KUZNETSOV, OLEKSANDR
 Distribuzione geografica
Continente #
AS - Asia 2.692
SA - Sud America 2.368
EU - Europa 1.307
NA - Nord America 1.057
AF - Africa 119
Continente sconosciuto - Info sul continente non disponibili 3
OC - Oceania 2
Totale 7.548
Nazione #
BR - Brasile 1.886
VN - Vietnam 1.000
US - Stati Uniti d'America 891
SG - Singapore 884
IT - Italia 381
GB - Regno Unito 300
KR - Corea 244
AR - Argentina 226
DE - Germania 177
RU - Federazione Russa 140
CN - Cina 127
ID - Indonesia 115
MX - Messico 113
EC - Ecuador 94
FR - Francia 78
FI - Finlandia 67
HK - Hong Kong 59
IN - India 56
ZA - Sudafrica 44
AT - Austria 39
PY - Paraguay 39
UA - Ucraina 39
BD - Bangladesh 35
CO - Colombia 32
IQ - Iraq 28
PE - Perù 25
TW - Taiwan 25
CL - Cile 23
PL - Polonia 23
VE - Venezuela 21
CA - Canada 16
EG - Egitto 16
UY - Uruguay 16
PK - Pakistan 15
DO - Repubblica Dominicana 14
ES - Italia 14
MA - Marocco 14
TR - Turchia 13
JP - Giappone 12
KZ - Kazakistan 11
NL - Olanda 9
MY - Malesia 8
SE - Svezia 8
AZ - Azerbaigian 7
TN - Tunisia 7
AE - Emirati Arabi Uniti 6
BO - Bolivia 6
KE - Kenya 6
NP - Nepal 6
UZ - Uzbekistan 6
AL - Albania 5
BH - Bahrain 5
CH - Svizzera 5
DZ - Algeria 5
GT - Guatemala 5
BJ - Benin 4
ET - Etiopia 4
NI - Nicaragua 4
PA - Panama 4
RS - Serbia 4
CI - Costa d'Avorio 3
CR - Costa Rica 3
IE - Irlanda 3
IL - Israele 3
PH - Filippine 3
RO - Romania 3
SA - Arabia Saudita 3
SN - Senegal 3
XK - ???statistics.table.value.countryCode.XK??? 3
YT - Mayotte 3
AM - Armenia 2
AU - Australia 2
CZ - Repubblica Ceca 2
GA - Gabon 2
GE - Georgia 2
HN - Honduras 2
JO - Giordania 2
KH - Cambogia 2
KW - Kuwait 2
MK - Macedonia 2
PS - Palestinian Territory 2
SI - Slovenia 2
TH - Thailandia 2
TT - Trinidad e Tobago 2
AO - Angola 1
BE - Belgio 1
BY - Bielorussia 1
CG - Congo 1
DM - Dominica 1
GH - Ghana 1
GM - Gambi 1
HU - Ungheria 1
IR - Iran 1
KG - Kirghizistan 1
LA - Repubblica Popolare Democratica del Laos 1
LY - Libia 1
MD - Moldavia 1
MQ - Martinica 1
MT - Malta 1
NA - Namibia 1
Totale 7.540
Città #
Ho Chi Minh City 397
Ashburn 331
London 249
Naples 243
Seoul 242
Singapore 190
Hanoi 188
São Paulo 156
Munich 100
Chicago 79
The Dalles 66
Mexico City 61
Dallas 60
Hong Kong 59
Rio de Janeiro 57
Helsinki 54
Beijing 48
Da Nang 40
Porto Alegre 39
Haiphong 38
Los Angeles 37
Assago 32
Brasília 32
Rome 32
Thái Bình 32
Curitiba 31
Frankfurt am Main 30
Quito 29
Biên Hòa 28
Guayaquil 27
Moscow 27
Buenos Aires 26
Belo Horizonte 22
Taipei 22
Campinas 21
Lima 21
Vienna 21
Ninh Bình 20
Nuremberg 20
Thái Nguyên 20
Can Tho 19
Fortaleza 19
Hải Dương 19
Manaus 18
Mumbai 18
Salvador 18
Lauterbourg 17
Goiânia 16
Johannesburg 16
Sorocaba 16
Canoas 15
Ribeirão Preto 15
Santa Clara 15
Portsmouth 14
Recife 14
Uberlândia 14
Warsaw 14
Lấp Vò 13
Montevideo 13
New York 13
Brooklyn 12
Cape Town 12
Guarulhos 12
Santo André 12
Surabaya 12
Bắc Ninh 11
Ha Long 11
Piracicaba 11
Quảng Ninh 11
Salt Lake City 11
Asunción 10
Blumenau 10
Caxias do Sul 10
Franca 10
Hortolândia 10
Jakarta 10
Juiz de Fora 10
Milan 10
Sumaré 10
Volta Redonda 10
Baghdad 9
Bauru 9
Bexley 9
Bắc Giang 9
Cairo 9
Carpegna 9
Dhaka 9
Gravataí 9
Osasco 9
Águas Lindas de Goiás 9
Belém 8
Bogotá 8
Chennai 8
Düsseldorf 8
Itajaí 8
Joinville 8
Passo Fundo 8
Perugia 8
Santo Domingo 8
Stockholm 8
Totale 3.928
Nome #
Efficient Zero-Knowledge Proofs for Set Membership in Blockchain-Based Sensor Networks: A Novel OR-Aggregation Approach 230
Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes 77
A Method for Implementing the Operation of Modulo Addition of the Residues of Two Numbers in the Residue Number System 63
Method of diagnostic of non-positional code structures in the system of residue classes basing on the usage of an alternative number set informativeness 57
