@article{IIGUM_2022_40_a4,
author = {Vitaly A. Roman'kov},
title = {Generalized scheme of hidden compact storage of data of various users in a common open database},
journal = {The Bulletin of Irkutsk State University. Series Mathematics},
pages = {63--77},
year = {2022},
volume = {40},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/IIGUM_2022_40_a4/}
}
TY - JOUR AU - Vitaly A. Roman'kov TI - Generalized scheme of hidden compact storage of data of various users in a common open database JO - The Bulletin of Irkutsk State University. Series Mathematics PY - 2022 SP - 63 EP - 77 VL - 40 UR - http://geodesic.mathdoc.fr/item/IIGUM_2022_40_a4/ LA - ru ID - IIGUM_2022_40_a4 ER -
%0 Journal Article %A Vitaly A. Roman'kov %T Generalized scheme of hidden compact storage of data of various users in a common open database %J The Bulletin of Irkutsk State University. Series Mathematics %D 2022 %P 63-77 %V 40 %U http://geodesic.mathdoc.fr/item/IIGUM_2022_40_a4/ %G ru %F IIGUM_2022_40_a4
Vitaly A. Roman'kov. Generalized scheme of hidden compact storage of data of various users in a common open database. The Bulletin of Irkutsk State University. Series Mathematics, Tome 40 (2022), pp. 63-77. http://geodesic.mathdoc.fr/item/IIGUM_2022_40_a4/
[1] Voloshin S. K., Roman'kov V. A., “Generalized discrete operations of differentiation and integration”, Herald of Omsk University, 26:4 (2021), 4–8 (in Russian) | DOI
[2] Roman'kov V. A., “About the hidden compact way to store data”, Applied discrete mathematics. Applications, 2020, no. 13, 56–59 (in Russian) | DOI
[3] Desmedt Y., “Society and group oriented cryptography: A new concept”, Conference on the Theory and Application of Cryptographic Techniques, Springer, Berlin–Heidelberg, 1987, 120–127
[4] C.-T. Huang, L. Huang, Z. Qin, C.-C. J. Kuo, H. Yuan, L. Zhou, V. Varadharadjan, C.-C. J. Kuo, “Survey on securing data storage in the cloud”, APSIPA Transactions on Signal and Information Processing, 3 (2014), 1–17 | DOI
[5] Katz J., Lindell Y., Introduction to Modern Cryptography, CRC Press, Boca Raton–London–New York–Washington D. C., 2007, 498 pp. | MR
[6] Knuth D. E., The Art of Computer Programming, Addison-Wesley Professional, New York, 2011, 912 pp. | MR | Zbl
[7] S. Mazumdar, D. Seybold, K. Kritikos, Y. Verginadis, “A survey on data storage and placement methodologies for Cloud-Big Data ecosystem”, J. Big Data, 6 (2019), 6–37 | DOI
[8] Menezes A. J., Vanstone S. A., Oorschot P. C. van, Handbook of Applied Cryptography, CRC Press, Boca Rapton, 1996, 816 pp. | MR
[9] Neumann P. M., “On the structure of standard wreath products of groups”, Math. Z., 84 (1964), 343–373 | DOI | MR | Zbl
[10] Roman'kov V. A., “Embedding theorems for solvable groups”, Proc. Amer. Math. Soc., 149:10 (2021), 4133–4143 | DOI | MR | Zbl
[11] Smart N., Cryptography: An Introduction, McGraw-Hill College, New York, 2004, 433 pp.
[12] Thammattor A., “Normal Limit of the Binomial via the Discrete Derivative”, The College Mathematics Journal, 49:3 (2018), 216–217 | DOI | MR