Протоколы систем биометрической идентификации of
protocols of estimation and performance tests of the biometrical systems, and
general metrics
Анализ использования сетевого протокола MQTT во встраиваемых системахЖитковский, Е. А.,
Ельников, Е. П.,
Тонко, И. А.,
Zhitkovsky, E. A.,
Elnikov, E. P.,
Tonko, I. A. to connect to the server. An important criterion in this is the choice of a network data transfer
protocol Protective properties of synthetic peptides of outer meningococcal membraneProtective properties of
synthetic peptides of outer meningococcal membrane
Мифепристон и мизопростол: вместе или отдельно?Medical abortion with the use of antiprogestins and
synthetic analogues of prostaglandins
Optimization of Automatic Synthesis of Benzoxazole Phosphoramidate OligonucleotidesBaranoskaya, Elizaveta E.,
Poddubnyakova, Sofia A.,
Lomzov, Alexander A.,
Vasilyeva, Svetlana V.,
Барановская, Елизавета Е.,
Поддубнякова, Софья А.,
Ломзов, Александр А.,
Васильева, Светлана В. by a Staudinger reaction with an azide modifier. In this work, optimization of
the
synthetic protocol Attacking Quantum Hashing. Protocols and Their Cryptanalysis not automatically mean that
protocols based on this primitive are secure. We propose
protocols based on quantum hash