Sergei Zapechnikov

Orcid: 0000-0002-7975-6040

According to our database1, Sergei Zapechnikov authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Systematization of knowledge: privacy methods and zero knowledge proofs in corporate blockchains.
J. Comput. Virol. Hacking Tech., June, 2024

Historical notes on Russian cryptography.
J. Comput. Virol. Hacking Tech., June, 2024

2023
Zero knowledge proof and ZK-SNARK for private blockchains.
J. Comput. Virol. Hacking Tech., September, 2023

Post-quantum security of messengers: secure group chats and continuous key distribution protocols.
J. Comput. Virol. Hacking Tech., September, 2023

2022
Secure multi-party computations for privacy-preserving machine learning.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

2020
Post-Quantum Group Key Agreement Scheme.
IACR Cryptol. ePrint Arch., 2020

Contemporary trends in privacy-preserving data pattern recognition.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

Privacy methods and zero-knowledge poof for corporate blockchain.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

On the key composition for post-quantum group messaging and file exchange.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

2016
Taxonomy for Unsecure Big Data Processing in Security Operations Centers.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Towards Approximation of Human's Perceptive Space on Photos, Videos and 3D Scenes.
Proceedings of the 7th Annual International Conference on Biologically Inspired Cognitive Architectures, 2016

Analysis of Intrusion Detection and Prevention Systems as Queueing Services.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Modeling of next-generation firewalls as queueing services.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

History of Cryptography in Syllabus on Information Security Training.
Proceedings of the Information Security Education Across the Curriculum, 2015

On Experience of Using Distance Learning Technologies for Teaching Cryptology.
Proceedings of the Information Security Education Across the Curriculum, 2015

Analysis of Hypoexponential Computing Services for Big Data Processing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2014
Big Data Information Security Maintenance.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Information Security Maintenance Issues for Big Security-Related Data.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
"Business Continuity and Information Security Maintenance" Masters' Training Program.
Proceedings of the Information Assurance and Security Education and Training, 2013


  Loading...