binary Goppa Codes with Improved Estimation of the Code Dimension.
Des. Codes Cryptogr., 1998

1995
Subclass of binary Goppa codes with minimal distance equal to the design distance.
IEEE Trans. Inf. Theory, 1995


  Loading...