Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Safaryan Olga"'
Publikováno v:
E3S Web of Conferences, Vol 389, p 07020 (2023)
This article is devoted to the implementation of a steganographic software tool for hiding infor-mation in MPEG video files. The method of least significant bits was used to hide the data, and error-correcting coding with binary cyclic codes was used
Externí odkaz:
https://doaj.org/article/328c780517314fa98d0307a7d280a5c2
Publikováno v:
E3S Web of Conferences, Vol 389, p 09007 (2023)
The article is devoted to the issues of humanization and humanitarization of education in a technical university. The importance of humanization of disciplines for the training of an engineers in demand by modern society is emphasized. The main types
Externí odkaz:
https://doaj.org/article/a40e3e207fe748ab9a8570b4ec17911b
Publikováno v:
E3S Web of Conferences, Vol 273, p 08049 (2021)
The article describes the development of modified encryption protocol based on the El–Gamal cryptoalgorithm. The development of an import–substituting software package for secure file transfer, based on the modified protocol of El–Gamal was mad
Externí odkaz:
https://doaj.org/article/898ac34a4556474b9bec8bc5082a5fc4
Publikováno v:
E3S Web of Conferences, Vol 273, p 08047 (2021)
The article describes the preparation of the document approval system before the start of development, the project architecture, and testing. The work processes are demonstrated, registration and authorization in the system, creation of the document
Externí odkaz:
https://doaj.org/article/93a1d66cbdf549c0b7d86252ffa7c624
Autor:
Polozhiy Gleb, Tosunova Anna, Cherckesova Larisa, Safaryan Olga, Pinevich Elena, Reshetnikova Irina
Publikováno v:
E3S Web of Conferences, Vol 273, p 08045 (2021)
The article is devoted to the overview of encryption protocols using for instant messaging systems – messengers, and to the development of system, that excludes the considered security flaws. Analysis of using security model development is carried
Externí odkaz:
https://doaj.org/article/7e3db86d64ce40d79f68c5f7d4b33cc1
Publikováno v:
E3S Web of Conferences, Vol 273, p 08048 (2021)
The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor. Software development, project architecture, testing and other creat
Externí odkaz:
https://doaj.org/article/252653a62a884ff684147d6687bca34e
Publikováno v:
E3S Web of Conferences, Vol 273, p 08046 (2021)
This article discusses the main age-related features of the Internet use by adolescents and children. Today more and more computers are connected to the Internet. At the same time, connection via high-speed channels is becoming more common, both at w
Externí odkaz:
https://doaj.org/article/fd51f335f2fc466ba18bd7740cf7231a
Autor:
Pinevich Elena, Safaryan Olga
Publikováno v:
E3S Web of Conferences, Vol 210, p 18034 (2020)
This article is devoted to increasing students ' motivation to learn by means of internal settings set by the teacher to himself, aimed at establishing a common frequency with students. Along with numerous existing methods, the internal energy of the
Externí odkaz:
https://doaj.org/article/750e7967c7184556a72c3a4008f58f58
Autor:
Revyakina Yelena, Cherckesova Larissa, Safaryan Olga, Korochentsev Denis, Boldyrikhin Nikolay, Ivanov Yuri
Publikováno v:
E3S Web of Conferences, Vol 224, p 01040 (2020)
The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches were determined whether XSS–attack can be fulfilled successfully, and vulnerability detec
Externí odkaz:
https://doaj.org/article/71b982c1ae9e4b3ca7e208b35a6a2714
Autor:
Cherckesova Larissa, Safaryan Olga, Razumov Pavel, Pilipenko Irina, Ivanov Yuriy, Smirnov Ivan
Publikováno v:
E3S Web of Conferences, Vol 224, p 01016 (2020)
This report discusses Shor’s quantum factorization algorithm and ρ–Pollard’s factorization algorithm. Shor’s quantum factorization algorithm consists of classical and quantum parts. In the classical part, it is proposed to use Euclidean algo
Externí odkaz:
https://doaj.org/article/8e7e6af53bf04f6d9b5a294ce997bf8e