Материалов:
1 005 012

Репозиториев:
30

Авторов:
761 409

По вашему запросу найдено документов: 338244

Страница 1 из 33825

PROBABILISTIC ANALYSIS OF THE SECRECY OF INFORMATION PROTECTION BY USING SPLITTING METHOD hacker's point of view with unauthorized access to the transmission channel.

Оценка возможности несанкционированного доступа к пассивной оптической сети. Выполнена оценка возможности такой атаки.The possibility of unauthorized access to information transmitted

Some results of the probabilistic analysis of the secrecy of information protection by numeric symbol splitting metho protection by the method of integer splitting from a hacker’s point of view with unauthorized access

The mathematical model of fiber-optic link protected from unauthorized accessThe mathematical model of fiber-optic link protected from unauthorized access

The quantitative comparison between the integer splitting cipher and the traditional gamma cipher to the unauthorized access to the information transmission channel, were proven in this article; the first lemma

NoSQL databases. technology for protecting data from unauthorized accessNoSQL databases. technology for protecting data from unauthorized access

The Modeling Procedure of Illegal Entry into the Information System Based on the Logical Function of Disseminating Information on the Paths within the System, the numerical estimates for the probabilities of unauthorized access through these channels to the IMS are got

Software-hardware data protection from unauthorized accessSoftware-hardware data protection from unauthorized access

Метод оценки эффективности иерархической системы информационной и инженерно-технической защиты объектов от несанкционированного доступа of an estimation of effectiveness of hierarchical system of informational and technical protection

Атаки на пассивные оптические сети со стороны абонентского окончания of protection from attacks by use of scheme of WDM-PON was proposed.

Страница 1 из 33825