Papers by Yeghisabet Alaverdyan
Drone systems and applications, Feb 9, 2024
Programming and computer software, Dec 1, 2023
The paper presents a zero-trust approach to ensuring cybersecurity in self-organized UAV swarms o... more The paper presents a zero-trust approach to ensuring cybersecurity in self-organized UAV swarms operating in hostile or dangerous environments. Depending on task performance and safety considerations, mission-oriented swarms of UAVs may normally change the planned flight routes, update session keys, automatically destroy data when being corrupted, or detect hostile outsiders, which is a significant security factor. The proposed algorithms will make it possible to assert and verify the membership of UAVs within the swarm during the flight. Identification and strong authentication of individual UAVs are based on secure multi-party computations.
Zenodo (CERN European Organization for Nuclear Research), Jul 12, 2023
The paper introduces confidential computing approaches focused on protecting hierarchical data wi... more The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability.
arXiv (Cornell University), Jun 19, 2023
The paper introduces confidential computing approaches focused on protecting hierarchical data wi... more The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability.
International Journal of Computer Science and Information Technology
The paper introduces confidential computing approaches focused on protecting hierarchical data wi... more The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability.
Natural Language Processing and Machine Learning
"The paper introduces certain timely and secure computing approaches that affect data intell... more "The paper introduces certain timely and secure computing approaches that affect data intelligence related to methods and tools for real-time information processing. Timely solutions are achieved using local premises rather than supporting centralized servers or clouds. Computing within the network partly occurs near the physical endpoints, and this is where the edge computing paradigm comes in to help. The proposed method of the cloud optimization suggests splitting and sharing data between network data centers and local computing power. Provision of distinct paths between edge and main cloud for each smart device is achieved using separate blockchain which register and store the logical links of hierarchical data. Methods for cryptographic key splitting between the edge and the main cloud, as well as strong authentication ensuring the shared data confidentiality, integrity, availability, and consistency are also given.
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON FRONTIER OF DIGITAL TECHNOLOGY TOWARDS A SUSTAINABLE SOCIETY
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON FRONTIER OF DIGITAL TECHNOLOGY TOWARDS A SUSTAINABLE SOCIETY
A wall-mounted station for changing the diapers of a baby comprises a base configured for being v... more A wall-mounted station for changing the diapers of a baby comprises a base configured for being vertically mounted to a wall and defining a base plane and a baby platform hingedly mounted to the base and defining a platform plane. The baby platform is operable for being movable between an opened position wherein the platform plane is disposed generally perpendicular to the base plane for the platform to receive a baby and a closed position wherein the platform plane is generally parallel to the base plane. A stop mechanism secures the platform generally perpendicular to the base in the opened position. A flange positioned around a periphery of the base is configured for engaging a wall when the base is inset therein for covering an exposed edge of the wall and stabilizing the base in the wall.
2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009
A quantitative analysis of the public key cryptosystem stability based on Boolean product of matr... more A quantitative analysis of the public key cryptosystem stability based on Boolean product of matrices is given. It is shown that the stability of such cryptosystem is based on the difficulty of decomposing the Boolean product of large matrices. The resistibility of cryptosystem is analyzed against the main categories of attacks.
2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009
Given premises for constructing a fast asymmetric algorithm based on Boolean product of matrices.... more Given premises for constructing a fast asymmetric algorithm based on Boolean product of matrices. Description of the encryption/decryption process based on Boolean product of matrices involving Boolean permutations and the structure of public and secret key pairs are proposed. The security of such asymmetric cryptosystem is based on the difficulty of matrices decomposition and large composite Boolean permutations inversion. A quantitative analysis of stability of public key cryptosystems based on Boolean product of matrices is given.
Ciphers based on non-associative systems show better resistibility than known ciphers based on as... more Ciphers based on non-associative systems show better resistibility than known ciphers based on associative systems. In this paper we present a class of very efficient and simple ciphers provided by the Quasigroup equipped public key cryptosystem based on Boolean product of matrices. The stability of the cryptosystem is based on the computational complexity of decomposing Boolean product of large matrices and inverting Quasigroup-based permutations. Ease of implementation of the cryptosystem is also investigated.
Uploads
Papers by Yeghisabet Alaverdyan