Dr Yevhen Zolotavkin

STAFF PROFILE

Contact

Publications

Filter by

2022

Improving Unlinkability of Attribute-based Authentication through Game Theory

Yevhen Zolotavkin, Jongkil Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss

(2022), Vol. 25, pp. 1-36, ACM Transactions on Privacy and Security, New York, N.Y., C1

journal article

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss

(2022), pp. 1-30, ACM Computing Surveys, New York, N.Y., C1

journal article
2021

Enhancing Privacy Through DMMA: Decision-Making Method for Authentication

Maksym Slavnenko, Maksym Slavnenko, Yevhen Zolotavkin, Yevhen Zolotavkin, Jong Jeong, Jong Jeong, Veronika Kuchta, Veronika Kuchta, Robin Doss, Robin Doss

(2021), pp. 1-12, TRUSTCOM21 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1

conference

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials

N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss

(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1

conference
2020

Game theoretic analysis of reputation approach on block withholding attack

L Yu, J Yu, Y Zolotavkin

(2020), Vol. 12570, pp. 149-166, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Australia, E1

conference
2019

Incentives for Harvesting Attack in Proof of Work Mining Pools

Y Zolotavkin, V Kuchta

(2019), Vol. 11735, pp. 703-725, ESORICS 2019 : Computer security, Luxembourg, E1-1

conference

Incentives for stable mining in pay per last n shares pools

Y Zolotavkin, J Garcia

(2019), pp. 1-9, IFIP 2019 : Proceedings of the IFIP Networking Conference, Warsaw, Poland, E1-1

conference

Time-dependent decision-making and decentralization in proof-of-work cryptocurrencies

Y Zolotavkin, J Garcia, J Liu

(2019), Vol. 2019-June, pp. 108-121, CSF 2019 : Proceedings of the 32nd IEEE Computer Security Foundations Symposium, Hoboken, New Jersey, E1-1

conference
2017

Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

Y Zolotavkin, J García, C Rudolph

(2017), Vol. 10575, pp. 21-39, GameSec 2017 : Decision and game theory for security : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings, Vienna, Austria, E1-1

conference
2016

A New Scalar Quantization Method for Digital Image Watermarking

Y Zolotavkin, M Juhola

(2016), Vol. 2016, pp. 1-16, Journal of Electrical and Computer Engineering, London, Eng., C1-1

journal article

Towards a conceptual framework for privacy protection in the use of interactive 360° video surveillance

S Chaudhary, E Berki, P Nykanen, Y Zolotavkin, M Helenius, J Kela

(2016), pp. 1-10, VSMM 2016 : Proceedings of the 2016 International Conference on Virtual Systems and Multimedia, Kuala Lumper, Malaysia, E1-1

conference
2015

A new two-dimensional quantization method for digital image watermarking

Y Zolotavkin, M Juhola

(2015), Vol. 2015-August, pp. 155-160, International Conference on Advanced Communication Technology, ICACT, E1-1

conference

Quantization based watermarking approach with gain attack recovery

Y Zolotavkin, M Juhola

(2015), 2014 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2014, E1-1

conference
2014

A new QIM-based watermarking method robust to gain attack

Y Zolotavkin, M Juhola

(2014), Vol. 2014, pp. 1-14, International Journal of Digital Multimedia Broadcasting, C1-1

journal article
2013

SVD-based digital image watermarking on approximated orthogonal matrix

Y Zolotavkin, M Juhola

(2013), pp. 321-330, ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings, E1-1

conference
2008

A novel approach to the security of data hidden in multimedia objects

Y Zolotavkin, V Lukichov, A Vasyura

(2008), pp. 23-28, Proceedings - International Carnahan Conference on Security Technology, E1-1

conference

Improvement of pattern hiding method of data application in jpeg-files

V Lukitchov, A Vasyura, Y Zolotavkin

(2008), pp. 69-75, Proceedings - International Carnahan Conference on Security Technology, E1-1

conference

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

No completed student supervisions to report