Материалов:
1 082 141

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 70252

Страница 5 из 7026

Responsibility as a System Quality of the Person and its Intrinsic Attributes of responsibility and its intrinsic attributes, based on the model of the multidimensional-functional organization

Semantic Notation of Access Control Technology based on eID Identification, FIDO2-Authentication and Attribute-Based Authorization in Digital Environment electronic documents, FIDO2 authentication and attribute-based access control. Anonymous credentials, which

Bearing Remaining Useful Life Prediction Based on NAP-HSMM and safety of rolling bearing. Nuisance attribute projection (NAP) is used in this paper to eliminate

Контроль хаотичности выходных последовательностей алгоритма шифрования на основе динамического хаоса динамического хаоса и алгоритмов AES (Advanced Encryption Standard), DES (Data Encryption Standard

Атрибуты целей образовательной организации on foreign publications on the subject. It is stressed that the choice of purposes should be based

Asymmetric vs. symmetric encryption: a comparative analysis of data security methodsThe information about the two encryption methods, symmetric and asymmetric, is presented

Репрезентация атрибутов современной войны во французском медиадискурсе: специфика номинации. The corresponding attributes are represented by specific language units. Based on the analysis, it was concluded

Secure Reversible Data Hiding in Images Based on Linear Prediction and Bit-Plane Slicing the main concerns in any RDH scheme. As steganographic encryption using linear prediction over bit

Method for Author Attribution Using Word Embeddings. The dataset used is the PAN @ CLEF 2019 shared task on Cross-domain Authorship Attribution

Contribution estimation of dominant partial waves into phase of multipath signal used for encryption key generationRandomness of fast fading multipath channels has been used for encryption keys generation for a

Страница 5 из 7026