Designing Secured Services for Authentication, Authorization, and Accounting of Users

D Shevchuk, O Harasymchuk… - … in Information and …, 2023 - elibrary.kubg.edu.ua
In this paperwork service for authentication, authorization, and user management has been
designed and developed. The purpose of this work is to simplify the configuration of user …

A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications

A Hadj Brahim, H Ali Pacha, M Naim… - The Journal of …, 2025 - Springer
Generating random values become increasingly desirable due to its advantages. In this
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …

Застосування генераторів псевдовипадкових чисел та послідовностей в кібербезпеці, методи їх побудови та оцінки якості

M Khomik, O Harasymchuk - Ukrainian Information Security …, 2023 - jrnl.nau.edu.ua
У зв'язку з бурхливим розвитком обчислювальної і вимірювальної техніки, а також із
впровадженням новітніх технологій значно розширилась сфера застосування …

Automated Conformity Verification Concept for Cloud Security

Y Martseniuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The primary objective of this research is to develop an advanced automated method for
configuring and managing public cloud accounts and subscriptions on prominent platforms …

Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol

J Ni, J Zhang, G Wang, R Li, Y Shen - Symmetry, 2023 - mdpi.com
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure
Multi-party Computation has led to an increased demand for a new class of symmetric …

A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages

A Melnyk, R Shevchuk, I Romanets… - 2024 14th …, 2024 - ieeexplore.ieee.org
The increased use of VoIP technology heightens the potential threats to ordinary users. This
study examines the peculiarities of implementing corporate VoIP telephony systems …

Designing Data Classification and Secure Store Policy According to SOC 2 Type II

O Deineka, O Harasymchuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This paper discusses the design of a data classification policy for SOC 2 Type II compliance.
SOC 2 Type II is a significant certification that attests to a service organization's ability to …

Strike: Stream Cipher Based on Stochastic Lightning Strike Behaviour

K Suwais, S Almanasra - Applied Sciences, 2023 - mdpi.com
There is an increasing need for secure and fast encryption algorithms to support
applications and communication protocols, and business models. In this paper, we present …

Fuzzy System of IT-Project Works Priority

N Vasylkiv, L Dubchak, M Karpinski… - 2024 14th …, 2024 - ieeexplore.ieee.org
A fuzzy system for setting the priority of IT project work has been developed, in which a
preliminary analysis of the metrics of readiness, permission and complexity of tasks is …

Hardware Modified Additive Fibonacci Generators Using Prime Numbers

V Maksymovych, K Przystupa, O Harasymchuk… - … on Computer Science …, 2023 - Springer
The article presents hardware modified additive Fibonacci generators, which use modular
addition, with the base of the prime number. Generators differ from the classical presence in …