Alexander Suvorov

Independent Researcher | Author of Pointer-Based Security & Local Data Regeneration Paradigms

Paradigms Author Theoretical Research Security Architecture Information Theory Published Researcher
350+
Paper Downloads
374+
Paper Views
3
Research Projects
2
Published Paradigms
750+
Total Downloads

About Me

Research Profile

Independent Researcher focused on fundamental computer science and information theory. Author of groundbreaking paradigms including Pointer-Based Security and Local Data Regeneration.

My work challenges conventional approaches to digital security and information transmission, proposing architectural shifts that eliminate vulnerable data existence and redefine communication as synchronous state discovery.

Research & Innovation

Author of published paradigms: The Pointer-Based Security Paradigm and The Local Data Regeneration Paradigm

Pointer-Based Security Paradigm:
Redefines digital security by architecting systems where vulnerable data doesn't exist
Local Data Regeneration Paradigm:
Proposes alternative to classical information transmission through state discovery
Academic Recognition:
Published research with 350+ unique downloads across global academic platforms
Experimental Validation:
Deterministic Game Engine demonstrates practical feasibility of paradigms

Research Impact Metrics


350+
Unique Paper Downloads
750+
Total Paper Downloads
350+
Unique Paper Views
750+
Total Paper Views
3
Research Publications
2
Published Paradigms

Research Paradigms

Pointer-Based Security Paradigm

Architectural Shift from Data Protection to Data Non-Existence

A fundamental rethinking of digital security architecture that eliminates vulnerable data existence rather than protecting it through conventional encryption.

@misc{suvorov_2025_17204738,
  author       = {Suvorov, Alexander},
  title        = {The Pointer-Based Security Paradigm: Architectural
                   Shift from Data Protection to Data Non-Existence},
  month        = sep,
  year         = 2025,
  publisher    = {Zenodo},
  doi          = {10.5281/zenodo.17204738},
  url          = {https://doi.org/10.5281/zenodo.17204738},
}
Views

205/450

Unique/Total
Downloads

192/380

Unique/Total

Local Data Regeneration Paradigm

Ontological Shift from Data Transmission to Synchronous State Discovery

Fundamental theoretical work proposing an alternative to classical information transmission, where data is regenerated locally through synchronized computation.

@misc{suvorov_2025_17264327,
  author       = {Suvorov, Alexander},
  title        = {The Local Data Regeneration Paradigm: Ontological
                   Shift from Data Transmission to Synchronous State
                   Discovery},
  month        = oct,
  year         = 2025,
  publisher    = {Zenodo},
  doi          = {10.5281/zenodo.17264327},
  url          = {https://doi.org/10.5281/zenodo.17264327},
}
Views

126/280

Unique/Total
Downloads

120/250

Unique/Total

Deterministic Game Engine

Practical Implementation of Security & Regeneration Paradigms

A research prototype demonstrating the practical feasibility of both paradigms through deterministic architecture with O(1) state access and mathematical verification.

@misc{suvorov_2025_17383447,
  author       = {Suvorov, Alexander},
  title        = {Deterministic Game Engine: Practical
                   Implementation of Pointer-Based Security and Local
                   Data Regeneration Paradigms},
  month        = oct,
  year         = 2025,
  publisher    = {Zenodo},
  doi          = {10.5281/zenodo.17383447},
  url          = {https://doi.org/10.5281/zenodo.17383447},
}
Views

43/95

Unique/Total
Downloads

28/65

Unique/Total

🚀 Paradigms Evolution

Pointer-Based Security

Architectural Security Transformation

Theoretical Foundation

Conceptual shift from data protection to data non-existence

Architectural Framework

Three fundamental transformations in security architecture

Experimental Validation

Proof-of-concept confirming paradigm feasibility

Local Data Regeneration

Information Theory Transformation

Ontological Foundation

Reconceptualizing data as discoverable state

Theoretical Framework

Three postulates of local data regeneration

Implementation Validation

Proof-of-concept confirming paradigm feasibility

Deterministic Engine

Practical Implementation

Pointer-Based Security

Theoretical foundation for data non-existence

Local Data Regeneration

Ontological shift from transmission to discovery

Practical Implementation

Experimental validation through deterministic engine

Research Expertise

Security Research

Digital Security Architecture

Pointer-Based Security
Architectural elimination of vulnerable data existence
Zero-Transmission Systems
Communication without data transfer
Cryptographic Verification
Mathematical proof of system integrity

Information Theory

Data Transmission Alternatives

Local Data Regeneration
State discovery through synchronized computation
Deterministic Systems
Predictable state generation and verification
Theoretical Frameworks
Formalization of novel communication paradigms

Publications & Platforms

Digital Object Identifiers

Pointer-Based Security:
10.5281/zenodo.17204738
Local Data Regeneration:
10.5281/zenodo.17264327
Deterministic Engine:
10.5281/zenodo.17383447

Academic Contact


For research collaboration, peer review, or academic discussion of security paradigms and information theory.