Publications
Improving Unlinkability of Attribute-based Authentication through Game Theory
Yevhen Zolotavkin, Jongkil Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss
(2022), Vol. 25, pp. 1-36, ACM Transactions on Privacy and Security, New York, N.Y., C1
Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
(2022), pp. 1-30, ACM Computing Surveys, New York, N.Y., C1
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication
Maksym Slavnenko, Maksym Slavnenko, Yevhen Zolotavkin, Yevhen Zolotavkin, Jong Jeong, Jong Jeong, Veronika Kuchta, Veronika Kuchta, Robin Doss, Robin Doss
(2021), pp. 1-12, TRUSTCOM21 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss
(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1
Game theoretic analysis of reputation approach on block withholding attack
L Yu, J Yu, Y Zolotavkin
(2020), Vol. 12570, pp. 149-166, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Australia, E1
Incentives for Harvesting Attack in Proof of Work Mining Pools
Y Zolotavkin, V Kuchta
(2019), Vol. 11735, pp. 703-725, ESORICS 2019 : Computer security, Luxembourg, E1-1
Incentives for stable mining in pay per last n shares pools
Y Zolotavkin, J Garcia
(2019), pp. 1-9, IFIP 2019 : Proceedings of the IFIP Networking Conference, Warsaw, Poland, E1-1
Time-dependent decision-making and decentralization in proof-of-work cryptocurrencies
Y Zolotavkin, J Garcia, J Liu
(2019), Vol. 2019-June, pp. 108-121, CSF 2019 : Proceedings of the 32nd IEEE Computer Security Foundations Symposium, Hoboken, New Jersey, E1-1
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools
Y Zolotavkin, J García, C Rudolph
(2017), Vol. 10575, pp. 21-39, GameSec 2017 : Decision and game theory for security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings, Vienna, Austria, E1-1
A New Scalar Quantization Method for Digital Image Watermarking
Y Zolotavkin, M Juhola
(2016), Vol. 2016, pp. 1-16, Journal of Electrical and Computer Engineering, London, Eng., C1-1
S Chaudhary, E Berki, P Nykanen, Y Zolotavkin, M Helenius, J Kela
(2016), pp. 1-10, VSMM 2016 : Proceedings of the 2016 International Conference on Virtual Systems and Multimedia, Kuala Lumper, Malaysia, E1-1
A new two-dimensional quantization method for digital image watermarking
Y Zolotavkin, M Juhola
(2015), Vol. 2015-August, pp. 155-160, International Conference on Advanced Communication Technology, ICACT, E1-1
Quantization based watermarking approach with gain attack recovery
Y Zolotavkin, M Juhola
(2015), 2014 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2014, E1-1
A new QIM-based watermarking method robust to gain attack
Y Zolotavkin, M Juhola
(2014), Vol. 2014, pp. 1-14, International Journal of Digital Multimedia Broadcasting, C1-1
SVD-based digital image watermarking on approximated orthogonal matrix
Y Zolotavkin, M Juhola
(2013), pp. 321-330, ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings, E1-1
A novel approach to the security of data hidden in multimedia objects
Y Zolotavkin, V Lukichov, A Vasyura
(2008), pp. 23-28, Proceedings - International Carnahan Conference on Security Technology, E1-1
Improvement of pattern hiding method of data application in jpeg-files
V Lukitchov, A Vasyura, Y Zolotavkin
(2008), pp. 69-75, Proceedings - International Carnahan Conference on Security Technology, E1-1
Funded Projects at Deakin
No Funded Projects at Deakin found
Supervisions
No completed student supervisions to report