Users data protection on the basis of a web application for status monitoring of computer services and design tools, which, in combination with the implemented
encryption and hashing tools, can provide
Asymmetric vs. symmetric encryption: a comparative analysis of data security methodsThe information about the two
encryption methods, symmetric and asymmetric, is presented
Secure key distribution based on meteor burst communicationsThe paper discusses possibility of secure
encryption keys distribution
based on stochastic
Распределение ключей в системах Интернета вещейIn this paper key distribution protocol for attribute-
based encryption schemes was described
Оценка эффективности распараллеливания криптоалгоритмов of the
encryption algorithms for their
hardware implementation using parallel processing of algorithms
Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing the main concerns in any RDH scheme. As steganographic
encryption using linear prediction over bit
Simulation of Spatial Correlation of Polarization Characteristics for Meteor Radio Reflections correlation curves are crucial for assessing secrecy of the shared
encryption keys generated from