Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
The possibilities of collisions application of control features in the code of conditional residues in terms of threats for the integrity of information objects have been investigated. Tabl.: 1. Refs: 7 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Mаtоv, O. Y., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100320 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
Analysis of the Stability of α→γ Plane Front of Recrystallization in Ferritic Alloys During Carburization
by: Movchan, O.V., et al.
Published: (2019)
by: Movchan, O.V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Attributive search of geospatial data and information about geospatial objects in the transdisciplinary informational environment
by: V. O. Podlipaiev, et al.
Published: (2018)
by: V. O. Podlipaiev, et al.
Published: (2018)
Using the systemological basis and information entropy function in the study at uncertainty conditions of system-structured objects
by: Kozulia, T.V., et al.
Published: (2022)
by: Kozulia, T.V., et al.
Published: (2022)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Ecological impacting factors of power objects on environment
by: Nechaieva T.P., et al.
Published: (2008)
by: Nechaieva T.P., et al.
Published: (2008)
The concept of a hybrid technology for remote detection of explosive objects in coastal shallow water areas
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
Ensuring the stability of the political system in the conditions of information threats
by: A. P. Demartyno
Published: (2020)
by: A. P. Demartyno
Published: (2020)
Development of geographic information systems as a technological innovation strategy
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Threat as an object of forensic
by: L. V. Azhniuk
Published: (2022)
by: L. V. Azhniuk
Published: (2022)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
The use of ontological knowledge for multi-criteria comparison of complex information objects
by: Rogushina, J.V., et al.
Published: (2023)
by: Rogushina, J.V., et al.
Published: (2023)
Information technology for monitoring environmental threats using aerospace data and artificial intelligence
by: Mosiichuk, Dmytro
Published: (2025)
by: Mosiichuk, Dmytro
Published: (2025)
Determination of the average absorbed energy of electrons beam in objects at radiation processing
by: Lazurik, V.T., et al.
Published: (2019)
by: Lazurik, V.T., et al.
Published: (2019)
Use of thesauruses for search of complex information objects on Web on the basis of ontologies
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
Long-term data storage media
by: Petrov, V. V., et al.
Published: (2018)
by: Petrov, V. V., et al.
Published: (2018)
Combining object-oriented programming and simulation in education
by: Bivoino, Taras, et al.
Published: (2025)
by: Bivoino, Taras, et al.
Published: (2025)
The solution of problem on grouping mobile objects in monitoring systems using clustering techniques
by: Yuzefovich, V. V.
Published: (2015)
by: Yuzefovich, V. V.
Published: (2015)
The hierarchical model of optimum control of a power consumption total mode of the dispersed industrial objects
by: Dryomin V.P., et al.
Published: (2001)
by: Dryomin V.P., et al.
Published: (2001)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: V. S. Vasylenko, et al.
Published: (2017)
by: V. S. Vasylenko, et al.
Published: (2017)
Theoretical dimension of information-digital economy: Information-digital processes and their attributes
by: V. M. Tarasevych
Published: (2021)
by: V. M. Tarasevych
Published: (2021)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Analytical support of hygienic control of flufenacet residual quantities in the environmental objects and potato
by: O. O. Novokhatska, et al.
Published: (2018)
by: O. O. Novokhatska, et al.
Published: (2018)
Information-extreme method of classification of observation with categorical attributes
by: A. S. Dovbysh, et al.
Published: (2016)
by: A. S. Dovbysh, et al.
Published: (2016)
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015)
by: Antonyuk, A.A., et al.
Published: (2015)
Consideration of the geometry of corrosion-fatigue cracks in assessing residual life of long-term operation objects
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)