Yevhen Zolotavkin

Orcid: 0000-0002-1875-122X

According to our database1, Yevhen Zolotavkin authored at least 17 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects.
Proceedings of the Privacy Technologies and Policy - 12th Annual Privacy Forum, 2024

2023
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism.
IEEE Trans. Inf. Forensics Secur., 2023

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis.
ACM Comput. Surv., 2023

Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Improving Unlinkability of Attribute-based Authentication through Game Theory.
ACM Trans. Priv. Secur., 2022

2021
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Incentives for Stable Mining in Pay Per Last N Shares Pools.
Proceedings of the 2019 IFIP Networking Conference, 2019

Incentives for Harvesting Attack in Proof of Work Mining Pools.
Proceedings of the Computer Security - ESORICS 2019, 2019

Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2017
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
A New Scalar Quantization Method for Digital Image Watermarking.
J. Electr. Comput. Eng., 2016

Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance.
Proceedings of the 22nd International Conference on Virtual System & Multimedia, 2016

2014
A New QIM-Based Watermarking Method Robust to Gain Attack.
Int. J. Digit. Multim. Broadcast., 2014

Quantization Based Watermarking Approach with Gain Attack Recovery.
Proceedings of the 2014 International Conference on Digital Image Computing: Techniques and Applications, 2014

2013
SVD-based Digital Image Watermarking on approximated Orthogonal Matrix.
Proceedings of the SECRYPT 2013, 2013


  Loading...