Instant message exchange systems in the practice of public governance. Classification, security, interoperability and remote cyber education
The means of digital communications in the field of public administration and cyber education. The definition of "Instant messages" and "chatbot" is defined. The impact of the COVID-19 pandemic on the development of digital communication systems.
Подобные документы
The outlook of the digital divide factors influencing consumer adoption of smart city solutions. The digital divide in the United States of America: Americans without access to high-speed Internet service. Consumer adoption of smart city solutions.
статья, добавлен 28.06.2021The current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. Guidance documents in the field of cloud computing information security.
статья, добавлен 23.10.2020The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
методичка, добавлен 11.10.2014An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
статья, добавлен 30.04.2018- 105. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Defining the content of the national context for the study of digital marketing management issues. Bibliometric analysis of scientometric databases. Quantitative analysis, relevance of scientific resources, relevance of authors, relevance of affiliation.
статья, добавлен 12.05.2024Classical cryptography and quantum computation, as well as the signature scheme to the security of Merkle. Challenges in quantum cryptography and the authentication path computation. Basic designs and variations of multivariate public-key cryptography.
материалы конференции, добавлен 08.03.2014Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021Method for automated digital image processing. The specialties of the synthesis of automaton, the defining of channels management class of objects. Construction regular expressions to defining a plurality of channels management of software objects class.
статья, добавлен 27.06.2016The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
статья, добавлен 25.06.2024From the Riddles of Ancient Egypt to Cryptography in the Renaissance — 3500 Years in the Making. Three Post-Renaissance Centuries. Symmetric-Key and Public-Key Cryptography. Electronic Mail and Internet Security. Noncryptographic Security Issues.
книга, добавлен 08.03.2014Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014The basic ways of education informatization are examined; the requirements for educational ICT and presented. The basic information technologies used in the teaching process are summarized: interactive; computer-based learning; telecommunication means.
статья, добавлен 04.10.2022Ubiquitous computing - filling the real world with computers. Challenging HCI Assumptions. Implications for device size as well as relationship to people. Defining the Interaction Experience. Multi-scale and distributed output. Merging Digital Worlds.
презентация, добавлен 28.12.2013Исследование услуг, оказываемых компанией "Epam Systems". Анализ и обзор основных возможностей системы тестирования пользователей на предмет знаний и умений работы с продуктами Microsoft. Реализация Find&Replace dialog для симуляции MS Office Word.
реферат, добавлен 17.12.2014A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014Функциональные требования концепции персонификации в компаниях. Перспективы формирования инструментов digital-аналитики для определения возможностей развития системы. Проектирование технологической архитектуры системы. Описание интерфейса программы.
дипломная работа, добавлен 09.08.2018An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
книга, добавлен 08.03.2014Peculiarities of implementing methods of cognitive intelligence. Recommendations on the hardware, mathematical and software parts of the approach to the implementation of such systems, indicating the strengths and weaknesses of the chosen methods.
статья, добавлен 16.06.2024The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
статья, добавлен 10.05.2018International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014Изучение принципов моделирования цепей, которые содержат индуктивные элементы и цепи с самоиндукцией в пакете Sym Power Systems на примере искусственных линий задержки. Определение их характеристик и параметров и представление их в графическом виде.
лабораторная работа, добавлен 16.06.2009Documentation for the software systems as an important factor in maintenance. Status of the existing documentation practices as well as an overview of the quality of the documentation. Creating a discussion of current practices, analysis of the results.
статья, добавлен 23.02.2016Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016