Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 21819

Страница 3 из 2182

Multi-party secure communication using blockchain over 5G on the Pedersen commitment and the Schnorr protocol, this study comes up with a secure multi-party computing

NETWORK SLICING: A SUBJECT FIELD OVERVIEWThe existing literature explores the numerous benefits of network slicing for modern cellular

Атака с переустановкой ключа (krack)In the era of IT great attention is paid to data security and confidentiality on the Internet

Controlling data security in social networks, and social interaction. With over 4.5 billion active users globally, the security of personal data shared

Theoretical Justification and Practice of Risk Management for Economic Security of the Dealer Networks of Carmakers management processes. Economic safety is no exception. Economic security is closely related to the control

Theoretical Justification and Practice of Risk Management for Economic Security of the Dealer Networks of CarmakersTheoretical Justification and Practice of Risk Management for Economic Security of the Dealer

Unique Degradation of Flash Memory as an Identifier of ICT Device to enable blocking of these devices in the network worldwide. Motivated by this challenge, we elaborate

ИНТЕЛЛЕКТУАЛЬНЫЙ АНАЛИЗ ДАННЫХ СИСТЕМ БЕЗОПАСНОСТИ ФИНАНСОВЫХ ОРГАНИЗАЦИЙ security events in real time, emanating from network devices, information security tools, information

Комплексная оценка защищенности ведомственных информационных сетей возможности реализации угроз. The methods of comprehensive security estimation of departmental networks

Security challenges and cyber forensic ecosystem in IoT driven BYOD environment of the simulation was performed where BYOD endpoint was securely onboarded using a corporate wireless network with a

Страница 3 из 2182