Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Andrey G. Lobodenko"'
Autor:
Boris A. Akishin, Elena Pinevich, Evgenia V. Roshchina, Larissa V. Cherckesova, Olga Safaryan, Andrey G. Lobodenko
Publikováno v:
EWDTS
the report discusses issues related to the MS SQL database administration, as well as the basic methods for implementing backup and encryption. It is proposed to create an application that backs up databases in the MS SQL Server DBMS using the GOST R
Autor:
Olga Safaryan, Vitaliy M. Porksheyan, Ivan A. Sakharov, Sergey A. Morozov, Andrey G. Lobodenko, Victor V. Zhilin, Irina I. Drozdova, Larissa V. Cherckesova
Publikováno v:
EWDTS
In this report, the known models of safety were considered. The general description of algorithm of three-dimensional model of safety of computer systems was provided. The relations arising between subjects of model of safety were described, and vari
Autor:
Yelena Revyakina, Andrey G. Lobodenko, Ivan A. Smirnov, Nickolay V. Boldyrikhin, Vitaliy M. Porksheyan, Olga Safaryan, Pavel Razumov, Larissa V. Cherckesova
Publikováno v:
EWDTS
Investigations of cryptographic algorithms for today are very actually in connection with cybernetic attacks threat and necessity of information protection at the enterprises of various levels including the strategic appointment. The project implemen
Autor:
Irina Reshetnikova, Nikita Ye. Myzdrikov, Vasiliy I. Yukhnov, Olga Safaryan, Vitaliy M. Porksheyan, Andrey G. Lobodenko, Larissa V. Cherckesova, Ivan Ye. Semeonov
Publikováno v:
EWDTS
This article will consider the probability test of Solovey-Strassen, to determine the simplicity of the number and its possible modifications. This test allows for the shortest possible time to determine whether the number is prime or not. C# program
Autor:
Andrey G. Lobodenko, Vitaliy M. Porksheyan, Alexander I. Zhukov, Sergey A. Klyokta, Nikita I. Chesnokov, Irina A. Pilipenko, Larissa V. Cherckesova, Olga Safaryan
Publikováno v:
EWDTS
In the framework of this article, general information on the block cipher TEA was reviewed, including the history of its creation, advantages and disadvantages, as well as details of the process of encryption and decryption. Three main vulnerabilitie