Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Elena Revyakina"'
Publikováno v:
Oxford Review of Education. :1-17
Publikováno v:
Electronics; Volume 11; Issue 23; Pages: 3954
Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific di
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783031110573
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c2fe3fc97ab86f92104aa4068ed7cb3
https://doi.org/10.1007/978-3-031-11058-0_171
https://doi.org/10.1007/978-3-031-11058-0_171
Autor:
Elena Revyakina, Conor Galvin
Publikováno v:
The Palgrave Handbook of Teacher Education Research ISBN: 9783030595333
The Palgrave Handbook of Teacher Education Research ISBN: 9783031161926
The Palgrave Handbook of Teacher Education Research ISBN: 9783031161926
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::abb56862ad4d41f138a35f21337e2762
https://doi.org/10.1007/978-3-030-59533-3_52-1
https://doi.org/10.1007/978-3-030-59533-3_52-1
Publikováno v:
E3S Web of Conferences. 389:07013
This work is devoted to the development of a modification of the post-quantum public-key cryptosystem NTRUEncrypt. Given that two main requirements for modern cryptographic algorithms are resistance to attacks (including quantum attacks) and performa
Autor:
Elena Revyakina
Publikováno v:
E3S Web of Conferences. 389:07017
The article describes the process of developing a secure video chat based on the WebRTC standard for establishing a connection and exchanging information between end users during a video conference. The analysis of a variety of technologies when crea
Autor:
Alexander Zelensky, Larisa Cherkesova, Elena Revyakina, Nikolay Boldyrikhin, Elena Klimova, Irina Yengibaryan
Publikováno v:
E3S Web of Conferences. 371:01057
This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee communication and detecting malicious messages using artificial neural network analysis and ful
Publikováno v:
E3S Web of Conferences. 371:01056
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and
Publikováno v:
E3S Web of Conferences. 389:07020
This article is devoted to the implementation of a steganographic software tool for hiding infor-mation in MPEG video files. The method of least significant bits was used to hide the data, and error-correcting coding with binary cyclic codes was used
Autor:
Elena Revyakina
Publikováno v:
Teacher Education in Russia ISBN: 9780429325281
Teacher Education in Russia
Teacher Education in Russia
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1271dd6d059b82a1bda26c6fb0ac67b
https://doi.org/10.4324/9780429325281-9
https://doi.org/10.4324/9780429325281-9