Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 21411

Страница 2 из 2142

On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys cryptographic primitives, symmetric and asymmetric, as well as cryptographic protocols using short (low

Extension of the hierarchy for k-OBDDs of small width of representation of the k-OBDD computation process as an "automata-communication protocol" computation process. Our

Анализ использования сетевого протокола MQTT во встраиваемых системах, each containing a dedicated computer called a server. Various methods of information transfer are used

An automated protocol for modelling peptide substrates to proteases computational protocol to reproduce the modelling and dynamic analysis of the protease–peptide complexes. © 2020

Modelica-based TCP simulation a hybrid (continuous-discrete) approach. For computer implementation of the model the physical

The Heterogeneous Gateways in the Industrial Internet of Things industrial protocols, is raised. To solve this problem, authors are created the architecture of software

Using Mininet to reproduce research on network protocols and algorithms in the research process. In the field of computer networks, Mininet can be used to reproduce the results

Implementation of an open source communication protocol (MAVLink) between a flight controller and an on-board computerMAVLink is a very lightweight messaging protocol for communicating with drones (and between onboard

Extension of the hierarchy for k-OBDDs of small width of representation of the k-OBDD computation process as an "automata-communication protocol" computation process. Our

RSA cryptosystem for dedekind rings© 2016, Pleiades Publishing, Ltd.May soon be invented quantum computer and some known cryptosystems

Страница 2 из 2142