Showing
1 - 8
results of
8
for search '
Vаsylenko, V. S.
'
Skip to content
VuFind
Your Account
Log Out
Login
Language
English
Deutsch
Українська
All Fields
Title
Journal Title
Author
Subject
Description
Tag
Full text
Find
Advanced
Author
Vаsylenko, V. S.
Showing
1 - 8
results of
8
for search '
Vаsylenko, V. S.
'
, query time: 0.01s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by
Mаtоv, O. Y.
,
Vаsylenko, V. S.
Published 2015
Get full text
Article
Save to List
Saved in:
Select result number 2
2
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by
Mаtоv, O. Y.
,
Vаsylenko, V. S.
Published 2015
Get full text
Article
Save to List
Saved in:
Select result number 3
3
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by
Mаtоv, O. Y.
,
Vаsylenko, V. S.
Published 2016
Get full text
Article
Save to List
Saved in:
Select result number 4
4
Hash functions and integrity of information objects
by
Mаtоv, O. Ya.
,
Vаsylenko, V. S.
Published 2014
Get full text
Article
Save to List
Saved in:
Select result number 5
5
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by
Mаtоv, О. Y.
,
Vаsylenko, V. S.
,
Vаsylenko, M. Y.
Published 2012
Get full text
Article
Save to List
Saved in:
Select result number 6
6
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by
Mаtоv, О. Ya.
,
Vаsylenko, V. S.
,
Vаsylenko, M. Yu.
Published 2013
Get full text
Article
Save to List
Saved in:
Select result number 7
7
Cyclicity of Control Operations on an Arbitrary Modulus
by
Mаtоv, О. Ya.
,
Vаsylenko, V. S.
,
Vаsylenko, M. Yu.
Published 2013
Get full text
Article
Save to List
Saved in:
Select result number 8
8
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by
Mаtоv, О. Ya.
,
Vаsylenko, V. S.
,
Vаsylenko, M. Yu.
Published 2012
Get full text
Article
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
RSS Feed
–
Email Search
Related Subjects
cryptographic transformations
криптографические преобразования
цілісність
інформаційні об’єкти
hashing
immunity
information objects
integrity
plus classes
завадостійкість
информационные объекты
информация
контроль за модулем
контроль по модулю
конфиденциальность
конфіденційність
криптографічні перетворення
лишкові класи
остаточные классы
помехоустойчивость
системи числення
системы счисления
хеширование
інформація
FEC
code of conditional residuals
control base
control modulo cycle
control through modulo
cyclicity