# Sergey Bezzateev

According to our database

Collaborative distances:

^{1}, Sergey Bezzateev authored at least 60 papers between 1995 and 2020.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2020

Data, 2020

An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends.

IEEE Access, 2020

Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Proceedings of the 2020 International Conference on Information Networking, 2020

2019

Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario.

Sensors, 2019

Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective.

Sensors, 2019

IEEE Netw., 2019

Des. Codes Cryptogr., 2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications.

CoRR, 2019

Blockchain Technology for Smartphones and Constrained IoT Devices: A Future Perspective and Implementation.

Proceedings of the 21st IEEE Conference on Business Informatics, 2019

Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation.

Proceedings of the 9th International Conference on Localization and GNSS, 2019

2018

Lower Bounds on the Covering Radius of the Non-Binary and Binary Irreducible Goppa Codes.

IEEE Trans. Inf. Theory, 2018

Cryptogr., 2018

Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

MLSB optimal effective weighted container construction for WF5 embedding algorithm.

Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure.

Proceedings of the 22nd Conference of Open Innovations Association, 2018

2017

Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study.

J. Sens. Actuator Networks, 2017

Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things.

IEEE Internet Things J., 2017

Electron. Notes Discret. Math., 2017

Des. Codes Cryptogr., 2017

Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets.

Cryptogr. Commun., 2017

Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Proceedings of the Computer Network Security, 2017

Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Lightweight structures of big numbers for cryptographic primitives in limited devices.

Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Image encryption in code based compression algorithms based on multilevel image structure model.

Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function.

Proceedings of the Second International Conference on Advanced Wireless Information, 2017

2016

Inf. Technol. Control., 2016

Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

2015

Using the Structure of Subfields in the Construction of Goppa Codes and Extended Goppa Codes.

IEEE Trans. Inf. Theory, 2015

Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity.

Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2015

Multi-level Significant Bit (MLSB) Embedding Based on Weighted Container Model and Weighted F5 Concept.

Proceedings of the Second International Afro-European Conference for Industrial Advancement, 2015

2014

IEEE Trans. Inf. Theory, 2014

IACR Cryptol. ePrint Arch., 2014

A new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codes.

Des. Codes Cryptogr., 2014

Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014

2013

IEEE Trans. Inf. Theory, 2013

IEEE Trans. Inf. Theory, 2013

IEEE Trans. Inf. Theory, 2013

Probl. Inf. Transm., 2013

IET Commun., 2013

Des. Codes Cryptogr., 2013

Generalizing bounds on the minimum distance of cyclic codes using cyclic product codes.

Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Proceedings of the 13th Conference of Open Innovations Association FRUCT, 2013

2012

IEEE Trans. Inf. Theory, 2012

Binary generalized (<i>L, G</i>) codes that are perfect in a weighted hamming metric.

Probl. Inf. Transm., 2012

Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011

Efficient decoding of some classes of binary cyclic codes beyond the Hartmann-Tzeng bound.

Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010

Probl. Inf. Transm., 2010

CoRR, 2010

2008

IEEE Trans. Inf. Theory, 2008

Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2006

Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

1998

Des. Codes Cryptogr., 1998

1995

Subclass of binary Goppa codes with minimal distance equal to the design distance.

IEEE Trans. Inf. Theory, 1995