Dimitrova, Vesna
Preferred name
Dimitrova, Vesna
Official Name
Dimitrova, Vesna
Main Affiliation
Email
vesna.dimitrova@finki.ukim.mk
78 results
Now showing 1 - 10 of 78
- Some of the metrics are blocked by yourconsent settings
Item type:Publication, IMPROVING TEACHING AND LEARNING MATHEMATICS COURSES IN COMPUTER SCIENCE AND ENGINEERING STUDIES(IATED Academy, 2021-03-08); ; ; The importance and the role of mathematics courses in solving real-life problems and applications, including software development, are invaluable. However, some students of Computer Science and Engineering do not fully realize the connection and therefore dislike learning mathematics. They do not appreciate the importance and the role of mathematics and some of them think that only hands-on programming and software tools knowledge is sufficient for a good computer science engineer. As mathematics courses are the core of first-year studies of any Computer Science and Engineering studies, sometimes they are the main reason for students’ failure to meet the requirements of first year academic studies and eventually to graduate. One of the projects that aims to improve the learning and teaching of mathematics courses is ITEM (Innovative Teaching Education in Mathematics). The ITEM project plans to develop and test innovative learning and teaching tools, new methodologies and approaches (learning outcomes and ICT based practices) towards building and enhancing students’ mathematics skills. In this paper, we analyse possibilities to improve the teaching and learning of mathematics courses using mathematical software. The ubiquity of computers and mobile devices together with its potential to bridge classroom learning to real-world has added a new angle to contextualizing mathematics learning. We will present the results of а student survey for the experience of using GeoGebra or other similar applications as a tool for mastering the materials for the Calculus course at our faculty. Also, we will analyse the answers to the student questionnaire for their opinion and suggestions for improving the lectures. As a conclusion, we will give some recommendations for solving the mentioned problems and some suggestions for further improvement of teaching and learning mathematics courses. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Comparative analysis of identity management, access control, and authorization practices in public and private universities(2024-07-29) ;Mollakuqe, ElissaBackground This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions. Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies. Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features. Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Gaussian channel transmission of images and audio files using cryptcoding(Institution of Engineering and Technology (IET), 2019-07-16); ; ;Mechkaroska, Daniela; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Applications of homomorphic encryption in secure computation(F1000 Research Limited, 2024-07-29) ;Mollakuqe, Elissa ;Parduzi, Arber ;Rexhepi, Shasivar; Jakupi, SamirBackground Homomorphic encryption (HE) represents a pivotal innovation in modern cryptography, offering a pathway to secure computation on encrypted data. This paper embarks on a comprehensive exploration of HE's applications, elucidating its transformative potential in bolstering data security and privacy across various domains. Methods The research employs a mixed-methods approach to evaluate HE technologies. Quantitatively, it develops realistic datasets simulating healthcare and financial data, assessing HE's performance in encrypted computations. Various encryption schemes are rigorously tested for efficiency and accuracy under different conditions. Qualitatively, insights from expert interviews and case studies of HE implementations provide additional context on practical challenges and strategic benefits. Results The simulations and analyses showcase the efficiency, scalability, and security of HE techniques in diverse scenarios. The empirical evidence validates the real-world applicability of HE, demonstrating its versatility and efficacy in secure computation outsourcing, privacy-preserving data analysis, and secure multi-party computation. Conclusions This research paper highlights the transformative power of homomorphic encryption, advocating for its widespread adoption and integration. By bridging the gap between theoretical understanding and practical implementation, the paper contributes to advancing secure computation practices, addressing contemporary challenges in data security and privacy amidst evolving cybersecurity threats and the increasing ubiquity of sensitive data. In essence, this research serves as a beacon of insight into the future of data confidentiality and integrity, promoting HE as a crucial tool for revolutionizing the landscape of data security and privacy in an interconnected world. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Secure Big Data and IoT with implementation of BlockChain(SCIENTIFIC TECHNICAL UNION OF MECHANICAL ENGINEERING INDUSTRY - 4.0, 2018-12) ;Mechkaroskа, Daniela; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Resistance to Statistical Attacks of Parastrophic Quasigroup Transformation(The Science and Information Organization, 2015); ; - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Gaussian channel transmission of images and audio files using cryptcoding(IET The Institution of Engineering and Technology, 2019); ; ;Daniela Mechkaroska; Random codes based on quasigroups (RCBQ) are cryptcodes, i.e. they are error-correcting codes, which provide information security. Cut-Decoding and 4-Sets-Cut-Decoding algorithms for these codes are defined elsewhere. Also, the performance of these codes for the transmission of text messages is investigated elsewhere. In this study, the authors investigate the RCBQ's performance with Cut-Decoding and 4-Sets-Cut-Decoding algorithms for transmission of images and audio files through a Gaussian channel. They compare experimental results for both coding/decoding algorithms and for different values of signal-to-noise ratio. In all experiments, the differences between the transmitted and decoded image or audio file are considered. Experimentally obtained values for bit-error rate and packet error rate and the decoding speed of both algorithms are compared. Also, two filters for enhancing the quality of the images decoded using RCBQ are proposed. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images(Springer, Cham, 2022) ;Tasevski, Ivo ;Nikolovska, Viktorija ;Petrova, Anastasija ;Dobreva, JovanaPopovska-Mitrovikj, AleksandraNowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, while they completely rely on and believe in the implemented safety principles from various service providers. No matter how sophisticated the system is, every system is vulnerable. Therefore, in this paper, we present the StegYou model for hiding, retrieving, and detecting digital data in images. Our implementation of hiding and retrieving data is based on a custom made crypt-steganography algorithm for one or more images. By applying crypt-steganography techniques for secure data transfer between spatially-distributed individuals, the model will strive to reach the highest level of confidentiality, authenticity, and integrity of the user’s confidential and sensitive data. Also, StegYou can detect hidden data in given images with the help of machine learning methods. - Some of the metrics are blocked by yourconsent settings
Item type:Publication, Mathematical Foundations and Implementation of CONIKS Key Transparency(MDPI, 2024-10-24) ;Mollakuqe, Elissa ;Dag, HasanThis research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems.
