Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
The possibilities of collisions application of control features in the code of conditional residues in terms of threats for the integrity of information objects have been investigated. Tabl.: 1. Refs: 7 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Mаtоv, O. Y., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100320 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Analysis of the Stability of α→γ Plane Front of Recrystallization in Ferritic Alloys During Carburization
by: Movchan, O.V., et al.
Published: (2019)
by: Movchan, O.V., et al.
Published: (2019)
The concept of a hybrid technology for remote detection of explosive objects in coastal shallow water areas
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Threat as an object of forensic
by: L. V. Azhniuk
Published: (2022)
by: L. V. Azhniuk
Published: (2022)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
Long-term data storage media
by: Petrov, V. V., et al.
Published: (2018)
by: Petrov, V. V., et al.
Published: (2018)
Determination of the average absorbed energy of electrons beam in objects at radiation processing
by: Lazurik, V.T., et al.
Published: (2019)
by: Lazurik, V.T., et al.
Published: (2019)
The solution of problem on grouping mobile objects in monitoring systems using clustering techniques
by: Yuzefovich, V. V.
Published: (2015)
by: Yuzefovich, V. V.
Published: (2015)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018)
by: Yershov, S.V., et al.
Published: (2018)
Using the systemological basis and information entropy function in the study at uncertainty conditions of system-structured objects
by: Kozulia, T.V., et al.
Published: (2022)
by: Kozulia, T.V., et al.
Published: (2022)
Competition and business are integral attributes of a market
by: I. G. Mantsurov, et al.
Published: (2016)
by: I. G. Mantsurov, et al.
Published: (2016)
Competition and business are integral attributes of a market
by: I. H. Mantsurov, et al.
Published: (2016)
by: I. H. Mantsurov, et al.
Published: (2016)
Consideration of the geometry of corrosion-fatigue cracks in assessing residual life of long-term operation objects
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
Object-component development of changeable software systems
by: Lavrischeva, E.M., et al.
Published: (2018)
by: Lavrischeva, E.M., et al.
Published: (2018)
Some questions of methodology for conducting tests of radiation protection of armored objects
by: Dovbnya, A.N., et al.
Published: (2020)
by: Dovbnya, A.N., et al.
Published: (2020)
PARAMETER PRIORITY ANALYSIS TO EVALUATE THE PROSPECT OF GEOTHERMAL OBJECTS UTILIZATION
by: Barylo, А.
Published: (2020)
by: Barylo, А.
Published: (2020)
Features of the objective side of the crime of negligence (Article 367 of the Criminal Code) in terms of judicial practice
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
ANALYSIS OF HYDROGEOLOGICAL AND GEOTHERMIC CHARACTERISTICS OF THE GEOTHERMAL OBJECTS OF UKRAINE
by: Barylo, А.
Published: (2020)
by: Barylo, А.
Published: (2020)
TARGET ORIENTED EXPERT SYSTEMS FOR GEOLOGICAL OBJECTS
by: KHRUSHCHOV, D., et al.
Published: (2012)
by: KHRUSHCHOV, D., et al.
Published: (2012)
World of attributes and attributes of the new world
by: O. Susska
Published: (2012)
by: O. Susska
Published: (2012)
Removal threats of providing heat of infrastructural objects
by: V. H. Demchenko
Published: (2017)
by: V. H. Demchenko
Published: (2017)
USING OF OBJECT-ORIENTED DESIGN PRINCIPLES IN ELECTRIC MACHINES DEVELOPMENT
by: Zablodskii, N. N., et al.
Published: (2016)
by: Zablodskii, N. N., et al.
Published: (2016)
GEOSITES AS OBJECTS OF NATURAL RESERVE FUND (PROBLEMATIC ISSUES)
by: Samoilenko, L. V.
Published: (2020)
by: Samoilenko, L. V.
Published: (2020)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)