Designing Secured Services for Authentication, Authorization, and Accounting of Users
D Shevchuk, O Harasymchuk… - … in Information and …, 2023 - elibrary.kubg.edu.ua
In this paperwork service for authentication, authorization, and user management has been
designed and developed. The purpose of this work is to simplify the configuration of user …
designed and developed. The purpose of this work is to simplify the configuration of user …
A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications
A Hadj Brahim, H Ali Pacha, M Naim… - The Journal of …, 2025 - Springer
Generating random values become increasingly desirable due to its advantages. In this
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
Застосування генераторів псевдовипадкових чисел та послідовностей в кібербезпеці, методи їх побудови та оцінки якості
M Khomik, O Harasymchuk - Ukrainian Information Security …, 2023 - jrnl.nau.edu.ua
У зв'язку з бурхливим розвитком обчислювальної і вимірювальної техніки, а також із
впровадженням новітніх технологій значно розширилась сфера застосування …
впровадженням новітніх технологій значно розширилась сфера застосування …
Automated Conformity Verification Concept for Cloud Security
Y Martseniuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The primary objective of this research is to develop an advanced automated method for
configuring and managing public cloud accounts and subscriptions on prominent platforms …
configuring and managing public cloud accounts and subscriptions on prominent platforms …
Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol
J Ni, J Zhang, G Wang, R Li, Y Shen - Symmetry, 2023 - mdpi.com
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure
Multi-party Computation has led to an increased demand for a new class of symmetric …
Multi-party Computation has led to an increased demand for a new class of symmetric …
A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages
The increased use of VoIP technology heightens the potential threats to ordinary users. This
study examines the peculiarities of implementing corporate VoIP telephony systems …
study examines the peculiarities of implementing corporate VoIP telephony systems …
Designing Data Classification and Secure Store Policy According to SOC 2 Type II
O Deineka, O Harasymchuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This paper discusses the design of a data classification policy for SOC 2 Type II compliance.
SOC 2 Type II is a significant certification that attests to a service organization's ability to …
SOC 2 Type II is a significant certification that attests to a service organization's ability to …
Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour
K Suwais, S Almanasra - Applied Sciences, 2023 - mdpi.com
There is an increasing need for secure and fast encryption algorithms to support
applications and communication protocols, and business models. In this paper, we present …
applications and communication protocols, and business models. In this paper, we present …
Fuzzy System of IT-Project Works Priority
N Vasylkiv, L Dubchak, M Karpinski… - 2024 14th …, 2024 - ieeexplore.ieee.org
A fuzzy system for setting the priority of IT project work has been developed, in which a
preliminary analysis of the metrics of readiness, permission and complexity of tasks is …
preliminary analysis of the metrics of readiness, permission and complexity of tasks is …
Hardware Modified Additive Fibonacci Generators Using Prime Numbers
V Maksymovych, K Przystupa, O Harasymchuk… - … on Computer Science …, 2023 - Springer
The article presents hardware modified additive Fibonacci generators, which use modular
addition, with the base of the prime number. Generators differ from the classical presence in …
addition, with the base of the prime number. Generators differ from the classical presence in …