Cryptographic hardware and embedded systems
Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.
Подобные документы
Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012Development of smart contracts based on business rules using natural language processing as an object of research. Development of software components for decentralized systems by building smart contracts from business rules written in natural language.
статья, добавлен 02.10.2024Methodic of programming and ways of using of object oriented programming software Microsoft Excel Visual Basic for Applications for laboratory workshops of students in studies of computer modeling courses. Consequences for numerical simulation.
статья, добавлен 01.10.2014History of game technology, from simple pixel games to modern digital. The development of games and software video games from the point of view of the programmer. Experts participating in the development of games. Classification types of popular games.
курсовая работа, добавлен 07.03.2016Description of martial law, compliance conditions. Analysis of regulatory legal acts and judicial practice in the field of information protection under martial law. Features of ensuring information security in Ukraine as a direction of state policy.
статья, добавлен 08.08.2021Design and research of mathematical model for information security system in computer network. Science intensive technology. Modeling of security and risk assessment in information and communication system. Information and computer network technologies.
статья, добавлен 27.05.2021Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.
презентация, добавлен 28.12.2013The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.
статья, добавлен 22.03.2016Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
курс лекций, добавлен 08.03.2014Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.
статья, добавлен 16.08.2022- 86. Computer-aided software engineering - средство Designer/2000 + Developer/2000 и локальные средства
Структура и функции семейства методологий и поддерживающих их программных продуктов. Проектирование, полностью охватывающее все этапы жизненного цикла информационных систем. Локальные средства как ERwin, S-Designor, Computer-aided software engineering.
дипломная работа, добавлен 19.12.2016 The concept of cloud computing. Types of clouds. Advantages and disadvantages of using the network technology. Examining the main parts of the computing system. Studying the protection problems of information security in corporate and public systems.
реферат, добавлен 20.03.2016Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.
статья, добавлен 21.12.2021- 90. Modern trends of cybercrime in the context of economic security, social and humanitarian aspects
The of information technologies were identified, the results of the poll of the respondents on the subject of cybercrime were demonstrated, the ways of combating cybercrime in the of strengthening information and security at the macro-level were proposed.
статья, добавлен 24.10.2018 - 91. Providing access to information systems of higher education in the case of loss of key information
Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.
статья, добавлен 06.05.2018 Система автоматического распределения клиентов по степени их важности для организации. Построение детального сценария деятельности отдела по работе с клиентами. Моделирование computer-aided software engineering средств построения информационной системы.
дипломная работа, добавлен 18.05.2017Features and functions widget bits. Link to the base program. The structure of the appearance, inclusion of the words: verbs, adjectives, nouns. Software tools for application development, identifying a user. A inactive variants of dynamic interaction.
лекция, добавлен 28.12.2013Choice relationship database system, a cloud platform and a software platform for implementing and deploying the relational database system, resource and service agents; software module market risk. User interface for outputting the received information.
курсовая работа, добавлен 12.08.2018- 95. Database
Characteristics and purpose of computer databases. Database features for web e-Commerce site. Application storage archive them to external sources. The process of loading and managing data. To determine the basis for access to online registration systems.
контрольная работа, добавлен 14.05.2017 The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
статья, добавлен 01.11.2021The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
книга, добавлен 08.03.2014This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
книга, добавлен 08.03.2014- 99. MultiNeuron - Neural Networks Simulator For Medical, Physiological, and Psychological Applications
The neural software in medicine to investigate and diagnose immune deficiencies; diagnose and study allergic and pseudoallergic reactions; forecast emergence or aggravation of stagnant cardiac insufficiency in patients with cardiac rhythm disorders.
статья, добавлен 08.02.2013 Investigation of polygonal meshes to represent objects in systems of computer-aided design and computer graphics. Use the method of the voting tensor to isolate in the geometric structures the sparsities, irregularities and possible sources of noise.
статья, добавлен 28.09.2016