Providing access to information systems of higher education in the case of loss of key information

Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

Подобные документы

  • Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.

    ??????, добавлен 29.11.2016

  • Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.

    ???????????, добавлен 01.09.2018

  • Characteristics of information and communication technologies. History of the creation of a computer system. Classification operating system: DOS, Windows, Unix, Linux, Mac OS. Databases management systems: the concept, characteristics, architecture.

    ???? ??????, добавлен 20.10.2016

  • The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

    ??????, добавлен 18.09.2020

  • ??????????????, ??????????????? ? ?????????? ??????? ?????? ? Microsoft Access. ??????????? ????? ? ??????. ?????? ????????? ? ????. ?????? ? ????????? ? ????????? ? Access. ???????????????? ??? ?????? ? ??????? ?????? Visual Basic for Applications.

    ???????, добавлен 23.11.2014

  • The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.

    ??????, добавлен 23.10.2020

  • Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.

    ?????, добавлен 08.03.2014

  • ??????????? ??????????? ??????? ?????????? ?????? ?????? (????) Microsoft Access, ???????? ? ?????? ?????? Microsoft Office. ????????????? ????? ???????????????? Visual Basic for Applications, ?????? ??? ???? ?????????? Office, ??? ?????????? ????????.

    ???????????, добавлен 07.12.2016

  • Analysis of the features of teaching communication technologies, directions of application of information and communication technologies in the educational process, the purpose of modern technologies, the main advantages of the introduction of ICT.

    ??????, добавлен 22.07.2022

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    ??????, добавлен 28.05.2021

  • The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.

    ??????, добавлен 15.04.2024

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    ??????, добавлен 30.01.2016

  • Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.

    ??????, добавлен 08.06.2024

  • Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.

    ??????, добавлен 27.05.2021

  • Development of digital technologies in the protection of applications and information. A comparative analysis of the influence of the choice of the direction of the development of cybersecurity. Recommendations for implementing technology development.

    ??????, добавлен 09.12.2024

  • The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.

    ??????, добавлен 10.05.2018

  • Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.

    ???????, добавлен 20.03.2016

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    ??????, добавлен 20.03.2024

  • Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.

    ??????, добавлен 27.05.2021

  • Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.

    ??????, добавлен 05.04.2019

  • Analysis of the mobile banking information system based on biometric authentication. A function is proposed that ensures the closure of biometric template data in information networks. Estimation of the number of customer requests to the payment system.

    ??????, добавлен 29.09.2016

  • ??????? Microsoft Access. ????? ?????????? Visual Basic. ???????????? ?????? ? ????????? ????? ? ?????? ??????. ?????????? ??????? ???????? ?????? ?? ????????????? ???????. ?????????? ????????? ??????????. ????????? ??????, ?????????????? ? ???????.

    ???????? ??????, добавлен 22.08.2011

  • ?????????? ?????????????? Access — ??????? ?????????? ?????? ??????. ???????? ??????????? ???????? ?????????? ??? ???????????????? ? ?????????????? ???????? Access. ???????? ???? ? ??????? WYSIWYG. ?????? ?????, ??????? ????? ?????? ? ??????? Access.

    ??????, добавлен 28.10.2011

  • Assessment of fire threat in Ukraine. Creation of an information database of classes of fire protection of buildings and premises. Prediction of the spread of fire in time and space. Modeling the behavior and movement of people in an emergency situation.

    ??????, добавлен 22.12.2016

  • Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.

    ??????, добавлен 12.08.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.