Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools Y Zolotavkin, J García, C Rudolph Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017 | 20 | 2017 |
A new two-dimensional quantization method for digital image watermarking Y Zolotavkin, M Juhola 2015 17th International Conference on Advanced Communication Technology …, 2015 | 15 | 2015 |
Examining the current status and emerging trends in continuous authentication technologies through citation network analysis JJ Jeong, Y Zolotavkin, R Doss ACM Computing Surveys 55 (6), 1-31, 2022 | 12 | 2022 |
Weak-key analysis for BIKE post-quantum key encapsulation mechanism MR Nosouhi, SW Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, ... IEEE Transactions on Information Forensics and Security 18, 2160-2174, 2023 | 11 | 2023 |
A new blind adaptive watermarking method based on singular value decomposition Y Zolotavkin, M Juhola PROCEEDINGS OF 2013 International Conference on Sensor Network Security …, 2013 | 6 | 2013 |
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials N Lalchandani, F Jiang, JJ Jeong, Y Zolotavkin, R Doss 2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021 | 5 | 2021 |
Game theoretic analysis of reputation approach on block withholding attack L Yu, J Yu, Y Zolotavkin International Conference on Network and System Security, 149-166, 2020 | 5 | 2020 |
A new scalar quantization method for digital image watermarking Y Zolotavkin, M Juhola Journal of Electrical and Computer Engineering 2016 (1), 9029745, 2016 | 5 | 2016 |
Improving unlinkability of attribute-based authentication through game theory Y Zolotavkin, JJ Jeong, V Kuchta, M Slavnenko, R Doss ACM Transactions on Privacy and Security 25 (2), 1-36, 2022 | 4 | 2022 |
Towards a conceptual framework for privacy protection in the use of interactive 360 video surveillance S Chaudhary, E Berki, P Nykänen, Y Zolotavkin, M Helenius, J Kela 2016 22nd International Conference on Virtual System & Multimedia (VSMM), 1-10, 2016 | 3 | 2016 |
Quantization based watermarking approach with gain attack recovery Y Zolotavkin, M Juhola 2014 International Conference on Digital Image Computing: Techniques and …, 2014 | 3 | 2014 |
Time-dependent decision-making and decentralization in proof-of-work cryptocurrencies Y Zolotavkin, J Garcia, JK Liu 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 108-10813, 2019 | 2 | 2019 |
A New QIM‐Based Watermarking Method Robust to Gain Attack Y Zolotavkin, M Juhola International Journal of Digital Multimedia Broadcasting 2014 (1), 910808, 2014 | 2 | 2014 |
SVD-based digital image watermarking on approximated orthogonal matrix Y Zolotavkin, M Juhola 2013 International Conference on Security and Cryptography (SECRYPT), 1-10, 2013 | 2 | 2013 |
A novel approach to the security of data hidden in multimedia objects Y Zolotavkin, V Lukichov, A Vasyura 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 2 | 2008 |
Guidelines and Multi disciplinary Knowledge Advice for Cyber Protection in e-Learning: Hey Teachers! Don't Leave the Kids Alone Online! E Berki, S Chaudhary, M Panteri, T Valkanou, JP Valtanen, J Bamford, ... Twenty Sixth International Conference on Delivering Global Education and …, 2021 | 1 | 2021 |
Incentives for stable mining in pay per last N shares pools Y Zolotavkin, J Garcia 2019 IFIP Networking Conference (IFIP Networking), 1-9, 2019 | 1 | 2019 |
Incentives for harvesting attack in proof of work mining pools Y Zolotavkin, V Kuchta Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 1 | 2019 |
New Methods for Digital Image Watermarking Y Zolotavkin Tampere University Press, 2015 | 1 | 2015 |
Improvement of pattern hiding method of data application in JPEG-files V Lukitchov, A Vasyura, Y Zolotavkin 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 1 | 2008 |