Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
The possibilities of collisions application of control features in the code of conditional residues in terms of threats for the integrity of information objects have been investigated. Tabl.: 1. Refs: 7 titles.
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Mаtоv, O. Y., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2015
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100320 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014)
by: Matov, O. Y., et al.
Published: (2014)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Applied Models for Complex Method of Advanced Diagnostics of Complex Dynamic Objects Operation
by: Chokha, Y. M.
Published: (2013)
by: Chokha, Y. M.
Published: (2013)
Analysis of the Stability of α→γ Plane Front of Recrystallization in Ferritic Alloys During Carburization
by: Movchan, O.V., et al.
Published: (2019)
by: Movchan, O.V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Protecting the Integrity of Information in the Application Code «Weighted Groups»
by: Mаtоv, О. Ya., et al.
Published: (2013)
by: Mаtоv, О. Ya., et al.
Published: (2013)
Ecological impacting factors of power objects on environment
by: Nechaieva T.P., et al.
Published: (2008)
by: Nechaieva T.P., et al.
Published: (2008)
Threat as an object of forensic
by: L. V. Azhniuk
Published: (2022)
by: L. V. Azhniuk
Published: (2022)
The concept of a hybrid technology for remote detection of explosive objects in coastal shallow water areas
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
by: Shchyptsov, Oleksandr, et al.
Published: (2024)
Threat assessment mathematical model for potentially dangerous objects of critical infrastructure in the combat zone
by: Murasov, R.K., et al.
Published: (2023)
by: Murasov, R.K., et al.
Published: (2023)
On semisimple algebra codes: generator theory
by: Martınez-Moro, Edgar
Published: (2018)
by: Martınez-Moro, Edgar
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Features of the use of an automated seismic acoustic complex by a combined method of detection objects
by: Nikiforov, M. M., et al.
Published: (2018)
by: Nikiforov, M. M., et al.
Published: (2018)
Mathematical Models of Moving Objects
by: Tsybulska, Е. O.
Published: (2012)
by: Tsybulska, Е. O.
Published: (2012)
Combining object-oriented programming and simulation in education
by: Bivoino, Taras, et al.
Published: (2026)
by: Bivoino, Taras, et al.
Published: (2026)
Analytical support of hygienic control of flufenacet residual quantities in the environmental objects and potato
by: O. O. Novokhatska, et al.
Published: (2018)
by: O. O. Novokhatska, et al.
Published: (2018)
The solution of problem on grouping mobile objects in monitoring systems using clustering techniques
by: Yuzefovich, V. V.
Published: (2015)
by: Yuzefovich, V. V.
Published: (2015)
Model of information object for digital library and its verification
by: Novitsky, A.V., et al.
Published: (2020)
by: Novitsky, A.V., et al.
Published: (2020)
Determination of the average absorbed energy of electrons beam in objects at radiation processing
by: Lazurik, V.T., et al.
Published: (2019)
by: Lazurik, V.T., et al.
Published: (2019)
Long-term data storage media
by: Petrov, V. V., et al.
Published: (2018)
by: Petrov, V. V., et al.
Published: (2018)
Competition and business are integral attributes of a market
by: I. G. Mantsurov, et al.
Published: (2016)
by: I. G. Mantsurov, et al.
Published: (2016)
Competition and business are integral attributes of a market
by: I. H. Mantsurov, et al.
Published: (2016)
by: I. H. Mantsurov, et al.
Published: (2016)
Consideration of the geometry of corrosion-fatigue cracks in assessing residual life of long-term operation objects
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
by: Ye. I. Kryzhanivskyi, et al.
Published: (2018)
The hierarchical model of optimum control of a power consumption total mode of the dispersed industrial objects
by: Dryomin V.P., et al.
Published: (2001)
by: Dryomin V.P., et al.
Published: (2001)
Modeling technology based on fuzzy object-oriented Bayesian belief networks
by: Yershov, S.V., et al.
Published: (2018)
by: Yershov, S.V., et al.
Published: (2018)
Removal threats of providing heat of infrastructural objects
by: V. H. Demchenko
Published: (2017)
by: V. H. Demchenko
Published: (2017)
Features of the objective side of the crime of negligence (Article 367 of the Criminal Code) in terms of judicial practice
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
by: T. S. Sichevliuk-Vrublevskyi
Published: (2022)
The method of multi objective synthesis of nonlinear robust control by multimass electromechanical systems
by: Kuznetsov, B. I., et al.
Published: (2022)
by: Kuznetsov, B. I., et al.
Published: (2022)
World of attributes and attributes of the new world
by: O. Susska
Published: (2012)
by: O. Susska
Published: (2012)
Using the systemological basis and information entropy function in the study at uncertainty conditions of system-structured objects
by: Kozulia, T.V., et al.
Published: (2022)
by: Kozulia, T.V., et al.
Published: (2022)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Object-component development of changeable software systems
by: Lavrischeva, E.M., et al.
Published: (2018)
by: Lavrischeva, E.M., et al.
Published: (2018)
Структурно-фазовые превращения в наноразмерной системе Cu/Cr при термическом и ионном воздействиях
by: Круглов, И.А., et al.
Published: (2019)
by: Круглов, И.А., et al.
Published: (2019)
Similar Items
-
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Matov, O. Y., et al.
Published: (2014) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012) -
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012) -
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)