The role of biometric systems in manufacturing alternative to traditional password systems. These technologies prevent
unauthorized access, ensure personnel
Asymptotic secrecy of the information protection by the usage of simple integer splitting method the level of security and provide the ability to control the degree of
protection of
information. So a lemma
APPROACH TO EVALUATING EFFECTIVENESS OF INFORMATION PROTECTION IN CONTROL SYSTEMSMethodological approach to evaluating the effectiveness of
information protection Formalization of the problem of protection against reconnaissance in conflict systems interrelation, agents’
information awareness and system transition
from one state into another is formulated
Rights and interests of children in the information sphere: improvement of legislation protecting children
from information harmful to their health and development" does not currently meet needs
Информационно-правовая защита несовершеннолетних в России и европейских странахThe scientific article reflects the peculiarities of the development of
access to
information Constitutional Protection of Public Figures’ Personal Data on the InternetKomkova, Galina N.,
Basova, Alla V.,
Torosyan, Rima A.,
Комкова, Г.Н.,
Басова, А.В.,
Торосян, Р.А. that there are three
types of offenses in the field of public figures’ personal data
protection in
information Theoretical Model of a Multi-Key Steganography System access apart
from keys that deposite
information we propose to use additional cryptography keys.