Methods and systems for protecting and hiding information in computer and information systems
Methods and systems for protecting and hiding information in computer and information systems
Issue number:
|
pdf
|
View the article:
|
Authors:
|
Vol. 6 № 1 2023
54–68
|
 |
Requirements for the development of smart contracts and an overview of smart contract vulnerabilities at the Solidity code level on the Ethereum platform
|
- Nataliia O. Komleva
- Oleksandr I. Tereshchenko
|
Vol. 6 № 1 2023
39–53
|
 |
Multi-objective optimization of committee selection for hierarchical Byzantine fault tolerance-based consensus protocols
|
- Igor Y. Mazurok
- Yevhen Y. Leonchyk
- Sergii S. Grybniak
- Alisa Y. Vorokhta
- Oleksandr S. Nashyvan
|
Vol. 2 № 1 2019
37-46
|
 |
Algorithmization of the failed subschemes localization process
|
- Anatoli F. Verlan
- Sergii A. Polozhaenko
- Ludmila L. Prokofieva
- Vladinir P. Shylov
|