Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 4063

Страница 1 из 407

The quantitative comparison between the integer splitting cipher and the traditional gamma cipher is related to the probabilistic analysis of unauthorized restoration of the plaintext based on the gamma

Comparison between integer splitting cipher and traditional substitution ciphers, based on modular arithmetic and semantic restoration of the plaintext from the point view of an unauthorized user. Furthermore

LEGAL ISSUES OF COMBATING UNAUTHORIZED DUMPS: CASE-STUDY OF THE KOSINO-UKHTOMSKY DISTRICT OF MOSCOWUnauthorized dumps of production and consumption waste pose a particular threat to the environment

The mathematical model of fiber-optic link protected from unauthorized accessThe mathematical model of fiber-optic link protected from unauthorized access

Правовое регулирование самовольного строительства в Республике БеларусьThe article deals with the problem of unauthorized construction in the Republic of Belarus

Some Recommendations for Improving Security of the Cipher with Small Key Against Brute Force Attack significantly increase the complexity of the plaintext recovery by this method for attacker. The effectiveness

Проблема правового регулирования приобретения права собственности на объекты самовольного строительства в тюменской области и пути ее решенияThe problem of legal regulation of acquisition of title of unauthorized property building in Tyumen

PROBABILISTIC ANALYSIS OF THE SECRECY OF INFORMATION PROTECTION BY USING SPLITTING METHOD hacker's point of view with unauthorized access to the transmission channel.

Правовое регулирование самовольного строительства в Республике Беларусь with the problem of unauthorized construction in the Republic of Belarus. The author describes the legal norms

NoSQL databases. technology for protecting data from unauthorized accessNoSQL databases. technology for protecting data from unauthorized access

Страница 1 из 407