Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
For error-correcting codes, it is introduced the concept of the integrity of the signs of collisions and showed that their presence leads to the recipient before the message undetected, often deliberate modification, and therefore may have serious consequences. Ways minimizing the number of collisio...
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | Mаtоv, O. Y., Vаsylenko, V. S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100352 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015)
by: Matov, O. Ya., et al.
Published: (2015)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
A method for integrating images of different wave bands with the goal of creating universal references for combined correlation-extreme navigation systems
by: Mezentsev, A. V., et al.
Published: (2018)
by: Mezentsev, A. V., et al.
Published: (2018)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Protecting public clients using an authorization algorithm
by: Bodak, B.V., et al.
Published: (2023)
by: Bodak, B.V., et al.
Published: (2023)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Software and information simulation complex of multinode integrated and autonomous power and heat supply systems
by: Denysov, Viktor, et al.
Published: (2023)
by: Denysov, Viktor, et al.
Published: (2023)
Development of decision support system using OLAP-technologies for information security monitoring systems
by: Dashdamirova, K.Q.
Published: (2023)
by: Dashdamirova, K.Q.
Published: (2023)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
Stability of control attributes of code of conditional residues in terms of threats for integrity of information objects
by: Mаtоv, O. Y., et al.
Published: (2015)
by: Mаtоv, O. Y., et al.
Published: (2015)
Workshop with International Participation ‘‘New Trends in Cancer Research and Innovative Tumor Vaccines’’, May 11–12, 2017, Kyiv, Ukraine
Published: (2017)
Published: (2017)
International scientific conference ‘‘Normal and cancer stem cells: discovery, diagnosis and therapy’’ october 5–6, 2017 Kyiv, Ukraine
Published: (2017)
Published: (2017)
Oncology. Selected lectures
Published: (2011)
Published: (2011)
Symposium and Summer School “Fundamental principles of cancer biotherapy” Kyiv, Ukraine, May 21-24, 2018
Published: (2018)
Published: (2018)
The III Swedish-Ukrainian meeting on cancer diseases
Published: (2016)
Published: (2016)
For contributors to SPQEO
Published: (2019)
Published: (2019)
For contributors to SPQEO
Published: (2019)
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences
by: Iaremchuk, I. E.
Published: (2014)
by: Iaremchuk, I. E.
Published: (2014)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Extended binary Golay codes by a group algebra
by: Bortos, Maria Yu., et al.
Published: (2024)
by: Bortos, Maria Yu., et al.
Published: (2024)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Investigation of the boundary-valued problem on resonance MHD non-uniformity by integral equations using
by: Oleksandrov, Y.N., et al.
Published: (2021)
by: Oleksandrov, Y.N., et al.
Published: (2021)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Formalization of the mathematical modeling process of adaptive change of code structure in wireless data transmission
by: Horlynskyi, Borys V., et al.
Published: (2019)
by: Horlynskyi, Borys V., et al.
Published: (2019)
Introduction of modern information technologies in scientific research of NAS of Ukraine
by: Zagorodniy, A.G., et al.
Published: (2018)
by: Zagorodniy, A.G., et al.
Published: (2018)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
In Memoriam: Gennagiy Matsuka (1930–2017)
by: Elska, G.V.
Published: (2017)
by: Elska, G.V.
Published: (2017)
In memoriam: Vadym M. Kavsan (1939–2014)
by: El'skaya, A.V.
Published: (2014)
by: El'skaya, A.V.
Published: (2014)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Similar Items
-
Encoding algorithms of information objects in the code of conditional deductions
by: Matov, O. Ya., et al.
Published: (2015) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
Procedure of «zeroing» under control and restore the integrity of data objects in the code of conditional deductions
by: Mаtоv, O. Y., et al.
Published: (2015) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
A method for integrating images of different wave bands with the goal of creating universal references for combined correlation-extreme navigation systems
by: Mezentsev, A. V., et al.
Published: (2018)