Authentication scheme on fractal sets
Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
Подобные документы
Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
статья, добавлен 18.09.2018Особенности стационарных систем охранной сигнализации. Современные интегрированные системы безопасности. Характеристика особенностей датчиков. Составление функциональной схемы охраны помещения. Разработка интеллектуальной системы охранной сигнализации.
курсовая работа, добавлен 25.12.2013A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
книга, добавлен 08.03.2014Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
книга, добавлен 08.03.2014- 106. Векторная графика
Программы векторной графики, их характеристика: Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas. Fractal Design Expression. Принципы построения графических объектов. Векторная графика в интернете.
курсовая работа, добавлен 09.03.2012 Distance learning using spreadsheets. The introduction of Excel-documents in electronic educational resources. Access to information resources of various types using the "cloud" services. Design and implementation of the "ExcelReader" software module.
статья, добавлен 05.04.2019Analytical modeling of typical documents about education, for integration in a computerized learning environment KoHaC. Scheme of the analytical modeling training documentation. The components of the analytical apparatus of a computerized training system.
статья, добавлен 14.09.2016Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
статья, добавлен 25.12.2016Управление доступом в MS SQL Server. Сервера и базы данных в MS SQL Server. Особенности процесса шифрования данных. Угрозы и уязвимости, резервное копирование и восстановление баз данных SQL Server. Служба хранилищ больших двоичных объектов Windows Azure.
реферат, добавлен 07.11.2021Creation of an automated system for collecting information for the incoherent scattering radar. Characteristics of the composition of parameters that affect the control effect. Requirements for the parameters of the transmitting and receiving equipment.
статья, добавлен 30.10.2016The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
статья, добавлен 28.09.2016Характеристика инструмента Microsoft SQL Server 6.0. Активное администрирование и объектный интерфейс SQL Server 6.0. Разработка реляционной системы управления базами данных. Три типа специальных пользователей, контролирующих и управляющих SQL Server.
курсовая работа, добавлен 13.09.2011The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.
статья, добавлен 23.02.2016A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
статья, добавлен 15.09.2012Analysis of information modeling processes and tasks, and options for improvement using extensive programming capabilities. Characteristics of the main methods of automating and speeding up the design process using programming and their properties.
статья, добавлен 30.08.2022Общий обзор программ векторной графики. Принципы работы Corel Draw 8-9, Adobe Illustrator 6, Micrografx Designer 7, Macromedia FreeHand 7, Corel Xara 1.5, Canvas 5, Fractal Design Expression. Сравнения характеристик программ. Применение векторной графики.
курсовая работа, добавлен 10.03.2010Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.
дипломная работа, добавлен 13.07.2020Способи створення активного сервера Web на базі Microsoft Internet Information Server. Загальні відомості про технології ASP. Принципи та порядок функціонування, корисні якості технології, конструкції структурного програмування. Історія технологій ASP.
реферат, добавлен 04.11.2015Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.
дипломная работа, добавлен 01.12.2019Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.
статья, добавлен 10.08.2018Обзор стабильного приложения для удалённого подключения к личному компьютеру Remote Desktop, терминального решения на Linux - LTSP. Компоненты, из которых состоит сервер. Сравнение приложений LTSP и Remote Desktop. Плюсы и минусы терминальных решений.
курсовая работа, добавлен 16.05.2017The article pays attention to the requirements for information support for controlling the operational activities of trade enterprises: significance, completeness, reliability, timeliness, comprehensibility, relevance, comparability and efficiency.
статья, добавлен 14.09.2022Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.
учебное пособие, добавлен 08.03.2014