Cryptographic hardware and embedded systems
Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
Подобные документы
Method of continuous pumping of fluids and reagents through the analytical module and detector in the respective volume relations with a fixed speed using an electromagnetic pump. The design parameters and optimum operating conditions of the pump.
??????, добавлен 30.08.2016JavaScript as a prototype-based scripting language programming. JavaScript as a language for embedded software applications access to objects. Use of browsers as a scripting language to make interactive Web pages. Key architectural features JavaScript.
?????, добавлен 14.03.2014Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
??????, добавлен 16.08.2023Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
???????????, добавлен 24.01.2017The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.
????????? ??????, добавлен 31.10.2016A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
??????, добавлен 28.10.2020The study of the problems and solutions of insufficient quantity and quality of documentation that is created for software in recent decades. Create a discussion of current practices documentation to facilitate a detailed discussion in the future.
??????, добавлен 23.02.2016The origins of cryptography. Transpositions, substitutions and secret keys. The Shannon theory of secrecy. The data encryption standard. Application of des: Unix passwords. Conventional cryptographic primitives and the advanced encryption standard.
?????, добавлен 08.03.2014Development of software applications, tools settings of the information system. The connection of additional interfaces and applications, tools to create, configure and manage database tools to generate reports in MS Word, edit them on the server side.
????????? ??????, добавлен 02.05.2015A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.
?????, добавлен 08.03.2014Programming of Intel microprocessors. Studying systems on universal microprocessors and problems of its programming. The scheme and the description of laboratory installation, variants of tasks and order of the laboratory work execution are presented.
???????????? ??????, добавлен 11.10.2014Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
??????, добавлен 23.02.2016The problem of protecting information by transforming it, precluding its reading an outsider. Cryptographic methods of data protection - special encryption, encoding or a conversion. Architecture, devices and addresses applications of cryptography.
?????, добавлен 18.09.2012A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.
??????, добавлен 15.09.2012Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
?????, добавлен 08.03.2014Database and logic abduction method. Classical Logic Programming approach. Soundness and completeness DLA method. Various aspects of analysis of security protocols. Needham-Schroeder protocol. Optimized Otway-Rees protocol. Internet Key Exchange Protocol.
??????? ??????, добавлен 15.09.2012The main stages and features of the access procedure (identification, authentication and authorization) in Microsoft Windows operating systems. Contribute to evil, circumvention and protection of access. Headways of destruction of cyber security.
??????, добавлен 28.05.2023Types of groupware: computer-mediated communication, meeting and decisions support systems, shared applications, artefacts. Implementation issues. Cooperative work involves: participants, artefacts. Email and bulletin boards. Structured message systems.
???????????, добавлен 28.12.2013Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
??????, добавлен 15.09.2020A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
??????, добавлен 15.04.2014Implementing two-party computation efficiently with security against malicious adversaries. Two generic constructions of probabilistic cryptosystems and their applications. Cramer-shoup satisfies a stronger plaintext awareness under a weaker assumption.
?????, добавлен 08.03.2014Characteristics of the SoLIM approach and the specifics of its use through available software platforms. Implementation of digital soil mapping within the SoLIM approach. Theoretical justification and availability of software platforms for SoLIM.
??????????? ??????, добавлен 22.03.2021The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.
??????, добавлен 23.06.2016Overview of software designed to solve engineering problems. Identify the features of Microsoft Office programs, Pascal, AutoCAD, KOMPAS, MATLAB, MATLAB Simulink and MATLAB Plots which are used for graphing, solving equations, functions, matrices.
???????????, добавлен 16.01.2016An overview of machine learning applications for analyzing genome data. Molecular medicine and gene therapy. DNA and RNA are mobile genetic elements. Possible applications of transposons. Cross check software algorithm. Recognition of relocatable items.
????????? ??????, добавлен 10.12.2019