Increasing participants using counting-based secret sharing via involving matrices and practical steganography

F Al-Shaarani, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Secret sharing is an approach for accessing sensitive information by several authorized
participants. It shares the secret key in different forms among several authorized participants …

Scalable data storage design for nonstationary IoT environment with adaptive security and reliability

A Tchernykh, M Babenko, N Chervyakov… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality,
integrity, and availability violations. The loss of information, denial of access, information …

SUSU supercomputer resources for industry and fundamental science

P Kostenetskiy, P Semenikhina - 2018 Global Smart Industry …, 2018 - ieeexplore.ieee.org
The supercomputers of South Ural State University are at the core of the University's
research performance. These facilities enable researchers to perform a broad range of …

[HTML][HTML] AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage

A Tchernykh, M Babenko, N Chervyakov… - International Journal of …, 2018 - Elsevier
Cloud security issues are important factors for data storage and processing. Apart from the
existing security and reliability problems of traditional distributed computing, there are new …

Positional characteristics for efficient number comparison over the homomorphic encryption

M Babenko, A Tchernykh, N Chervyakov… - … and Computer Software, 2019 - Springer
Modern algorithms for symmetric and asymmetric encryptions are not suitable to provide
security of data that needs data processing. They cannot perform calculations over …

Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage

A Tchernykh, V Miranda-López, M Babenko… - Cluster …, 2019 - Springer
Abstract Properties of redundant residue number system (RRNS) are used for detecting and
correcting errors during the data storing, processing and transmission. However, detection …

DT-RRNS: Routing protocol design for secure and reliable distributed smart sensors communication systems

A Gladkov, E Shiriaev, A Tchernykh, M Deryabin… - Sensors, 2023 - mdpi.com
A smart city has a complex hierarchical communication system with various components. It
must meet the requirements of fast connection, reliability, and security without data …

WA-RRNS: Reliable data storage system based on multi-cloud

A Tchernykh, M Babenko… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Cloud technologies are widely used for storage services. However, the single cloud cannot
ensure the reliability of data. To solve the security issue, we present a multi-cloud based …

Multi-objective configuration of a secured distributed cloud data storage

LE García-Hernández, A Tchernykh… - Latin American High …, 2019 - Springer
Cloud storage is one of the most popular models of cloud computing. It benefits from a
shared set of configurable resources without limitations of local data storage infrastructures …

Auction and classification of smart contracts

DE Gibaja-Romero, RM Cantón-Croda - Mathematics, 2022 - mdpi.com
The execution of smart contracts (SCs) relies on consensus algorithms that validate the
miner who executes the contract and gets a fee to cover her expenditure. In this sense …