A combined data encryption method with identification of their sender
Information security is a particularly important factor as new information technologies are widely introduced, various kinds of branched information and computer systems. Encryption is an effective method of protecting information from unauthorized access when it is transmitted over open communicati...
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Волошко, А. В., Лутчин , Т. М. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2021
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/235158 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021)
by: A. V. Voloshko, et al.
Published: (2021)
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015)
by: Zhuravlev, Dmitry
Published: (2015)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)
by: Shevchenko, V.V., et al.
Published: (2023)
Decision tree method for identification and classification of information signals
by: Волошко, А. В., et al.
Published: (2022)
by: Волошко, А. В., et al.
Published: (2022)
Encryption system based on abelian groups and rings
by: Kryvyi, S.L.
Published: (2020)
by: Kryvyi, S.L.
Published: (2020)
Functionally oriented model of adaptive short-term forecasting of electrical load
by: Voloshko, A. V., et al.
Published: (2016)
by: Voloshko, A. V., et al.
Published: (2016)
Automated method for determination of geological horizons nonconformity according to three-dimensional seismic data
by: Gryn’, D. M.
Published: (2019)
by: Gryn’, D. M.
Published: (2019)
Forecast of time series using their segmentation based on wavelet analysis of scalogram
by: Voloshko, A. V., et al.
Published: (2016)
by: Voloshko, A. V., et al.
Published: (2016)
PROPERTY STUDY OF OJ 287 AND BL LAC VARIABILITY IN OPTICALAND RADIO RANGES
by: Sukharev, A. L., et al.
Published: (2019)
by: Sukharev, A. L., et al.
Published: (2019)
Application of wavelet analysis for updating Heinrich events age
by: Danova, T.E., et al.
Published: (2015)
by: Danova, T.E., et al.
Published: (2015)
Principle of Search Informative Wavelet-Transformed Values in Conditions of a Partial Restoration of the Initial Data
by: Voloshko, A. V., et al.
Published: (2012)
by: Voloshko, A. V., et al.
Published: (2012)
Data transmission system with encryption by chaotic sequences
by: R. L. Politanskij, et al.
Published: (2014)
by: R. L. Politanskij, et al.
Published: (2014)
A sender in child's book as literary-publishing communication
by: E. Ohar
Published: (2014)
by: E. Ohar
Published: (2014)
Analyis of periodical variability of insolation and soil temperature in the Crimea
by: Volvach, A. E., et al.
Published: (2019)
by: Volvach, A. E., et al.
Published: (2019)
Modified method of searching keywords and keyterms in text data
by: Bukhalenkov, D.O., et al.
Published: (2024)
by: Bukhalenkov, D.O., et al.
Published: (2024)
Development of method and software for compression and encryption of information
by: D. V. Ratov
Published: (2022)
by: D. V. Ratov
Published: (2022)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Encoding as a means of protecting information in systems of access control using time-logic functions in the form of polynomials and biometric data of subjects
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
by: Sachaniuk-Kavets’ka, N. V.
Published: (2018)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Wavelet packet analysis for rotor bar breakage in an inverter induction motor
by: Abu Ibaid, O. Z. I., et al.
Published: (2023)
by: Abu Ibaid, O. Z. I., et al.
Published: (2023)
CATALOG OF VARIABILITY PERIODS OF EXTRAGALACTIC RADIO SOURCES AT CENTIMETER WAVELENGTHS
by: Ryabov, M. I., et al.
Published: (2016)
by: Ryabov, M. I., et al.
Published: (2016)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Algorithms of correlation methods for comprehensive interpretation of gravimetric and seismic data
by: Isgandarov, Elkhan
Published: (2025)
by: Isgandarov, Elkhan
Published: (2025)
A method of adaptive binarization of halftone images with additional processing on use of signal-to-noise ratio
by: Egorov, P. M., et al.
Published: (2020)
by: Egorov, P. M., et al.
Published: (2020)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
Encryption system based on abelian groups and rings
by: S. L. Kryvyi
Published: (2020)
by: S. L. Kryvyi
Published: (2020)
The Comparative Analysis of NTRUCipher and NTRUEncrypt Encryption Schemes
by: A. A. Matiiko
Published: (2019)
by: A. A. Matiiko
Published: (2019)
Photovoltaic system faults detection using fractional multiresolution signal decomposition
by: Lanani, A., et al.
Published: (2024)
by: Lanani, A., et al.
Published: (2024)
UNBALANCED LOAD FLOW WITH HYBRID WAVELET TRANSFORM AND SUPPORT VECTOR MACHINE BASED ERROR-CORRECTING OUTPUT CODES FOR POWER QUALITY DISTURBANCES CLASSIFICATION INCLUDING WIND ENERGY
by: Rahmani, Ala eddine, et al.
Published: (2019)
by: Rahmani, Ala eddine, et al.
Published: (2019)
From Triple Bottom Line Logic to ESG Operationalisation: Developing a Sustainable Business Model Framework for the Construction Sector
by: Butkevics , Janis
Published: (2026)
by: Butkevics , Janis
Published: (2026)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Separation of data sources and extraction of target components of the electrophysiological time series on the example of fetal ECG
by: Білобородова, Т. О., et al.
Published: (2023)
by: Білобородова, Т. О., et al.
Published: (2023)
PREDOMINANT TRAVELING IONOSPHERIC DISTURBANCES OVER EASTERN EUROPE DURING LOW LEVELS OF SOLAR AND GEOMAGNETIC ACTIVITIES USING INCOHERENT SCATTER RADAR DATA
by: Aksonova, K. D., et al.
Published: (2020)
by: Aksonova, K. D., et al.
Published: (2020)
Identification and dealing with uncertainties in the form of incomplete data by data mining methods
by: N. V. Kuznietsova
Published: (2016)
by: N. V. Kuznietsova
Published: (2016)
Identification of the native language of a person
by: Lazorenko, Yа.S., et al.
Published: (2023)
by: Lazorenko, Yа.S., et al.
Published: (2023)
Identification of gas reservoirs and determination of their parameters by the combination of radioactive logging methods
by: Kulyk, V. V., et al.
Published: (2016)
by: Kulyk, V. V., et al.
Published: (2016)
Similar Items
-
A combined data encryption method with identification of their sender
by: A. V. Voloshko, et al.
Published: (2021) -
Towards practical private information retrieval from homomorphic encryption
by: Zhuravlev, Dmitry
Published: (2015) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
Improving methods for generating encryption keys using strange attractors
by: Shevchenko, V.V., et al.
Published: (2023)