- Full text PDF available (1)
- This year (2)
- Last five years (10)
This paper addresses the ultimate boundedness and permanence analysis for a Lotka-Volterra type system with switching of parameter values. Two new approaches for the constructing of common Lyapunov function for the family of subsystems corresponding to the switched system are suggested. Sufficient conditions in terms of linear inequalities are obtained to… (More)
In the context of an unsecure transmission channel, identity-based cryptography makes it possible to implement broadcast data transfer for a large number of recipients much more effective than classical public-key cryptography. A comparative analysis of such schemes is carried out and recommendations on selecting a particular scheme based on the system… (More)
We consider a nonlinear complex (large-scale) system with time delay. It is assumed that the corresponding isolated subsystems are homogeneous, and the zero solutions of the subsystems are asymptotically stable when delay is equal to zero. By the Lyapunov direct method, and the Razumikhin approach, delay-independent stability conditions for the complex… (More)
An approach to solving the problem of revocation of the signature authority of some group member in lattice-based group signature schemes has been suggested. The security of VLR schemes is based on delegating additional rights to opening manager, i.e., on checking the presence of user certificate in revocation list.
The paper describes the problem of unauthorized access to the data processed in distributed grid computing networks. Existing implementations of entity authentication mechanisms in grid systems are analyzed, and their disadvantages are considered. An approach to the use of group signature schemes, which prevents unauthorized access to a computing… (More)
The implementation of cryptographic protocols in systems with resource-constrained devices and possible transfer of laborious calculations to a cloud server is considered. In this case, the device performs “simple” arithmetic operations. A tripartite key-agreement with two servers and the model with one malicious computer is proposed.