Information Security and Privacy

Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

Подобные документы

  • The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.

    статья, добавлен 09.04.2022

  • Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.

    статья, добавлен 23.02.2016

  • Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.

    презентация, добавлен 18.11.2015

  • Средства анализа и моделирования бизнес процессов. Проектирование и разработка информационных систем и программного обеспечения для управления предприятиями. Применение Rational Rose для создания графических объектно-ориентированных моделей и языке UML.

    реферат, добавлен 30.06.2020

  • The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.

    статья, добавлен 30.01.2016

  • Проектирование с помощью "Rational Rose" систем любой сложности: от банковской системы до разработки кода на С++. Возможности программного инструмента. Типы сущностей в объектно-ориентированном языке моделирования UML. Преимущества "Rational Rose".

    реферат, добавлен 29.12.2014

  • Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.

    книга, добавлен 08.03.2014

  • RUP - методологическая основа для всего, что выпускает Rational. RUP регламентирует этапы разработки ПО, документы, сопровождающие каждый этап, и продукты Rational для каждого этапа. RUP не диктует, а рекомендует использовать то или иное средство.

    статья, добавлен 03.10.2008

  • Элементы экрана интерфейса Rose, настройка стандартной панели инструментов. Параметры настройки отображения, изображение атрибутов и операций на диаграммах классов. Создание действующих лиц в среде Rational Rose. Диаграмма вариантов использования.

    методичка, добавлен 06.04.2017

  • Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

    книга, добавлен 08.03.2014

  • Rational Rose в отличие от подобных средств проектирования способна проектировать системы любой сложности. Развернутое представление о проекте в сочетании со средствами документирования. Кодогенерация. Обратное проектирование имеющихся систем.

    доклад, добавлен 03.10.2008

  • Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.

    статья, добавлен 15.09.2012

  • Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.

    статья, добавлен 01.12.2017

  • Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

    статья, добавлен 26.01.2018

  • Bioinformatics Versus Other Disciplines. Further Developments: from Linear Information to Multidimensional Structure Organization. Probability-Generating Functions and Characteristic Functions. Transition Probability Matrix and State Transition Graph.

    учебное пособие, добавлен 25.11.2013

  • Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.

    статья, добавлен 29.07.2016

  • Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.

    книга, добавлен 08.03.2014

  • Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.

    статья, добавлен 18.02.2015

  • The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.

    книга, добавлен 18.09.2012

  • Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.

    статья, добавлен 08.03.2014

  • The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.

    статья, добавлен 28.08.2016

  • Логическое представление проектируемой системы при помощи CASE-средства Rational Rose. Диаграммы последовательности и коопераций. Рассмотрение понятий "линия жизни" и "фокус управления". Разновидности программных сообщений, доступных в Rational Rose.

    лабораторная работа, добавлен 05.06.2015

  • Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.

    дипломная работа, добавлен 22.07.2016

  • Способы защиты от несанкционированного доступа к информационным ресурсам компьютеров. Специфика применения системы "Secret Net 5.0-C". Реализация дискреционной и мандатной модели разграничения прав. Включение механизма гарантированного уничтожения данных.

    презентация, добавлен 21.04.2014

  • This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.

    книга, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.