A quick glance at quantum cryptography
The recent application of the principles of quantum mechanics to cryptography. Now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping.
Подобные документы
- 101. Amorphic encryption
Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.
статья, добавлен 18.02.2021 Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.
дипломная работа, добавлен 01.12.2019Изучение оптимальных управленческих стратегий, основанных на анализе имитационных экспериментов с целью оптимизации кадрового состава ремонтных бригад в соответствии с жилищным фондом управляющей компании. Описание агента Construct, Service_unit и Main.
контрольная работа, добавлен 20.02.2019Enigma cipher machine. Cryptographic ally strong sequences. Shift register-based stream ciphers. Hellman’s time-memory trade-off. Birthday attacks on hash functions. Secondary phase refinement. Implementation attacks. Sigaba rotor in reverse orientation
учебное пособие, добавлен 08.03.2014The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
статья, добавлен 03.02.2021The article is devoted to the issue of development and application of an interactive electronic textbook for students of "Applied Mechanics" and "Industrial Mechanical Engineering" from the discipline "English". Integration of an interactive e-textbook.
статья, добавлен 07.03.2023The study of the problems and solutions of insufficient quantity and quality of documentation that is created for software in recent decades. Create a discussion of current practices documentation to facilitate a detailed discussion in the future.
статья, добавлен 23.02.2016Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
статья, добавлен 20.03.2024Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
научная работа, добавлен 15.09.2012The creation of an intuitive family tree on the basis of the online service Coggle, which is designed to develop mental maps. The main criteria that should be in the program for mobile application development. Structure of the mobile application.
статья, добавлен 06.06.2023Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016The physical principles of meteor radio. A block diagram of hardware and software for sensing meteor trails. The principles of software-defined radio system. А functional diagram of a digital oscillator. shortcomings. Range and security meteor radio.
статья, добавлен 06.05.2018Назначение свойств Assistant, BrokenReference, Build, CodeContextObject, CommandBars, CurrentObjectName, CurrentObjectType, DBEngine, IsCompiled, MenuBar, Modules, ProductCode. Краткое описание наиболее показательных методов объекта Application.
контрольная работа, добавлен 10.06.2011This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
статья, добавлен 16.01.2024A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
статья, добавлен 15.09.2012- 116. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 Theory and tools communication. Effect of employees at computer system. The importance of accurate pronunciation and eye contact. Gestures and body language programs. Back channels and turn-taking. Multiplexing – several topics in one utterance.
лекция, добавлен 28.12.2013- 118. Modern office
The role of information technology in human life. The use of personal computers, television monitors, slide projectors, videodisc players, multimedia systems and the Internet. Office furniture. Communication in organizations. As for color harmony.
контрольная работа, добавлен 04.03.2016 Control the computer's resources, the hardware, software as one of the operating systems main tasks. The use of a graphical user interface that eliminates the need to learn complex commands - a feature of the operating systems of the Windows family.
презентация, добавлен 20.04.2016Загальна характеристика системи і основні функціональні можливості "Oracle Application". Модулі для управління фінансами, матеріальними потоками, виробництвом. Система інформаційної підтримки керівництва, фінансовий аналіз, планування і консолідація.
контрольная работа, добавлен 25.05.2012Application of mathematical methods - important condition in the analysis, work optimization of industrial structures. Use of the device of imitating modeling for research of production systems. The program table parameters for collecting statistics.
дипломная работа, добавлен 10.11.2014Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.
статья, добавлен 08.01.2024Sensor - a device that measures physical quantity and converts it into a signal. The context-aware systems a combination of hardware and software that analyze the state of the user and the environment and adapt their work to the changing condition.
статья, добавлен 30.04.2019Components, priority areas for capital investment in the information and communication technologies market were determined. The relativity of relationship between the placement of supercomputers in the countries and their level of innovation was revealed.
статья, добавлен 28.12.2017