Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Larissa V. Cherckesova"'
Publikováno v:
Mathematics, Vol 10, Iss 15, p 2769 (2022)
Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable. This article is aiming a
Externí odkaz:
https://doaj.org/article/d6bc714129ee46daad2846a7fccf3f81
Publikováno v:
Electronics; Volume 11; Issue 23; Pages: 3954
Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific di
Autor:
Kirill S. Lemeshko, Larissa V. Cherckesova, Denis A. Korochentsev, Olga Safaryan, Alexey N. Beskopylny
Publikováno v:
Electronics
Volume 10
Issue 21
Electronics, Vol 10, Iss 2659, p 2659 (2021)
Volume 10
Issue 21
Electronics, Vol 10, Iss 2659, p 2659 (2021)
Blockchain is one of the leading data transfer technologies that eliminate the need for centralized management through consensus algorithms. This article describes the consensus algorithms, their benefits, and their applications within a micropayment
Development of an Adaptive Fuzzy Algorithm for Identifying Technical Channels of Information Leakage
Autor:
Nikita G. Lyashenko, Dennis A. Korochentsev, Alexander A. Zelensky, Olga Safaryan, Pavel Razumov, Veronica Kravchenko, Irina A. Pilipenko, Vitaly M. Porksheyan, Nikolay Boldyrikhin, Larissa V. Cherckesova
Publikováno v:
Proceedings of Sixth International Congress on Information and Communication Technology ISBN: 9789811617805
ICICT (3)
ICICT (3)
This article is devoted to the problem of identifying technical channels of information leakage using a decision support subsystem and a neural network. Research is aimed at identifying technical channels of information leakage. The article describes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::14eaa8d3660ac1b87dff2045b7608b93
https://doi.org/10.1007/978-981-16-1781-2_28
https://doi.org/10.1007/978-981-16-1781-2_28
Autor:
Vladislav E. Chumakov, Olga Safaryan, Larissa V. Cherckesova, Ivan A. Smirnov, Alexandr I. Gavlicky, Denis A. Korochentsev
Publikováno v:
EWDTS
In the present paper the exponentiation algorithm “To Center and Back” based on the idea of the additive chains exponentiation method is developed. The created by authors algorithm allows to reduce the calculation time and to improve the performa
Publikováno v:
2021 Radiation and Scattering of Electromagnetic Waves (RSEMW).
The article analyzes the possibilities of increasing the secrecy of radiotechnical information system by reducing the operating time for radiation. The obtained research results confirm the possibility of reducing the time of active observation (up t
Publikováno v:
2021 International Seminar on Electron Devices Design and Production (SED).
The broadband microwave filter based on prototype with an original circuit design and topological solution was developed. The synthesizing procedure for microwave filter with additional zero transmission is proposed, based on composite transmission l
Autor:
Nikita I. Chesnokov, Olga Safaryan, Denis A. Korochentsev, Irina A. Pilipenko, Larissa V. Cherckesova, Vladislav E. Chumakov
Publikováno v:
EWDTS
the purpose of this paper is investigation of existing approaches to formation of electronic digital signatures, as well as the possibility of software developing for electronic signature generation at electronic document circulation of institution.
Autor:
Boris A. Akishin, Elena Pinevich, Evgenia V. Roshchina, Larissa V. Cherckesova, Olga Safaryan, Andrey G. Lobodenko
Publikováno v:
EWDTS
the report discusses issues related to the MS SQL database administration, as well as the basic methods for implementing backup and encryption. It is proposed to create an application that backs up databases in the MS SQL Server DBMS using the GOST R
Autor:
Ivan A. Smirnov, Artem M. Romanov, Olga Safaryan, Pavel Razumov, Denis A. Korochentsev, Nickolay V. Boldyrikhin, Larissa V. Cherckesova, Vitaliy M. Porksheyan
Publikováno v:
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of