


default search action
Elena B. Aleksandrova
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]S. O. Kostin, Elena B. Aleksandrova:
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols. Autom. Control. Comput. Sci. 57(8): 904-913 (2023) - [j23]Elena B. Aleksandrova, Anna A. Shtyrkina:
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks. Autom. Control. Comput. Sci. 57(8): 1076-1083 (2023) - [j22]Maria A. Poltavtseva
, Elena B. Aleksandrova
, Vadim S. Shmatov
, Peter D. Zegzhda
:
Data protection in heterogeneous big data systems. J. Comput. Virol. Hacking Tech. 19(3): 451-458 (2023) - 2021
- [j21]I. I. Marshev, E. V. Zhukovskii, Elena B. Aleksandrova:
Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms. Autom. Control. Comput. Sci. 55(8): 1025-1028 (2021) - [j20]Elena B. Aleksandrova, A. Yu. Oblogina, E. N. Shkorkina:
Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing. Autom. Control. Comput. Sci. 55(8): 1087-1091 (2021) - [j19]Dmitry P. Zegzhda, Evgeny Pavlenko
, Elena B. Aleksandrova
:
Modelling Artificial Immunization Processes to Counter Cyberthreats. Symmetry 13(12): 2453 (2021) - [c3]Elena B. Aleksandrova
, Maria A. Poltavtseva
, Vadim S. Shmatov
:
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations. MobiSec 2021: 211-221 - 2020
- [j18]Elena B. Aleksandrova
, Anna A. Shtyrkina, A. V. Yarmak
:
Isogeny-Based Cryptographic Access Control. Autom. Control. Comput. Sci. 54(8): 803-812 (2020) - [j17]Elena B. Aleksandrova
, I. Sh. Rekhviashvili, A. V. Yarmak
:
Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things. Autom. Control. Comput. Sci. 54(8): 888-895 (2020) - [j16]E. N. Shkorkina, Elena B. Aleksandrova
:
Securing Post-Quantum Resistance for Quantum-Protected Communication Systems. Autom. Control. Comput. Sci. 54(8): 949-951 (2020)
2010 – 2019
- 2019
- [j15]Elena B. Aleksandrova
, A. V. Yarmak
, Maxim O. Kalinin
:
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems. Autom. Control. Comput. Sci. 53(8): 879-882 (2019) - [j14]Elena B. Aleksandrova
, Daria S. Lavrova, A. V. Yarmak
:
Benford's Law in the Detection of DoS Attacks on Industrial Systems. Autom. Control. Comput. Sci. 53(8): 954-962 (2019) - [j13]Elena B. Aleksandrova
, E. N. Shkorkina, Maxim O. Kalinin
:
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users. Autom. Control. Comput. Sci. 53(8): 969-971 (2019) - 2018
- [j12]Elena B. Aleksandrova
, Anna A. Shtyrkina
:
Directed Digital Signature on Isogenies of Elliptic Curves. Autom. Control. Comput. Sci. 52(8): 1059-1064 (2018) - [j11]Elena B. Aleksandrova
, E. N. Shkorkina:
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations. Autom. Control. Comput. Sci. 52(8): 1160-1163 (2018) - [j10]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
:
Delay-independent stability conditions for a class of nonlinear difference systems. J. Frankl. Inst. 355(7): 3367-3380 (2018) - 2017
- [j9]Elena B. Aleksandrova
, Anna A. Shtyrkina
, A. V. Yarmak
:
Elliptic curves generation for isogeny-based cryptosystems. Autom. Control. Comput. Sci. 51(8): 928-935 (2017) - [j8]Elena B. Aleksandrova
:
Methods of group authentication for low-resource vehicle and flying self-organizing networks. Autom. Control. Comput. Sci. 51(8): 947-958 (2017) - [j7]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
, Alexey P. Zhabko
:
Stability analysis of some classes of nonlinear switched systems with time delay. Int. J. Syst. Sci. 48(10): 2111-2119 (2017) - [j6]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
:
Convergence conditions for some classes of nonlinear systems. Syst. Control. Lett. 104: 72-77 (2017) - 2016
- [j5]Elena B. Aleksandrova
, Dmitry P. Zegzhda, Artem S. Konoplev:
Applying the group signature for entity authentication in distributed grid computing networks. Autom. Control. Comput. Sci. 50(8): 739-742 (2016) - [j4]Elena B. Aleksandrova
, E. N. Shkorkina:
Tripartite outsoursing key-agreement protocol on bilinear pairings. Autom. Control. Comput. Sci. 50(8): 796-801 (2016) - [j3]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
, Alexey P. Zhabko:
Asymptotic Stability Conditions and Estimates of Solutions for Nonlinear Multiconnected Time-Delay Systems. Circuits Syst. Signal Process. 35(10): 3531-3554 (2016) - 2015
- [j2]Elena B. Aleksandrova
, E. A. Kuznetsova:
Organization of revocation for lattice-based group signature scheme. Autom. Control. Comput. Sci. 49(8): 770-777 (2015) - [j1]A. N. Kulakov, Elena B. Aleksandrova
:
Analysis of broadcast schemes that implement identity-based encryption algorithms. Autom. Control. Comput. Sci. 49(8): 790-797 (2015) - [c2]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
, Alexey P. Zhabko, Guiping Dai:
Stability analysis and estimation of the convergence rate of solutions for nonlinear time-delay systems. ICUMT 2015: 67-72 - 2013
- [c1]Alexander Yu. Aleksandrov
, Elena B. Aleksandrova
, Alexey V. Platonov
:
Ultimate boundedness conditions for a hybrid model of population dynamics. MED 2013: 622-627
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint