default search action
Sergey Bezzateev
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j34]Ivan K. Noskov, Sergei V. Bezzateev:
Finding Enumerators for Generalized (L, G)-Code. Autom. Control. Comput. Sci. 57(8): 922-927 (2023) - [j33]Sergei V. Bezzateev, Svetlana Fomicheva, A. F. Suprun:
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods. Autom. Control. Comput. Sci. 57(8): 1005-1017 (2023) - [j32]Anton Leevik, Vadim Davydov, Sergey Bezzateev:
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices. Cryptogr. 7(3): 33 (2023) - [c35]Ivan R. Fedorov, Sergei V. Bezzateev:
Blockchain Based Fog Computing Network Architecture. BCCA 2023: 351-358 - [c34]Ivan K. Noskov, Sergey Bezzateev:
Using Generalized (L, G)-Codes for Implementation the Classic McEliece Cryptosystem. ICUMT 2023: 231-234 - [c33]Sergey Bezzateev, Svetlana Fomicheva:
Continuous Authentication in a UAVs Swarm. ICUMT 2023: 235-242 - [c32]Ivan R. Fedorov, Ivan B. Getmaniuk, Sergei V. Bezzateev:
Blockchain-Based Device Authentication Method in Industrial Internet of Things. ICUMT 2023: 243-249 - 2022
- [j31]Ivan R. Fedorov, A. V. Pimenov, G. A. Panin, Sergei V. Bezzateev:
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains. Autom. Control. Comput. Sci. 56(8): 1025-1029 (2022) - 2021
- [c31]Sergey Bezzateev, Aleksandra Afanasyeva, Konstantin Zhidanov, Aleksandr Ometov:
Multi-Layer Message Signature Scheme with Threshold-based Distributed PKG and Dynamic Leader Selection. BCCA 2021: 151-155 - [c30]Ivan K. Noskov, Sergei V. Bezzateev:
Modern McEliece Cryptosystem Using Generalized ($L, G$)-Codes. ICUMT 2021: 162-166 - 2020
- [j30]Aleksandr Ometov, Yulia Bardinova, Alexandra Afanasyeva, Pavel Masek, Konstantin Zhidanov, Sergey Vanurin, Mikhail Sayfullin, Viktoriia Shubina, Mikhail M. Komarov, Sergey Bezzateev:
An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future Trends. IEEE Access 8: 103994-104015 (2020) - [j29]Sergey Bezzateev, Vadim Davydov, Aleksandr Ometov:
On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication. Cryptogr. 4(4): 34 (2020) - [j28]Yulia Bardinova, Konstantin Zhidanov, Sergey Bezzateev, Mikhail M. Komarov, Aleksandr Ometov:
Measurements of Mobile Blockchain Execution Impact on Smartphone Battery. Data 5(3): 66 (2020) - [c29]Vadim Davydov, Sergey Bezzateev:
Accident Detection in Internet of Vehicles using Blockchain Technology. ICOIN 2020: 766-771 - [c28]Anton Leevik, Vladislav Beliaev, Boris Stasenko, Vadim Davydov, Sergey Bezzateev:
Review and Analysis of the Classical and Post-Quantum Ring Signature Algorithms. ICUMT 2020: 105-112 - [c27]Alexey Nemchenko, Sergey Bezzateev:
Method of Comparison of Neural Network Resistance to Adversarial Attacks. NEW2AN/ruSMART (2) 2020: 74-79
2010 – 2019
- 2019
- [j27]Sergey Bezzateev, Natalia A. Shekhunova:
Totally decomposed cumulative Goppa codes with improved estimations. Des. Codes Cryptogr. 87(2-3): 569-587 (2019) - [j26]Aleksandr Ometov, Vitaly Petrov, Sergey Bezzateev, Sergey Andreev, Yevgeni Koucheryavy, Mario Gerla:
Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications. IEEE Netw. 33(2): 82-88 (2019) - [j25]Aleksandr Ometov, Sergey Bezzateev, Vadim Davydov, Anna Shchesniak, Pavel Masek, Elena Simona Lohan, Yevgeni Koucheryavy:
Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective. Sensors 19(7): 1603 (2019) - [j24]Aleksandr Ometov, Sergey Bezzateev, Natalia Voloshina, Pavel Masek, Mikhail M. Komarov:
Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario. Sensors 19(24): 5548 (2019) - [c26]Sergey Bezzateev, Natalia Voloshina, Konstantin Zhidanov, Aleksandr Ometov:
Secure Environmental Monitoring for Industrial Internet of Things: from Framework to Live Implementation. ICL-GNSS 2019: 1-5 - [c25]Tamara Minaeva, Natalia Voloshina, Sergey Bezzateev, Vadim Davydov:
Steganographic WF5 Method for Weighted Embedding: An Overview and Comparison. NEW2AN 2019: 434-440 - [c24]Konstantin Zhidanov, Sergey Bezzateev, Alexandra Afanasyeva, Mikhail Sayfullin, Sergey Vanurin, Yulia Bardinova, Aleksandr Ometov:
Blockchain Technology for Smartphones and Constrained IoT Devices: A Future Perspective and Implementation. CBI (2) 2019: 20-27 - [i8]Aleksandr Ometov, Vitaly Petrov, Sergey Bezzateev, Sergey Andreev, Yevgeni Koucheryavy, Mario Gerla:
Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications. CoRR abs/1901.06977 (2019) - 2018
- [j23]Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, Yevgeni Koucheryavy:
Multi-Factor Authentication: A Survey. Cryptogr. 2(1): 1 (2018) - [j22]Sergei V. Bezzateev, Natalia A. Shekhunova:
Lower Bounds on the Covering Radius of the Non-Binary and Binary Irreducible Goppa Codes. IEEE Trans. Inf. Theory 64(11): 7171-7177 (2018) - [c23]Sergey Nesteruk, Sergey Bezzateev:
Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure. FRUCT 2018: 190-197 - [c22]Ivan K. Noskov, Sergey Bezzateev:
Traceability Schemes Usings Finite Geometry. ICUMT 2018: 1-5 - [c21]Natalia Voloshina, Tamara Minaeva, Sergey Bezzateev:
MLSB optimal effective weighted container construction for WF5 embedding algorithm. ICUMT 2018: 1-6 - [c20]Sergey Bezzateev, Natalia Voloshina, Vadim Davydov, Tamara Minaeva, Nikolay Rudavin:
Signing Documents by Hand: Model for Multi-Factor Authentication. NEW2AN 2018: 299-311 - [c19]Vadim Davydov, Sergey Bezzateev:
Secure Information Exchange in Defining the Location of the Vehicle. TSP 2018: 1-5 - 2017
- [j21]Sergey Bezzateev, Natalia A. Shekhunova:
Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets. Cryptogr. Commun. 9(1): 23-39 (2017) - [j20]Sergey Bezzateev, Natalia A. Shekhunova:
Lower bound of covering radius of binary irreducible Goppa codes. Des. Codes Cryptogr. 82(1-2): 69-76 (2017) - [j19]Sergei V. Bezzateev, Natalia A. Shekhunova:
Lower Bound of the Covering Radius of Irreducible Goppa Codes. Electron. Notes Discret. Math. 57: 55-60 (2017) - [j18]Aleksandr Ometov, Sergey Bezzateev, Joona Kannisto, Jarmo Harju, Sergey Andreev, Yevgeni Koucheryavy:
Facilitating the Delegation of Use for Private Devices in the Era of the Internet of Wearable Things. IEEE Internet Things J. 4(4): 843-854 (2017) - [j17]Aleksandr Ometov, Dmitrii Solomitckii, Thomas Olsson, Sergey Bezzateev, Anna Shchesniak, Sergey Andreev, Jarmo Harju, Yevgeni Koucheryavy:
Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study. J. Sens. Actuator Networks 6(2): 5 (2017) - [c18]Sergey Bezzateev, Aleksandra Afanasyeva, Natalia Voloshina, Aleksandr Ometov:
Multi-factor Authentication for Wearables: Configuring System Parameters with Risk Function. AWICT 2017: 4:1-4:7 - [c17]Sergey Bezzateev, Natalia Voloshina:
