Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 65359

Страница 3 из 6536

Users data protection on the basis of a web application for status monitoring of computer services and design tools, which, in combination with the implemented encryption and hashing tools, can provide

Биометрическая аутентификация в информационных технологияхfuzzy identity-based encryption

Asymmetric vs. symmetric encryption: a comparative analysis of data security methodsThe information about the two encryption methods, symmetric and asymmetric, is presented

Secure key distribution based on meteor burst communicationsThe paper discusses possibility of secure encryption keys distribution based on stochastic

Программно-аппаратный комплекс защиты телеметрии и телеуправления cпециализированного беспилотного летательного аппарата transmitted information is required the core of this protocol is an encryption algorithm, based on which

Распределение ключей в системах Интернета вещейIn this paper key distribution protocol for attribute-based encryption schemes was described

Контроль хаотичности выходных последовательностей алгоритма шифрования на основе динамического хаоса динамического хаоса и алгоритмов AES (Advanced Encryption Standard), DES (Data Encryption Standard

Оценка эффективности распараллеливания криптоалгоритмов of the encryption algorithms for their hardware implementation using parallel processing of algorithms

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing the main concerns in any RDH scheme. As steganographic encryption using linear prediction over bit

Simulation of Spatial Correlation of Polarization Characteristics for Meteor Radio Reflections correlation curves are crucial for assessing secrecy of the shared encryption keys generated from

Страница 3 из 6536