Advances in Cryptology

Faster explicit formulas for computing pairings over ordinary curves. Secure authentication from a weak key, without leaking information. Towards a game theoretic view of secure computation. Concurrent composition in the bounded quantum storage model.

Подобные документы

  • Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.

    презентация, добавлен 19.02.2014

  • The analysis of the existing training methods of multilayer neural network of computing structures is carried out. Recommendations of selected methods usage by examples of multilayer approximation tasks for technology of beneficiation were given.

    статья, добавлен 28.02.2016

  • Human Insulin, PDB entry 1AIO. Image produced with PDB Structure Explorer, which is based on MolScript. Virus structure, superimposed over its PDB summary information. Image produced with PDB Structure Explorer, which is based on MolScript and Raster3D.

    учебное пособие, добавлен 25.11.2013

  • Value of the term "information warfare". Analiz the concept information warfare. The social network "Facebook" in information war. Establishment existence of promotion in a social network. Types of propaganda in social networks. Propaganda against Russia.

    реферат, добавлен 26.12.2014

  • Разработка веб-приложения (сайта) по поиску работы, подбору персонала и выбора образования. Выбор концепции Model-View-Controller, использование базы данных MySQL и языка программирования PHP5 при проектировании. Описание работы программного комплекса.

    курсовая работа, добавлен 18.11.2014

  • The role of linguistic means as backbone elements of any information and library system, a consolidated information resource of institutions of social memory. Criteria for the selection of linguistic tools for the development of their descriptions.

    статья, добавлен 12.07.2021

  • Creation of an automated system for collecting information for the incoherent scattering radar. Characteristics of the composition of parameters that affect the control effect. Requirements for the parameters of the transmitting and receiving equipment.

    статья, добавлен 30.10.2016

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • The essence of the national system of electronic information resources as a set of national resources needed to solve the problems of socio-economic development and electronic information resources of the National registry using a single technology.

    статья, добавлен 20.01.2017

  • The approaches to the information system construction for analyzing work complexity. Business logic and access logic to the database, as a basis of software implementation and in future presentation logic. The block diagram of the information system.

    статья, добавлен 26.06.2016

  • Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.

    учебное пособие, добавлен 08.03.2014

  • Основні типи 3D-анімації, game development, як створюється 3D анімація game development. Ригінг та спінінг, особливості Plastic Animation Paper. Створення анімації, реалістичних моделец з урахуванням усіх нюансів, текстур і навіть міміки персонажів.

    статья, добавлен 11.12.2023

  • The structure of an information security program. Creation and implementation of policies and standards. Activity of federal sentencing guidelines for criminal convictions. System and network access control. Conducting a business impact analysis.

    книга, добавлен 08.03.2014

  • The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.

    статья, добавлен 24.10.2018

  • Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.

    статья, добавлен 08.01.2024

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    книга, добавлен 08.03.2014

  • The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.

    статья, добавлен 26.06.2018

  • Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.

    диссертация, добавлен 01.09.2018

  • The role of information technologies as one of the key factors in labour productivity growth under current conditions. The contribution of information technologies into the average annual growth of labour productivity in a range of some countries.

    статья, добавлен 27.09.2016

  • Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.

    статья, добавлен 27.10.2020

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    статья, добавлен 16.01.2024

  • Justification of the proposals for the creation of new areas of library service along with traditional service, using modern information and communication technologies, and assigning a special place to these areas in the training of specialists.

    статья, добавлен 09.01.2024

  • Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.

    статья, добавлен 07.12.2016

  • Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.

    статья, добавлен 29.07.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.