Practical Cryptology and Web Security

Basic security skills on the World Wide Web. Cryptology, Web site protection and attacks. One-way encryptions and message digests. Some strong symmetric-key ciphers. Practical software-based stream ciphers. Block ciphers with variable key lengths.

Подобные документы

  • Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.

    статья, добавлен 06.05.2018

  • The advantages and disadvantages of PHP web development using Core PHP and PHP frameworks. Security and performance are investigated. The recommendations on using both approaches. The structure of application and key development things are highlighted.

    статья, добавлен 10.10.2023

  • Характеристика различных способов восстановление реестра. Понятие и функции реестра Windows (системного реестра). Файлы реестра и место их хранения: Default, Sam, Security, Software, System. Выполнение работы. Программа ERUNT. Создание бекапа реестра.

    практическая работа, добавлен 10.05.2015

  • Сравнительный анализ ONVIF и PSIA. Анализ существующих технических решений. Средства и методы разработки, постановка задачи. Процесс разработки библиотеки: реализация SOAP, ONVIF сервисов, WS-Security, WS-Discovery. Разработка высокоуровневых функций.

    дипломная работа, добавлен 07.09.2018

  • Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.

    книга, добавлен 08.03.2014

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    статья, добавлен 29.07.2016

  • The massage recovery feature as independent of the choice of the signature equation and that all ElGamal type schemes have variants giving message recovery and archive five new signature schemes giving message recovery with different properties.

    статья, добавлен 15.09.2012

  • Описание технологии и результатов применения системно-когнитивного анализа для выявления знаний о последствиях ошибок в конфигурировании системы безопасности по отчету Microsoft Baseline Security Analyzer (MBSA). Анализ методов использования этих знаний.

    статья, добавлен 27.04.2017

  • Development of an algorithm for obtaining a video depth map using the method of image division. Using web cameras to determine the object and calculate the distance to it. Development of software code for streaming video of the experimental setup.

    статья, добавлен 13.07.2022

  • The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.

    статья, добавлен 15.09.2012

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • The article is intended to analyse the development of the institute of personal data protection in the world identify ways to adapt the national legislation of Ukraine to the current personal data protection standards of the EU. To carry out the research.

    статья, добавлен 19.09.2024

  • International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.

    книга, добавлен 08.03.2014

  • This article describes the main features of the design in 3D format. Demonstrated the usefulness of this method in the design and in the analysis. Presents basic examples of the practical application of data modeling functions for real design solutions.

    статья, добавлен 28.09.2016

  • The theoretical workbench for real time network modeling. Implement different transition firing rules in A-nets. The Matlab as a Simulink block library. Execution time and facilitating model understanding. A-nets for message transmission modeling.

    статья, добавлен 22.07.2014

  • A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.

    книга, добавлен 08.03.2014

  • It is developed software integration of different computer-aided design systems in the design of wind power plants. The block-diagram of computer-aided design system is presented. Analysis and especially considering of the format conversion mechanism.

    статья, добавлен 26.06.2016

  • The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.

    статья, добавлен 03.12.2020

  • Introduce the basic principles of digital video compression,focusing on the main techniques used in various video coding standards and applies the rotation and reversion operations to increase the security of the secret images and the utilization.

    книга, добавлен 08.03.2014

  • Basic protocols and Internet search them. Search Tools in WWW. Thematic catalogs. Characteristics of automatic indexes. World Wide Web Worm. Review of Russian search engines. Features search through directories and search engines in a pure form.

    реферат, добавлен 30.06.2014

  • Simulation modeling for solving problems of mathematical physics. Usage cellular neural networks as means of modeling. Usage locally asynchronous methods as algorithmic software and tool optimization of neural network. The block diagram of the software.

    статья, добавлен 26.06.2016

  • Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.

    учебное пособие, добавлен 11.10.2014

  • Protection from disclosure to unauthorised persons integrity. Maintaining data consistency. Assurance of identity of person or originator of data non-repudiation. Conventional encryption: uses a shared key. Digital Signatures and especially their use.

    учебное пособие, добавлен 08.03.2014

  • Public key encryption and digital signature security definitions. Composable symbolic analysis for public key encryption. Ideal functionality formulations. Redefining ideal functionalities. Adding signatures to universally composable symbolic analysis.

    учебное пособие, добавлен 15.09.2012

  • Анализ различных видов существующих угроз облачных вычислений. Атаки на элементы облака и решения по их устранению. Апробация решения по защите от угроз безопасности облаков от компании Cloud Security Alliance и оценка их практической эффективности.

    статья, добавлен 01.11.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.