Cryptography and Security Services: Mechanisms and Applications
Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
Подобные документы
Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.
?????, добавлен 08.03.2014??????????? ????????? ? ????????????????? ???????????? ??????? Linux. ????????? ????????? ????????? ???????????? ?????????. ?????????????? ? ???????? ??????? ????????. ?????? ?????????????? ???????????? ? ??????. ????? ???????????? ? ???????? ??????.
???????? ??????, добавлен 18.09.2016???????????? ????????? Avast: ????? ???????? ? ???? ????????. ???????? ???????????? ????????? ESET NOD32. ????????? ???????????, ??? ??????????? ?????? ? ?????????????? ???????. Microsoft security Essentials - ?????????? ???????????? ??????? ?? Microsoft.
???????, добавлен 27.07.2011?????????????? ????????? ???????? ?????????????? ???????. ??????? ? ??????? ??????? Windows (?????????? ???????). ????? ??????? ? ????? ?? ????????: Default, Sam, Security, Software, System. ?????????? ??????. ????????? ERUNT. ???????? ?????? ???????.
???????????? ??????, добавлен 10.05.2015A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.
??????, добавлен 15.02.2021The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
???????????, добавлен 25.09.2016Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.
?????, добавлен 08.03.2014?????? ?????????? ?????????? ??????????? ??????? ????? ????????????????? ?????????????? ?????????????. ??????????? ????????? ?????? ??????????? ??????? ???? VPN. ??????????? ???????????? VPN–?????? ??? ?????? IP Security. ????? ?????? ?????????? IPsec.
??????, добавлен 15.04.2018Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.
?????, добавлен 08.03.2014????? ?????????????? ???????????? ???????????? ???????? ??? ????????? ????????????? Avast Free Antivirus, Panda Antivirus, 360 Total Security ? ESET NOD32. ????? ???????????? ??????? ? ????? ?????????????? ???????????? ??? ???????? ????????????.
??????, добавлен 28.05.2017??????? ? ???????? ??????????? ?????? ????????? ????, ????? ????????. ?????? ????????? Kaspersky Internet Security. ?????????????? ??????? ????-?????, ????-???? ? ???????????? ????????. ???????????? ??????? ???????????? Prevx1, ??????? ?????????.
???????????? ??????, добавлен 24.12.2012?????? ?????????? ?? ???????. ??????? ??????????, ????????????? ? ??????? ???????????? ????????. ????????????? ?????? ???????????? ???????? (????????? ???????????, NOD32, Dr. Web, Avira AntiVir, Microsoft Security Essentials), ?? ????????? ?? ?????????.
???????? ??????, добавлен 22.04.2014Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
???????????, добавлен 24.01.2017????????, ??? ??????? ??????????? ??????????? ????????? ??????? - ?????????????? ?????????????? ? ???????????????? ? ????????? ????????. ????????? ???????????? (perfect security) ???????. ??????????? ????? ????????? ???????? ? ?????? ????? ? ????????????.
??????, добавлен 17.06.2018Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.
??????, добавлен 20.03.2024Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
???? ??????, добавлен 08.03.2014The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.
????????? ??????, добавлен 13.07.2020????????? ??????????, ???????????? ??????? WindowsXP. ?????? ? Microsoft Office, Kaspersky Internet Security, Pascal ABC, "1? ???????????", Internet Explorer. ?????????? ??????? "??????". ?????????? ????????? ??? ??????????? ??????? ????? ????????.
????? ?? ????????, добавлен 13.03.2015The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
??????, добавлен 25.03.2016The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.
??????, добавлен 08.05.2018Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.
??????, добавлен 20.03.2024Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.
?????, добавлен 08.03.2014A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.
??????, добавлен 22.12.2016The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.
??????, добавлен 30.07.2018