Information Security and Privacy
Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
Подобные документы
The development of the knowledge society, digital technologies, digital society, all that is called the "digital era" of civilization. In the modern world, a new interpretation of the information society, namely smart-society and technologies, has spread.
статья, добавлен 09.04.2022Disclosure mechanisms that will help to identify lines with Romanian chromatic words on the basis of computer technology, as the first stage in developing the dictionary of poetic meanings of colors. Cooperation of linguists and computer specialists.
статья, добавлен 23.02.2016Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
презентация, добавлен 18.11.2015Средства анализа и моделирования бизнес процессов. Проектирование и разработка информационных систем и программного обеспечения для управления предприятиями. Применение Rational Rose для создания графических объектно-ориентированных моделей и языке UML.
реферат, добавлен 30.06.2020The questions of energy efficiency of information systems. The study of existing methods to reduce energy consumption at the program level. A new approach to the development of energy-efficient software that passes through its entire life cycle.
статья, добавлен 30.01.2016Проектирование с помощью "Rational Rose" систем любой сложности: от банковской системы до разработки кода на С++. Возможности программного инструмента. Типы сущностей в объектно-ориентированном языке моделирования UML. Преимущества "Rational Rose".
реферат, добавлен 29.12.2014Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014RUP - методологическая основа для всего, что выпускает Rational. RUP регламентирует этапы разработки ПО, документы, сопровождающие каждый этап, и продукты Rational для каждого этапа. RUP не диктует, а рекомендует использовать то или иное средство.
статья, добавлен 03.10.2008Элементы экрана интерфейса Rose, настройка стандартной панели инструментов. Параметры настройки отображения, изображение атрибутов и операций на диаграммах классов. Создание действующих лиц в среде Rational Rose. Диаграмма вариантов использования.
методичка, добавлен 06.04.2017Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
книга, добавлен 08.03.2014Rational Rose в отличие от подобных средств проектирования способна проектировать системы любой сложности. Развернутое представление о проекте в сочетании со средствами документирования. Кодогенерация. Обратное проектирование имеющихся систем.
доклад, добавлен 03.10.2008Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.
статья, добавлен 15.09.2012Characteristics and features of the information society. Advantages and disadvantages of virtual life in the digital world. Development of computer technologies and network security tools. Discussion of problems and tasks in the field of cybersecurity.
статья, добавлен 01.12.2017Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.
статья, добавлен 26.01.2018Bioinformatics Versus Other Disciplines. Further Developments: from Linear Information to Multidimensional Structure Organization. Probability-Generating Functions and Characteristic Functions. Transition Probability Matrix and State Transition Graph.
учебное пособие, добавлен 25.11.2013Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.
статья, добавлен 29.07.2016Provide structured information on user identification, presents an overview of today’s security landscape and the specific threats to user authentication. Outlines the process of controlled access to resources by means of authorization and accounting.
книга, добавлен 08.03.2014Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.
статья, добавлен 18.02.2015The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
книга, добавлен 18.09.2012Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.
статья, добавлен 08.03.2014The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016Логическое представление проектируемой системы при помощи CASE-средства Rational Rose. Диаграммы последовательности и коопераций. Рассмотрение понятий "линия жизни" и "фокус управления". Разновидности программных сообщений, доступных в Rational Rose.
лабораторная работа, добавлен 05.06.2015Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.
дипломная работа, добавлен 22.07.2016Способы защиты от несанкционированного доступа к информационным ресурсам компьютеров. Специфика применения системы "Secret Net 5.0-C". Реализация дискреционной и мандатной модели разграничения прав. Включение механизма гарантированного уничтожения данных.
презентация, добавлен 21.04.2014This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014