Comparative Analysis of Cryptocurrency Trading Platforms Using the Analytic Hierarchy Process 55
Fault Tolerance Computer System Structures Functioning in Residue Classes 55
COMBINING AND FILTERING FUNCTIONS IN THE FRAMEWORK OF NONLINEAR-FEEDBACK SHIFT REGISTER 54
A new cost function for heuristic search of nonlinear substitutions 53
Hiding data in images using a pseudo-random sequence 52
Code-based cryptosystems from NIST PQC 52
Performance analysis of cryptographic hash functions suitable for use in blockchain 51
New Approach to the Implementation of Post-Quantum Digital Signature Scheme 51
Adaptive cybersecurity: AI-driven threat intelligence in healthcare systems 51
COMBINING AND FILTERING FUNCTIONS IN THE FRAMEWORK OF NONLINEAR-FEEDBACK SHIFT REGISTER 51
Studies on statistical analysis and performance evaluation for some stream ciphers 50
Enhanced Security and Efficiency in Blockchain with Aggregated Zero-Knowledge Proof Mechanisms 50
Construction of cascade codes in the frequency domain 50
Improved method of determining the alternative set of numbers in residue number system 50
Biometric cryptosystems: Overview, state-of-the-art and perspective directions 50
Discrete signals with special correlation properties 49
Trade-offs in Post-Quantum Cryptography: A Comparative Assessment of BIKE, HQC, and Classic McEliece 47
The method of raising numbers, represented in the system of residual classes to an arbitrary power of a natural number 47
Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems 47
Implementing Recursive Proofs for Efficient Blockchain Verification: A zk-SNARKs Approach 46
Harnessing edge computing for real-time cybersecurity in healthcare systems 46
Code-based electronic digital signature 46
Advanced Code-Based Electronic Digital Signature Scheme 45
Performance of Hash Algorithms on GPUs for Use in Blockchain 45
Key generation from biometric data of iris 44
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation 44
Advancing metaverse security with cryptographic innovations 44
Codes for Multiple-Access Asynchronous Techniques 43
Periodic Properties of Cryptographically Strong Pseudorandom Sequences 43
Heuristic methods for the design of cryptographic Boolean functions 43
Fundamentals of Functioning of Global Contact Monitoring Systems in the Context of COVID-19 Spread Prevention 43
Adaptive Merkle trees for enhanced blockchain scalability 41
Computational Modeling of Enhanced Spread Spectrum Codes for Asynchronous Wireless Communication 41
Comment on 'Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications' 41
Output feedback encryption mode: periodic features of output blocks sequence 41
Blockchain applications in metaverse environments: new horizons 40
An Empirical Assessment of Leading Blockchain Financial Services 40
Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor 40
The analysis of the methods of data diagnostic in a residue number system 39
New Code Based Fuzzy Extractor for Biometric Cryptography 39
Towards Robust Biometric Authentication: Implementing Post-Quantum Cryptography via Code-Based Fuzzy Extractors 39
Formation of Pseudorandom Sequences with Special Correlation Properties 38
Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis 38
Advanced Steganography in 3D Models: An AI-Powered Approach 38
Securing Digital Communications with AI-Enhanced Synonym Substitution in Text 38
Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms 38
Experimental Studies Of The Modern Symmetric Stream Ciphers 37
The decentralized voting model using the hyperledger platform paper 37
SBGen: A high-performance library for rapid generation of cryptographic S-boxes 37
