sec-certs: Examining the security certification practice for better vulnerability mitigation

A Janovsky, J Jancar, P Svenda, Ł Chmielewski… - Computers & …, 2024 - Elsevier
Products certified under security certification frameworks such as Common Criteria undergo
significant scrutiny during the costly certification process. Yet, critical vulnerabilities …

Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system

A Silonosov, L Henesey - … of the 19th International Conference on …, 2024 - dl.acm.org
The research presented in the paper evaluates practices of Attribute-Based Encryption,
leading to a proposed end-to-end encryption strategy for a cloud-based drone management …

Towards cryptographic agility manifesto in end-to-end encryption systems: a position paper from the perspective of crypto-consumers

A Silonosov, L Henesey - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
This position paper presents the preliminary results from a research study focusing on
cryptographic agility for consumers of open-source cryptographic libraries. We provide a …

[PDF][PDF] Key generation method based on Genitor Genetic Algorithm model.

A Pryimak, Y Yaremchuk, N Kunanets - CMiGIN, 2022 - ceur-ws.org
The study examines the current genetic algorithm-based key generation methods. Their
models of work were studied, and the advantages and disadvantages are described, in …