Hash functions and integrity of information objects
Possibilities of applying known caching mechanism for monitoring the integrity of information objects have been considered. Fig.: 1. Refs: 5 titles.
Saved in:
| Date: | 2014 |
|---|---|
| Main Authors: | Mаtоv, O. Ya., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2014
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100285 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Counteraction to destructive influence during archival storage of information objects on optical media
by: Berezin, B. A., et al.
Published: (2015)
by: Berezin, B. A., et al.
Published: (2015)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
A method for integrating images of different wave bands with the goal of creating universal references for combined correlation-extreme navigation systems
by: Mezentsev, A. V., et al.
Published: (2018)
by: Mezentsev, A. V., et al.
Published: (2018)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
The integrity support for the semantic layer of the corporate intelligent systems’ common information space
by: Храмова, І. О.
Published: (2021)
by: Храмова, І. О.
Published: (2021)
CALCULATION OF TRANSIENTS IN ELECTRICAL CIRCUITS WITH «INCORRECT» INITIAL CONDITIONS WITH THE HELP OF THE DUHAMEL INTEGRAL AND DISCONTINUOUS FUNCTIONS
by: Boev, V. M.
Published: (2018)
by: Boev, V. M.
Published: (2018)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Information systems of deciphering images using aerospace technologies
by: Maruschak, Vasyl M., et al.
Published: (2024)
by: Maruschak, Vasyl M., et al.
Published: (2024)
Adaptive discrete models of functionally represented object shapes
by: Choporov, S. V.
Published: (2019)
by: Choporov, S. V.
Published: (2019)
Adaptive discrete models of functionally represented object shapes
by: Choporov, S. V.
Published: (2019)
by: Choporov, S. V.
Published: (2019)
Modelling and assessment of functional stability of information systems
by: Додонов, О. Г., et al.
Published: (2025)
by: Додонов, О. Г., et al.
Published: (2025)
Ontological approach to the organization of information interaction of existing and created automated systems in the Ministry of Defense and the Armed Forces of Ukraine
by: Гречанінов , В. Ф.
Published: (2021)
by: Гречанінов , В. Ф.
Published: (2021)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Analytical identification of three-dimensional geometric objects by information about the shape of their cross-sections
by: Литвинова, Ю. С., et al.
Published: (2017)
by: Литвинова, Ю. С., et al.
Published: (2017)
Satellite data in the substantiation and creation of objects of the Nature Reserve Fund and monitoring of their ecological condition
by: Lischenko, Lyidmila, et al.
Published: (2025)
by: Lischenko, Lyidmila, et al.
Published: (2025)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Simultaneous optimal integration of photovoltaic distributed generation and battery energy storage system in active distribution network using chaotic grey wolf optimization
by: Belbachir, N., et al.
Published: (2021)
by: Belbachir, N., et al.
Published: (2021)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Dynamic economic emission dispatch using whale optimization algorithm for multi-objective function
by: Mehdi , M. F., et al.
Published: (2021)
by: Mehdi , M. F., et al.
Published: (2021)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
Multi-Objective Optimization in Intelligent Decision Support Systems
by: Sirodgea, I. B., et al.
Published: (2012)
by: Sirodgea, I. B., et al.
Published: (2012)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Ontology based systemazing of the science information devoted to waste utilizing by methanogenesys
by: Shapovalov, Ye.B., et al.
Published: (2018)
by: Shapovalov, Ye.B., et al.
Published: (2018)
Building of a System for Monitoring, Adaptive Aggregation and Generalization of Information
by: Dodonov, A. G., et al.
Published: (2013)
by: Dodonov, A. G., et al.
Published: (2013)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Similar Items
-
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015) -
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016) -
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015) -
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)