Image encryption in code based compression algorithms based on multilevel image structure model. ICUMT 2017: 85-90 - [c16]Aleksandr Ometov, Sergey Bezzateev:
Multi-factor authentication: A survey and challenges in V2X applications. ICUMT 2017: 129-136 - [c15]Radek Fujdiak, Petr Mlynek, Sergey Bezzateev, Romina Muka, Jan Slacik, Jiri Misurec, Ondrej Raso:
Lightweight structures of big numbers for cryptographic primitives in limited devices. ICUMT 2017: 289-293 - [c14]An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina:
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. MMM-ACNS 2017: 260-271 - [c13]Sergey Bezzateev, Natalia Voloshina:
Digital Watermarking Method Based on Image Compression Algorithms. NEW2AN 2017: 292-299 - 2016
- [j16]Dan Komosny, Miroslav Voznák, Sergey Bezzateev, Kathiravelu Ganeshan:
The Use of European Internet Communication Properties for IP Geolocation. Inf. Technol. Control. 45(1): 77-85 (2016) - [c12]Natalia Voloshina, Sergey Bezzateev, Anton Prudanov, Mikhail Vasilev, Anton Gorbunov:
Effectiveness of LSB and MLSB information embedding for BMP images. FRUCT 2016: 378-384 - [c11]Aleksandr Ometov, Sergey Andreev, Alla Levina, Sergey Bezzateev:
Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization. NEW2AN 2016: 217-229 - 2015
- [j15]Martin Tomlinson, Sergey Bezzateev, Mubarak Jibril, Marcel Adrian Ambroze, Mohammed Zaki Ahmed:
Using the Structure of Subfields in the Construction of Goppa Codes and Extended Goppa Codes. IEEE Trans. Inf. Theory 61(6): 3214-3224 (2015) - [c10]Sergey Bezzateev, Natalia Voloshina, Konstantin Zhidanov:
Multi-level Significant Bit (MLSB) Embedding Based on Weighted Container Model and Weighted F5 Concept. AECIA 2015: 293-303 - [c9]Vitaly Petrov, Sergey Bezzateev, Vladimir Zybin:
Wireless authentication using OPACITY protocol. ICUMT 2015: 253-258 - [c8]Aleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey D. Andreev, Yevgeni Koucheryavy:
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity. TrustCom/BigDataSE/ISPA (1) 2015: 826-833 - 2014
- [j14]Alexander Zeh, Sergey Bezzateev:
A new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codes. Des. Codes Cryptogr. 71(2): 229-246 (2014) - [j13]Mubarak Jibril, Sergey Bezzateev, Martin Tomlinson, Markus Grassl, Mohammed Zaki Ahmed:
A Generalized Construction of Extended Goppa Codes. IEEE Trans. Inf. Theory 60(9): 5296-5303 (2014) - [c7]Sergey Bezzateev:
Cyclic Generalized Separable (L, G) Codes. ICMCTA 2014: 53-60 - [i7]Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev:
McEliece in the world of Escher. IACR Cryptol. ePrint Arch. 2014: 360 (2014) - 2013
- [j12]Sergey Bezzateev, Natalia A. Shekhunova:
Class of generalized Goppa codes perfect in weighted Hamming metric. Des. Codes Cryptogr. 66(1-3): 391-399 (2013) - [j11]Mubarak Jibril, Martin Tomlinson, Cen Tjhai, Mohammed Zaki Ahmed, Sergey Bezzateev:
Some new codes from binary Goppa codes and a method of shortening linear codes. IET Commun. 7(3) (2013) - [j10]Sergei V. Bezzateev, Natalia A. Shekhunova:
A new subclass of cyclic Goppa codes. Probl. Inf. Transm. 49(4): 348-353 (2013) - [j9]Martin Tomlinson, Mubarak Jibril, Cen Tjhai, Sergey Bezzateev, Markus Grassl, Mohammed Zaki Ahmed:
