Cryptography for Internet and Database Applications
Bits and Bytes. Complementation or Bitwise NOT. Special Operations and Abbreviations. Booleans and BitFields. Conversion of Integral Types to Byte Arrays. Symmetric Block Ciphers. Rijndael and the Advanced Encryption Standard. Public Key Cryptography.
Подобные документы
Implementation of cloud storage on the Internet. New types of Internet security and ways to prevent hacker attacks. Methods of legal regulation of information security practices. Application of the methods of active defense. Combating cybercrime.
??????, добавлен 18.02.2015- 77. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
??????????? ??????, добавлен 14.05.2017 The security challenges of ubiquitous computing. The study side channel attack methodology. Hardware to solve sparse systems of linear equations over. Symmetric ciphers: side channel attacks and countermeasures. Attacks on asymmetric cryptosystems.
???? ??????, добавлен 08.03.2014?????????, ??????????? ????????? ? ???????? Internet. ??????????? ????????????????? ???????????? ?????. ?????? ??????????????? ????? Internet. ????????????? ?????? Internet ? ???????? ?????????. ????? ????????? ?????????????. ?????????? ??????? Internet.
???????? ??????, добавлен 27.04.2013One of the important functions of science is the organization of information storage for searching some data. The basic principle of the database and Relational Database Management System. The SQL Language, Web-page, Macros and Integrity Constraints.
???????????, добавлен 07.03.2018Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
???? ??????, добавлен 08.03.2014Clustering algorithms for very large database used in image processing and video. Search for groups (classes, clusters, segments) of the objects surveyed in the analyzed information arrays. Multidimensional vectors forming a traditional data table.
??????, добавлен 14.01.2017?????? ???????????? ??????????? ???????? ??????? ????? ????? ? ??????????? ?????? ????? Rijndael ?? ???????????????? ??????????? ? ???????????? ??????????. ????? ???????????? ??????????? Q-S-?????? ? ?????????????? ??????????. ????? ???????????? S-??????.
??????, добавлен 01.03.2017The basic tendencies of development of mobile marketing in Ukraine are considered. The development of Internet marketing. The advantages of hybrid mobile applications, the essence of their use, as one of the modern means of communication for business.
??????, добавлен 10.10.2018Decoding techniques for fast correlation attacks. Description of cryptographic protection. Enforcement mechanism and decision function. Elgamal digital signature scheme. Conceptual model of an authorization architecture. Binary Euclidean algorithm.
?????, добавлен 08.03.2014- 86. ???????? BDE
???????? Delphi ??? ?????? ? ?????? ?????? ?? ?????????????? ???? - ?????????? ??? ?????? Borland Database Engine. ???????????????? ???????? ??? ?????? Borland - dBase ? Database Desktop. ????????? ?????????? ??????? ????????? BDE ? ???????? Paradox.
???????, добавлен 21.06.2013 A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
?????, добавлен 08.03.2014??????????? ????? ?????????? ???????? ?????? ? ??????. ????????? ?????? Constant Block, Fcn Block, Mux Block ? ??. ??????????? ?????????? ???????????? ???? ? ???? ? ?????????. ????????????? ??????? ???????????, ??????????? ? ????????????? ??????????.
???????? ??????, добавлен 08.04.2016Grain and Trivium - hardware oriented stream ciphers. The linear sequential circuit approximation method as an effective method for the linear model determination. Outline of the analyzed ciphers. Description of Trivium. Correlation coefficient analysis.
??????, добавлен 15.09.2012- 90. ???? Internet
Internet - ?????????? ???????????? ????, ?? ???????????????, ???????????, ??????????? ??????. ??????? ? ??????????? Internet. ????????? ??????????, ????? ??????????. ????????????? ?????????????? Internet ??? ????????????? ?????. ?????? WORLD WIBE WEB.
???????? ??????, добавлен 13.01.2015 - 91. Internet
???????? ? ???? ????????????????. Internet ??? ?????????? ???????????? ?????, ???????????? ???????? ??????????? ?? ????? ????. ??????? ? ???? Internet. DNS - ??????? ???????? ????. ????? ??????????? ????? ? Internet. ??????? ? ???????? IP-??????.
???????????, добавлен 28.02.2012 ????????? ????????? ?????????? ? ???? ????????????. ??????? ?????????. ???????????? ??????????. ???????? ????????? ????????????? ??????. ????????? ?????????? ?? ????????? Data Encryption Standard. ??????????? ????? ????????? ? ????????? ???????.
???????????, добавлен 20.05.2013?????????? ?????????????? ????. ??? ????? Internet. ??????? ??????? Internet. ????????: ????????????? ?????????????? Netscape Navigator ? Microsoft Internet Explorer. ????????? ???????. ????????? ??????. ????????????? ????? ????????? ??????.
???????, добавлен 28.10.2008????????? ?????????? ??????? ?????? ??? ?????? ??????. ?????????? ?????????????????? ???????????? ???????????, ?????????? ????????? ? ??????????? ????? ?????????? DES. ???????? ?????????? ?????, ????????? ??????? ?????????? ????????? ??? ????????????.
??????????? ??????, добавлен 26.01.2013The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.
??????, добавлен 06.07.2023??????? ???????? ???-????????. ?????????????? Web-??????? ??? ???????????? ???????????. ?????? Java Standard Edition. ????????? Java Standard Edition 6. ?????????? ?????. ?????? ? ?????? ??????. ?????? ? ???????????. ???????????? ?????????, ????????????.
??????????? ??????, добавлен 11.03.2019- 97. ??? ?? internet
??? ????? Internet, ??? ???????. ???? ? ??????????? ???????, ????????? ???? Internet. ????????? ???????? ???????, ????? ???????? ????. ?????? ? ???????????? ???????????? ???????????. ???????? ?????? ????? ? ?????? ??????????. ?????? ???? Internet.
???????? ??????, добавлен 13.09.2011 Tools for Security and Insecurity. Unbiasing a Biased Coin. Combining Weak Sources of Entropy. Pseudorandom Number Generators. Random Permutation Generation. Sound Approach to Random Number Generation and Use. Computationally Secure Information Stealing.
?????, добавлен 08.03.2014?????????????? ???-?????? ??? ?????????, ? ??????? ????? ?????????? ?????? ????????? ????? ????????. ?????? ????????? ???????????? ???-??????. ???????? ???????????? Java Standard Edition. ?????? ???????? ?????????????????? ? Java Standard Edition 8.
??????, добавлен 24.02.2019Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
?????, добавлен 08.03.2014