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications 37
Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification 37
A prospective lightweight block cipher for green IT engineering 37
Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image Steganography 36
Dataset Dependency in CNN-Based Copy-Move Forgery Detection: A Multi-Dataset Comparative Analysis 36
On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security 36
Comparative Research of Fluid Cryptographic Transformation Algorithms 36
The Design of Boolean Functions by Modified Hill Climbing Method 36
Side Channel Attack on a Quantum Random Number Generator 36
High-Speed Stream Ciphers for Wireless Communication Systems 36
Deep Learning Based Face Liveliness Detection 36
Comparison of Stream Modes in Block Symmetric Ciphers 35
Non-Binary Cryptographic Functions for Symmetric Ciphers 35
Solving Blockchain Scalability Problem Using ZK-SNARK 35
Residual classes based mathematical model of the computer system's reliability 35
Analysis of Bitstreamed Cryptographic Conversion Algorithms from the International Project eSTREAM 35
Overview and Comparison of the Main Approaches to the Implementation of Contact Tracing Mechanisms in the COVID-19 Pandemic 35
Information Hiding Using 3D-Printing Technology 35
A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management 34
Lightweight stream ciphers for green IT engineering 34
A NEW APPROACH TO THE CONSTRUCTION OF A POST-QUANTUM ELECTRONIC DIGITAL SIGNATURE SCHEME 34
Performance Evaluation of the Classic McEliece Key Encapsulation Algorithm 34
WHS Cost Function for Generating S-boxes 34
Cryptographic Transformations in a Decentralized Blockchain Environment 34
Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography 33
Smart contracts for automated compliance in healthcare cybersecurity 33
Optimization of the PCF Cost Function for the Generation of Highly Nonlinear S-boxes 33
The Problem of Double Costs in Blockchain Systems 33
Application of Bluetooth, Wi-Fi and GPS Technologies in the Means of Contact Tracking 33
Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2 33
On hiding data into the structure of the FAT family file system 33
Opportunities to minimize hardware and software costs for implementing boolean functions in stream ciphers 33
Analysis of existing approaches to setting the intelligent management systems of transport undertakings 33
Heuristic methods of gradient search for the cryptographic boolean functions 33
Noise-like discrete signals for asynchronous code division radio systems 33
Direct Spread Spectrum Technology for Data Hiding in Audio 33
Analysis of Synchronous Stream Cryptoconversions 33
Detecting hidden information in fat 33
Combining and filtering functions based on the nonlinear feedback shift registers 32
The Data Control in the System of Residual Classes 32
Properties of the cost function in the iterative algorithm for generating nonlinear substitution 32
Soft decoding based on ordered subsets of verification equations of turbo-productive codes 32
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection 32
Methods of Evaluation and Comparative Research of Cryptographic Conversions 32
Analysis of Stream Modes for Block Symmetric Ciphers 31
Deep learning-based models’ application to generating a cryptographic key from a face image 31
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities 31
Totale 4.221
Categoria #
all - tutte 47.448
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 47.448


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2024/20252.057 0 0 0 0 12 48 166 254 133 477 573 394
2025/20265.752 299 474 1.558 2.854 443 124 0 0 0 0 0 0
Totale 7.809