Cryptography and Security Services: Mechanisms and Applications

Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.

Подобные документы

  • Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.

    ?????, добавлен 08.03.2014

  • ??????????? ????????? ? ????????????????? ???????????? ??????? Linux. ????????? ????????? ????????? ???????????? ?????????. ?????????????? ? ???????? ??????? ????????. ?????? ?????????????? ???????????? ? ??????. ????? ???????????? ? ???????? ??????.

    ???????? ??????, добавлен 18.09.2016

  • ???????????? ????????? Avast: ????? ???????? ? ???? ????????. ???????? ???????????? ????????? ESET NOD32. ????????? ???????????, ??? ??????????? ?????? ? ?????????????? ???????. Microsoft security Essentials - ?????????? ???????????? ??????? ?? Microsoft.

    ???????, добавлен 27.07.2011

  • ?????????????? ????????? ???????? ?????????????? ???????. ??????? ? ??????? ??????? Windows (?????????? ???????). ????? ??????? ? ????? ?? ????????: Default, Sam, Security, Software, System. ?????????? ??????. ????????? ERUNT. ???????? ?????? ???????.

    ???????????? ??????, добавлен 10.05.2015

  • A study of the causes of the problematic situation regarding the use of software for financial and accounting of Russian production. Recommendations for further action are considered. Forming a policy for the introduction of new software products.

    ??????, добавлен 15.02.2021

  • The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.

    ???????????, добавлен 25.09.2016

  • Finding Boolean functions with maximum algebraic immunity based on univariate polynomial representation. Algebraic techniques in differential cryptanalysis revisited. An efficient rational secret sharing scheme based on the chinese remainder theorem.

    ?????, добавлен 08.03.2014

  • ?????? ?????????? ?????????? ??????????? ??????? ????? ????????????????? ?????????????? ?????????????. ??????????? ????????? ?????? ??????????? ??????? ???? VPN. ??????????? ???????????? VPN–?????? ??? ?????? IP Security. ????? ?????? ?????????? IPsec.

    ??????, добавлен 15.04.2018

  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    ?????, добавлен 08.03.2014

  • ????? ?????????????? ???????????? ???????????? ???????? ??? ????????? ????????????? Avast Free Antivirus, Panda Antivirus, 360 Total Security ? ESET NOD32. ????? ???????????? ??????? ? ????? ?????????????? ???????????? ??? ???????? ????????????.

    ??????, добавлен 28.05.2017

  • ??????? ? ???????? ??????????? ?????? ????????? ????, ????? ????????. ?????? ????????? Kaspersky Internet Security. ?????????????? ??????? ????-?????, ????-???? ? ???????????? ????????. ???????????? ??????? ???????????? Prevx1, ??????? ?????????.

    ???????????? ??????, добавлен 24.12.2012

  • ?????? ?????????? ?? ???????. ??????? ??????????, ????????????? ? ??????? ???????????? ????????. ????????????? ?????? ???????????? ???????? (????????? ???????????, NOD32, Dr. Web, Avira AntiVir, Microsoft Security Essentials), ?? ????????? ?? ?????????.

    ???????? ??????, добавлен 22.04.2014

  • Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.

    ???????????, добавлен 24.01.2017

  • ????????, ??? ??????? ??????????? ??????????? ????????? ??????? - ?????????????? ?????????????? ? ???????????????? ? ????????? ????????. ????????? ???????????? (perfect security) ???????. ??????????? ????? ????????? ???????? ? ?????? ????? ? ????????????.

    ??????, добавлен 17.06.2018

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    ??????, добавлен 20.03.2024

  • Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.

    ???? ??????, добавлен 08.03.2014

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    ????????? ??????, добавлен 13.07.2020

  • ????????? ??????????, ???????????? ??????? WindowsXP. ?????? ? Microsoft Office, Kaspersky Internet Security, Pascal ABC, "1? ???????????", Internet Explorer. ?????????? ??????? "??????". ?????????? ????????? ??? ??????????? ??????? ????? ????????.

    ????? ?? ????????, добавлен 13.03.2015

  • The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.

    ???? ??????, добавлен 08.03.2014

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    ??????, добавлен 25.03.2016

  • The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.

    ??????, добавлен 08.05.2018

  • Comprehensive consideration of the relevance of password use. Analysis of current password statistics, detailed study of methods for hacking accounts. Description of alternative authentication methods and additional steps of multi-factor authentication.

    ??????, добавлен 20.03.2024

  • Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.

    ?????, добавлен 08.03.2014

  • A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.

    ??????, добавлен 22.12.2016

  • The phenomenon of virtual reality, as a tool of achieving interactive behavior in architecture and built environment. Various possibilities for improving the quality of environment and space, both real and existing only within alternative perception.

    ??????, добавлен 30.07.2018

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.