Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Cullen, Andrew
,
Pietro Ferraro
,
Christopher King
, and
Robert Shorten
.
"
Distributed ledger technology for IoT: Parasite chain attacks
."
arXiv preprint arXiv:1904.00996
(2019).
BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace
In
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
. Paris, France, 2017.
Arapinis, Myrto
,
Andriana Gkaniatsou
,
Dimitris Karakostas
, and
Aggelos Kiayias
.
"
A Formal Treatment of Hardware Wallets
."
IACR Cryptology ePrint Archive
(2019): 34.
Pustišek, M.
, and
A. Kos
.
"
Approaches to front-end IoT application development for the ethereumblockchain
."
Procedia Computer Science
129 (2018): 410-419.
Rezaeighaleh, Hossein
, and
Cliff C. Zou
.
"
New Secure Approach to Backup Cryptocurrency Wallets
." In
IEEE Global Communications Conference-Communication & Information Systems Security Symposium
., 2019.
Kim, Mark
,
Brian Hilton
,
Zach Burks
, and
Jordan Reyes
.
Integrating Blockchain, Smart Contract-Tokens, and IoT to Design a Food Traceability Solution
In
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
., 2018.
Wołk, Krzysztof
.
"
Advanced social media sentiment analysis for short‐term cryptocurrency price prediction
."
Expert Systems
(2019).
Tsyganok, Vitaliy
, and
Sergii V. Kadenko
.
"
On sufficiency of the consistency level of group ordinal estimates
."
Journal of Automation and Information Sciences
42, no. 8 (2010): 42-47.
Savchenko, Nikita
.
Ethereum Delegated Transactions Service
. Crypatograph DApp github.com, 2019.
Stallings, William
.
Cryptography and Network Security: Principles and Practice
. USA.: Prentice Hall Press, 2010.
Murphy, Ann
, and
David Murphy
.
"
The Role of Cryptography in Security for Electronic Commerce
."
The ITB Journal
2, no. 1 (2001): 21-50.
Liskov, Moses
.
"
Miller–Rabin Probabilistic Primality Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2005.
Conrad, Keith
.
"
Miller-Rabin Test
." In
Encyclopedia of Cryptography and Security
. Boston, MA: Springer, 2011.
Kong, Fanyu
,
Jia Yu
, and
Lei Wu
.
Security analysis of an RSA key generation algorithm with a large private key
In
Proceedings of the 14th international conference on Information security (ISC’11)
. Berlin, Heidelberg: Springer-Verlag, 2011.
Encinas, Luis Hernandez
,
Jaime Masqué
, and
Araceli Queiruga-Dios
.
An algorithm to obtain an RSA modulus with a large private key
In
IACR Cryptology ePrint Archive
., 2003.
Menon, Vijay
.
Deterministic Primality Testing - understanding the AKS algorithm
., 2003.
Salembier, Robert G.
, and
Paul Southerington
.
"
An Implementation of the AKS Primality Test
."
IEEE
(2005).
Dietzfelbinger, Martin
.
Primality Testing in Polynomial Time: From Randomized Algorithms to “Primes Is in P”
In
Lecture Notes in Computer Science
. SpringerVerlag, 2004.
Mubarakov, Bulat
, and
Ramilya Rubtsova
.
"
On the Number of Witnesses in the Miller–Rabin Primality Test
."
Symmetry
12, no. 6 (2020).
Conrad, Keith
.
The Miller–Rabin test
., 2011.
Sierpiński, W.
.
"
Chapter IX Legendre's Symbol and Jacobi's Symbol
."
North-Holland Mathematical Library
31 (1988): 340-359.
French, Paddy James
.
"
Smart Sensors: Advantages and Pitfalls
." In
Advanced Materials and Technologies for Micro/Nano-Devices, Sensors and Actuators
, 249-259., 2010.
Rahman, Arifur
.
Assignment on Temperature Sensors
In
Technical Report
., 2018.
Sparks, Doug
.
"
MEMS pressure and flow sensors for automotive engine management and aerospace applications
." In
MEMS for Automotive and Aerospace Applications
, 78-105. Woodhead Publishing Series in Electronic and Optical Materials, 2013.
Panayotova, Galina
,
Georgi Dimitrov
, and
Dimitar Dimitrov
.
Wireless Sensors for analysis transport systems
In
10th International Conference on Computer Science and Information Technology (ICCSIT 2017)
. Florence, Italy, 2017.
Pages
« първа
‹ предишна
…
418
419
420
421
422
423
424
425
426
…
следваща ›
последна »
382691 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all