Coding and cryptology
Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
Подобные документы
Fuzzy controller has two inputs and one output linguistic variables. Structural diagram of neuro-fuzzy controller. The basic mathematical models of each of the five layers neuro-fuzzy controller. Block diagram of genetic algorithm and feature matching.
??????, добавлен 21.06.2016Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
????????? ??????, добавлен 22.07.2016Development of a new algorithm for registration of remote sensing images based on landmarks. Mathematical model of elementary and flat objects of the image based on contour analysis. An solution that allows you to analyze a specific image object.
??????, добавлен 27.05.2021???????? ?????????, ???????, ??????????? ???????????, ????????????? ??????. ??????????, ????? Structured Query Language, ???? ??????. ?????????? ???????? ??????????? ??????? ? ????? ????????????????? ????????. ?????? ????????, ??????????????????? ?????.
???????????, добавлен 21.02.2016???????????? ????????????? ????????? ?????????? ??????????, ?????????? ?? ??????????. ???????????? ? ?????????????? ???????????? ????????????? Advanced Encryption Standard, ??????? ???????? ???????????????? ?????? ?? ????????? ???? ?? ????? ?? ????????.
??????, добавлен 25.04.2022Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
??????, добавлен 22.12.2016- 107. ?????? ????????????
??????? ? ??????? ??????????? ????????????. ??????? ??????????? ????????? ?????? ? ?????????????. ?????????? ? ????????? ??????. ???????? Data Encryption Stantart. ??????????? ????? ????????????? ???????????? ??????. ?????????? ????????????????? ???????.
???????? ??????, добавлен 12.06.2011 Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
?????, добавлен 08.03.2014- 109. The code book
The history of codes and ciphers as the story of the centuries-old battle between codemakers and codebreakers, an intellectual arms race that has had a dramatic impact on the course of history. The mechanization of secrecy. A qantum leap into the future.
?????, добавлен 08.03.2014 Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.
??????, добавлен 25.12.2016- 111. ?????????? ??????
????????? ????????? ?????????? ? ???? ????????????. ??????? ?????????. ???????????? ??????????. ???????? ????????? ????????????? ??????. ????????? ?????????? ?? ????????? Data Encryption Standard. ??????????? ????? ????????? ? ????????? ???????.
???????????, добавлен 20.05.2013 Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014?????????????? ????? ???????? ?? ??????? ???????? ? ?????????? SQL – Structured Query Language. ?????? ????????????? ??????????. ???????? ???????????? ?????????????? ? ?????????? SQL. ???????? ???????????? ?????????? ????? Structured Query Language.
???????, добавлен 13.01.2017????????? ?????????? ??????? ?????? ??? ?????? ??????. ?????????? ?????????????????? ???????????? ???????????, ?????????? ????????? ? ??????????? ????? ?????????? DES. ???????? ?????????? ?????, ????????? ??????? ?????????? ????????? ??? ????????????.
??????????? ??????, добавлен 26.01.2013The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
??????, добавлен 23.06.2016?????????? ??? ?????? ???????? ?????????? ?? ???????????????? ???. ???????????? ????????????? ? ????????? ?????. ??????????? ???????? ? ????????? ?????. ???????? Advanced Encryption Standard ? ??? ????????. ????? ?????????? ? ???????????? ?????? ? ?????.
???????, добавлен 04.07.2015Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
??????, добавлен 25.03.2016???????????? ??????? ?????. ???????? ?????????? ????????????, ?????? ??? ??????????. ??????????? AES-128. ????????? ??????. ??????? ?????. ????? ?? ?????????????? ????????. ???????????????? ???????????? ?? ????????? ??????. Advanced Encryption Standard.
???????, добавлен 19.04.2015A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
??????, добавлен 15.09.2012Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
??????, добавлен 20.03.2024Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021A computer based decision support system is proposed the basic tasks of which are adaptive model constructing of financial processes. The system is developed with the use of system analysis principles, forming alternatives for models and forecasts.
??????, добавлен 20.01.2017Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016