Authentication scheme on fractal sets
Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
Подобные документы
Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
статья, добавлен 06.05.2018Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
статья, добавлен 20.03.2024Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
материалы конференции, добавлен 08.03.2014Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.
учебное пособие, добавлен 08.03.2014Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.
книга, добавлен 08.03.2014Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.
статья, добавлен 28.05.2023Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
учебное пособие, добавлен 11.10.2014Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
книга, добавлен 08.03.2014The advantages of remote access to the information resources of the State treasury service of Ukraine with the aim of automating the process of executing budgets. The implementation of the software and technical complex "Treasury client - Treasury".
статья, добавлен 25.06.2024The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.
статья, добавлен 15.09.2012Features green orientation of modern CAD systems on the example of Altera Quartus II and built-in utilities "PowerPlay Power Analyzer Tool". Optimization and evaluation of FPGA projects on energy consumption based on the activity signals of the scheme.
статья, добавлен 23.02.2016Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
статья, добавлен 26.06.2016Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.
статья, добавлен 29.09.2016The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.
книга, добавлен 08.03.2014- 19. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.
книга, добавлен 08.03.2014Password authentication is one of essential services in our life for protecting data. In other words, we may loose a lot of money, sensitive data, if passwords leak out. We have to understand clearly what is important for creating or changing passwords.
статья, добавлен 23.06.2016Suggestion information model of environment of computer-aided design, consisting of a сontrol processor, thematic coprocessors and executing processors. The scheme of processors control in the information model. Interaction of thematic coprocessors.
статья, добавлен 22.12.2016Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
книга, добавлен 08.03.2014Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021