Оценка возможности несанкционированного доступа к пассивной оптической сети. Выполнена оценка возможности такой атаки.The possibility of
unauthorized access to
information transmitted
The mathematical model of fiber-optic link protected from unauthorized accessThe mathematical model of fiber-optic link
protected from unauthorized access The quantitative comparison between the integer splitting cipher and the traditional gamma cipher to the
unauthorized access to the
information transmission channel, were proven in this article; the first lemma
NoSQL databases. technology for protecting data from unauthorized accessNoSQL databases. technology for
protecting data
from unauthorized access Атаки на пассивные оптические сети со стороны абонентского окончанияСергеев, Н. Н.,
Урядов, В. Н.,
Шишпорёнок, С. С.,
Sergeev, N. N.,
Uryadov, V. N.,
Sheshporenok, S. S. of
protection from attacks by use of scheme of WDM-PON was proposed.