Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage

A Tchernykh, V Miranda-López, M Babenko… - Cluster …, 2019 - Springer
Abstract Properties of redundant residue number system (RRNS) are used for detecting and
correcting errors during the data storing, processing and transmission. However, detection …

Algorithm for constructing modular projections for correcting multiple errors based on a redundant residue number system using maximum likelihood decoding

M Babenko, A Nazarov, A Tchernykh… - … and Computer Software, 2021 - Springer
One of the most important applications of the Redundant Residual Numbers System (RRNS)
is to improve the fault tolerance of the data storage, processing, and transmission …

Adaptive encrypted cloud storage model

E Lopez-Falcon, A Tchernykh… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
In this paper, we propose an adaptive model of data storage in a heterogeneous distributed
cloud environment. Our system utilizes the methods of secret sharing schemes and error …

[HTML][HTML] Российская «гражданская наука», отражение в БД Scopus: наукометрический анализ

ТВ Бусыгина - Социология науки и технологий, 2024 - cyberleninka.ru
Представлен наукометрический анализ документального массива (ДМ)(128
публикаций) с российской аффилиацией по теме «гражданская наука»(ГН) из базы …

[PDF][PDF] ЭМПИРИЧЕСКИЕ ИССЛЕДОВАНИЯ

ТВ Бусыгина - SOCIOLOGY, 2024 - sst.nw.ru
Гражданская наука (ГН, Citizen science)—это набор практик проведения научных
исследований в научных учреждениях в широком спектре тематических направлений с …

[PDF][PDF] About Cloud Storage Systems Survivability

N Kucherov, I Dvoryaninova, M Babenko… - CEUR Workshop …, 2020 - researchgate.net
This article proposes an approach to improving reliability and survivability based on modular
arithmetic. The proposed approach makes it possible to increase the survivability of cloud …

[PDF][PDF] Verifiable computations: Approaches and perspectives

LK Babenko, FB Burtyka… - International Journal of …, 2018 - academia.edu
The paper reviews various existing approaches to construct verifiable computing schemes.
Such schemes allow a weak client to delegate the computation of function F (X) to the …