Security proofs of cryptographic protocols
Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
Подобные документы
Conducting an informational study of trends in the development of cyber attacks. Analysis of the factors affecting the number of cyber attacks on the information security of web resources over the past few years and fluctuations in their intensity.
??????, добавлен 27.10.2020Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016???? ???????????? ????. ??????? ?????? ?????????? ? ????????. ??????? ??????????? ?????. ???????? ?????????? ? ?????? ?????????? ?? ??????. ??????????? ???????? ????? (Internet Protocol Address). ??? IP ?????? ?????????? ? ????. ???????? ??????? ????.
???????? ?????, добавлен 03.06.2022The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
??????, добавлен 23.10.2020Researching network attacks, security audit tools. Securing the router for administrative Access. Configuring a site-to-site VPN using cisco IOS and SDM. Configuring a remote Access VPN server and client. Security policy development and implementation.
??????? ???????, добавлен 08.03.2014The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
?????, добавлен 08.03.2014Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
??????, добавлен 15.09.2012The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
?????, добавлен 08.03.2014Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
?????, добавлен 08.03.2014Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
????????? ???????????, добавлен 08.03.2014An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
?????, добавлен 08.03.2014Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
??????, добавлен 06.05.2018Development of a method for time series prediction, which dynamically finds weights for the input factors. Validation of the proposed method on a set of real time series, the assessment of its results in comparison with the method used as the base.
???????????, добавлен 30.01.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
??????, добавлен 28.10.2020- 67. ?????????? ?????
???????? ???????? ??? ????????????????? ?????. ??????? ???????? ??????? ????? ?????????? ???????? ?????????. ?????????????? Simple Network Management Protocol, ??? ??????? ????????. ?????????? ???????? get-next. ???????? ? ???? ????????? SNMPv1.
???????? ??????, добавлен 21.11.2013 Information security and risk management. Business continuity and disaster recovery. Legal, regulations, compliance and investigations. Operating system architecture. Information technology security evaluation criteria. LAN media access technologies.
??????? ???????, добавлен 08.03.2014Studies show that despite the existence of a large number of monitoring methods used in the evaluation of the technical condition of generators on a real-time basis in modern times, they create certain limits in the evaluation of some parts or parameters.
??????, добавлен 08.12.2024Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
??????, добавлен 14.01.2017Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
??????, добавлен 18.09.2020???????????? ? ??????????? ???????????? web-??????????, ??????????? ?? ??????????? ??????-??????. ?????? ?????????? ??????? ?????. ???????? ???????????????? ?????? web-??????. ??????? ?????????? simple object access protocol. ??????????? web-??????.
??????????? ??????, добавлен 18.01.2014?????????????? ????????? "1?: ???????????". MicrosoftBizTalkServer ??? ?????? ?????????????????? ??????????. ?????? ??????????? ???-?????: SimpleObjectAccess Protocol, Web Services Description Language. ????? ?????????? Extensible Markup Language.
???????? ??????, добавлен 15.08.2012??????? ????? ??? ???????? ????????????? ??????????, ??????????? ? ???????????? ????. ?????????? ?????????????-???. ?????? ?????? ????????? Address Resolution Protocol. ???????????? ? ????????????????? ???????????. ????????????? ???????? ??????????.
???????, добавлен 03.03.2015??????? ?????????????? ??????? ??????????? ???????. ?????????? ?????????? ???????? ?????????? "Logic". ???????? ???????????? ????????? ? ????????? ?? ??????????. ???????????? ??????????. ???????? ??????? ??????????, ???????????? ????? ??? ??????.
??????, добавлен 28.02.2019
