The use of electronic technologies in medicine about the patient, which is strictly confidential and which can be stolen by
unauthorized access using
A model of multi-key steganographic system
of confidentiality of transmitted
information, as well as
protecting of content
from unauthorized use
are expanded
Анализ результатов опытной эксплуатации комплекса охраны протяженных периметров ВМ 8018Утин, Л. Л.,
Павловский, А. В.,
Ольховик, А. А.,
Макатерчик, А. В.,
Utin, L. L.,
Pavlovsky, A. V.,
Olkhovik, A. A.,
Makatserchyk, A. V.
to their increasing efficiency of
protection from unauthorized access by intruders to
protected facilities. The high
MONITORING OF LAND PLOTS LOCATED IN THE VICINITY OF AIRFIELDS). The tasks and the monitoring procedure, including the analysis and processing of the received
information System for protecting voice information from leakage through acoustic channelsSystem for
protecting voice
information from leakage through acoustic channels