Konstantin Zhidanov

Konstantin Zhidanov
Saint-Petersburg State University of Aerospace Instrumentation · Department of Information Systems

Master of Engineering

About

15
Publications
6,904
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
141
Citations
Introduction
Konstantin Zhidanov currently works at Saint-Petersburg State University of Aerospace Instrumentation. Konstantin does research in Software Engineering and Computer Security and Reliability. Their most recent publication is 'Advanced IoT Solution for Smart City Eco-monitoring System'.

Publications

Publications (15)
Conference Paper
VRF or Verifiable Random Function is one of the most successful randomness generation solutions in smart contract security field. Today's centralized solutions based on this algorithm are not fully transparent for participants which rises security issues. In this paper, we review the classic system, its vulnerabilities, and propose an extended prot...
Conference Paper
Full-text available
The development generally drives the evolution of modern systems towards distributed ones, generally, in blockchain and Distributed Ledger Technology domains. Ensuring the reliable digital signature of messages and the data security of messages signed with a digital signature from unauthorized interference is an essential part of enabling the opera...
Article
Full-text available
This is a data descriptor paper for a set of the battery output data measurements during the turned on display discharge process caused by the execution of modern mobile blockchain projects on Android devices. The measurements were executed for Proof-of-Work (PoW) and Proof-of-Activity (PoA) consensus algorithms. In this descriptor, we give example...
Article
Full-text available
The blockchain technology is currently penetrating different areas of the modern Information and Communications Technology community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect, i.e., solving the computational puzzle task. At the same time, the use of wearable and mobile devi...
Conference Paper
Full-text available
The blockchain technology is currently penetrating different sides of modern ICT community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect. At the same time, the use of wearable and mobile devices may also become a part of blockchain operation, especially during the charging time...
Conference Paper
Full-text available
Worldwide changes in climate and increasing pol- lution level are tremendously affecting the need for environmental monitoring solutions. Recent activities in wireless sensor networks (WSNs) together with Cloud computing paradigm brought an entirely new perspective on monitoring as part of the Industrial Internet of Things (IIoT). However, most of...
Presentation
Full-text available
Explanation of cryptography solution for key management in peer-to-peer network built on devices with limited computational resources.
Chapter
In this paper the weighted container concept of cover image jointly with error correcting codes perfect in weighted Hamming metric (ECCPWH) is consider. Such approach can improve the efficient of the ECC embedding schemes based on syndrome coding. To show the effectiveness of ECCPWH based scheme the example of multi-level significant bit (MLSB)embe...
Conference Paper
Full-text available
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trus...
Conference Paper
The secure digital watermarking method for digital images is proposed. This method is based on error correcting codes (ECC) that are perfect in weighted Hamming metric. The usage of perfect ECC guarantees the limited number of errors (distortions of initial image) that occur in watermarking process. The use of ECC that are perfect in weighted Hammi...
Presentation
Ability of using inter-pulse interval for generating random values to develop a common encryption key is analyzed.
Conference Paper
This paper proposes a watermarking method to embed watermark in the spatial domain using error-correcting codes. Image is divided into blocks. Two perfect error-correcting codes are used to embed watermark. Codeword of corresponding perfect code is written into one block to embed one watermark bit.
Conference Paper
This paper discusses the approach to construction of steganographic method for the weighted container. To find the efficient solution, concept of Penalty Function is introduced. The analysis of the efficiency of the weighted embedding for the simple model of weighted container is shown.
Conference Paper
A new method for embedding messages in the container, taking into account the significance of the original container elements, is proposed. The comparison of the proposed method and algorithm F5 and its modifications is represented. Enhancement of the stegoalgorithm efficiency is achieved by using a special class of codes in the weighted Hamming me...

Network

Cited By