A Generalized Construction and Improvements on Nonbinary Codes From Goppa Codes. IEEE Trans. Inf. Theory 59(11): 7299-7304 (2013) - [j8]Martin Bossert, Sergei V. Bezzateev:
A Unified View on Known Algebraic Decoding Algorithms and New Decoding Concepts. IEEE Trans. Inf. Theory 59(11): 7320-7336 (2013) - [j7]Sergei V. Bezzateev, Natalia A. Shekhunova:
Subclass of Cyclic Goppa Codes. IEEE Trans. Inf. Theory 59(11): 7379-7385 (2013) - [c6]Sergey Bezzateev, Natalia Voloshina, Petr Sankin:
Joint safety and security analysis for complex systems. FRUCT 2013: 3-13 - [c5]Alexander Zeh, Antonia Wachter-Zeh, Maximilien Gadouleau, Sergey Bezzateev:
Generalizing bounds on the minimum distance of cyclic codes using cyclic product codes. ISIT 2013: 126-130 - [i6]Alexander Zeh, Antonia Wachter-Zeh, Maximilien Gadouleau, Sergey Bezzateev:
Generalizing Bounds on the Minimum Distance of Cyclic Codes Using Cyclic Product Codes. CoRR abs/1301.6231 (2013) - 2012
- [j6]Sergei V. Bezzateev, Natalia A. Shekhunova:
Binary generalized (L, G) codes that are perfect in a weighted hamming metric. Probl. Inf. Transm. 48(3): 239-242 (2012) - [j5]Alexander Zeh, Antonia Wachter-Zeh, Sergey Bezzateev:
Decoding Cyclic Codes up to a New Bound on the Minimum Distance. IEEE Trans. Inf. Theory 58(6): 3951-3960 (2012) - [c4]Alexander Zeh, Sergey Bezzateev:
Describing a cyclic code by another cyclic code. ISIT 2012: 2896-2900 - [i5]Alexander Zeh, Sergey Bezzateev:
Describing A Cyclic Code by Another Cyclic Code. CoRR abs/1204.4563 (2012) - [i4]Alexander Zeh, Sergey Bezzateev:
A New Bound on the Minimum Distance of Cyclic Codes Using Small-Minimum-Distance Cyclic Codes. CoRR abs/1206.4976 (2012) - 2011
- [c3]Alexander Zeh, Antonia Wachter, Sergey Bezzateev:
Efficient decoding of some classes of binary cyclic codes beyond the Hartmann-Tzeng bound. ISIT 2011: 1017-1021 - [i3]Alexander Zeh, Antonia Wachter, Sergey Bezzateev:
Decoding Cyclic Codes up to a New Bound on the Minimum Distance. CoRR abs/1105.1894 (2011) - 2010
- [j4]Sergei V. Bezzateev, Natalia A. Shekhunova:
Special classes of separable Goppa codes with improved parameter estimates. Probl. Inf. Transm. 46(3): 225-244 (2010) - [i2]Sergey Bezzateev, Natalia A. Shekhunova:
Cumulative-Separable Codes. CoRR abs/1005.1524 (2010)
2000 – 2009
- 2008
- [j3]Sergey Bezzateev, Natalia A. Shekhunova:
Chain of Separable Binary Goppa Codes and Their Minimal Distance. IEEE Trans. Inf. Theory 54(12): 5773-5778 (2008) - [c2]Martin Bossert, Sergey Bezzateev:
Decoding of interleaved RS codes with the Euclidean algorithm. ISIT 2008: 1803-1807 - 2007
- [i1]Sergey Bezzateev, Natalia A. Shekhunova:
Chain of Separable Binary Goppa Codes and their Minimal Distance. CoRR abs/0707.4083 (2007) - 2006
- [c1]Mikhail G. Stepanov, Sergey Bezzateev, Tae-Chul Jung:
Privacy Homomorphism for Delegation of the Computations. NEW2AN 2006: 474-480
1990 – 1999
- 1998
- [j2]Sergei V. Bezzateev, Natalia A. Shekhunova:
A Subclass of Binary Goppa Codes with Improved Estimation of the Code Dimension. Des. Codes Cryptogr. 14(1): 23-38 (1998) - 1995
- [j1]Sergei V. Bezzateev, Natalia A. Shekhunova:
Subclass of binary Goppa codes with minimal distance equal to the design distance. IEEE Trans. Inf. Theory 41(2): 554-555 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint