On security of GIS systems with N-tier architecture and family of graph based ciphers
Saved in:
| Date: | 2023 |
|---|---|
| Main Authors: | V. Ustimenko, O. Pustovit |
| Format: | Article |
| Language: | English |
| Published: |
2023
|
| Series: | Environmental safety and natural resources |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001454285 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023)
by: Ustimenko, Vasyl O., et al.
Published: (2023)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: Ustimenko, V.A.
Published: (2014)
by: Ustimenko, V.A.
Published: (2014)
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: V. A. Ustimenko
Published: (2014)
by: V. A. Ustimenko
Published: (2014)
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017)
by: A. N. Aleksejchuk, et al.
Published: (2017)
Two-tier replication based on Eager Group – Lazy Master model
by: Khadzhynov, W., et al.
Published: (2004)
by: Khadzhynov, W., et al.
Published: (2004)
Tier parallel computing model for logical inference on fuzzy multilevel systems
by: C. V. Yershov, et al.
Published: (2016)
by: C. V. Yershov, et al.
Published: (2016)
Determination of family territory borders in the European badger (Meles meles) by GIS
by: N. Brusentsova
Published: (2015)
by: N. Brusentsova
Published: (2015)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
Ontogenetic dynamics of gas exchange in the wheat top tier leaves
by: D. A. Kirizii, et al.
Published: (2017)
by: D. A. Kirizii, et al.
Published: (2017)
Two-tier proportional electoral system in Ukraine: cross-regional analysis of the first approbation
by: O. Fisun, et al.
Published: (2021)
by: O. Fisun, et al.
Published: (2021)
GIS model of a territorial system based on blurred topological spaces
by: V. G. Sherstjuk, et al.
Published: (2016)
by: V. G. Sherstjuk, et al.
Published: (2016)
On new results on extremal graph theory, theory of algebraic graphs, and their applications
by: V. O. Ustimenko
Published: (2022)
by: V. O. Ustimenko
Published: (2022)
On new results on extremal graph theory, theory of algebraic graphs, and their applications
by: Ustimenko, V.O.
Published: (2022)
by: Ustimenko, V.O.
Published: (2022)
A method of two-tier storage management in virtualized data center
by: Zharikov, E.V.
Published: (2019)
by: Zharikov, E.V.
Published: (2019)
A method of two-tier storage management in virtualized data center
by: E. V. Zharikov
Published: (2018)
by: E. V. Zharikov
Published: (2018)
Based on GIS inventory and data analysis in landscape planning
by: O. H. Holubtsov
Published: (2014)
by: O. H. Holubtsov
Published: (2014)
On the implementation of cryptoalgorithms based on algebraic graphs over some commutative rings
by: Kotorowicz, J.S., et al.
Published: (2008)
by: Kotorowicz, J.S., et al.
Published: (2008)
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
Effectiveness of probabilistic neutral bits method in statistical cryptanalysis of synchronous stream ciphers
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
A method for security evaluation of SNOW 2.0-like ciphers against correlation attacks over finite extensions of the field of two elements
by: A. N. Aleksejchuk, et al.
Published: (2020)
by: A. N. Aleksejchuk, et al.
Published: (2020)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, V.
Published: (2015)
by: Ustimenko, V.
Published: (2015)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: V. Ustimenko
Published: (2015)
by: V. Ustimenko
Published: (2015)
Experience and current state of use of the multi-tiered tuyeres in the oxygen-converter craft-shops of Ukraine
by: P. O. Yushkevych
Published: (2020)
by: P. O. Yushkevych
Published: (2020)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A.A.
Published: (2005)
by: Ustimenko, A.A.
Published: (2005)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Practical Estimates of Block Cipher New Standards Modifications Resistance to Integer Differencial Cryptanalisys
by: L. V. Kovalchuk, et al.
Published: (2017)
by: L. V. Kovalchuk, et al.
Published: (2017)
GIS-based assessment of anthropogenic influence in Western Polissya region limnological ecosystems
by: S. A. Zagorodnya, et al.
Published: (2018)
by: S. A. Zagorodnya, et al.
Published: (2018)
GIS-Based Assessment Model of Resilient Management and Monitoring of Water Resources
by: Kostev, Radoslav
Published: (2025)
by: Kostev, Radoslav
Published: (2025)
GIS-based assessment of anthropogenic influence in Western Polissya region limnological ecosystems
by: Zagorodnya, S.A., et al.
Published: (2018)
by: Zagorodnya, S.A., et al.
Published: (2018)
On algebraic graph theory and non-bijective multivariate maps in cryptography
by: Ustimenko, Vasyl
Published: (2015)
by: Ustimenko, Vasyl
Published: (2015)
Bounds for graphs of given girth and generalized polygons
by: Benkherouf, L., et al.
Published: (2002)
by: Benkherouf, L., et al.
Published: (2002)
Carbon Dioxide Emissions Inventory with GIS
by: Hamal, Kh.V.
Published: (2008)
by: Hamal, Kh.V.
Published: (2008)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
Application of GIS technologies for accounting plus trees
by: I. B. Zhadan, et al.
Published: (2023)
by: I. B. Zhadan, et al.
Published: (2023)
Application of BIM GIS Technologies for Civil Inventory
by: P. D. Krelshtejn, et al.
Published: (2019)
by: P. D. Krelshtejn, et al.
Published: (2019)
A lightweight Symmetric Block Cipher "Cypress" – Description and the Main Properties
by: Yu. Rodinko
Published: (2017)
by: Yu. Rodinko
Published: (2017)
Potential invasive range modeling of Pistia stratiotes (Araceae) based on GIS-analysis of ecoclimatic factors
by: A. S. Mosiakin, et al.
Published: (2014)
by: A. S. Mosiakin, et al.
Published: (2014)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: V. S. Sokolovskyi, et al.
Published: (2018)
by: V. S. Sokolovskyi, et al.
Published: (2018)
The Strategic Perspectives of Using GIS-Technologies for Creating of Integrative Antarctic Geo-base of Scientific Data
by: Seredinin, E., et al.
Published: (2009)
by: Seredinin, E., et al.
Published: (2009)
Similar Items
-
On security of GIS systems with N-tier architecture and family of graph based ciphers
by: Ustimenko, Vasyl O., et al.
Published: (2023) -
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: Ustimenko, V.A.
Published: (2014) -
On walks of variable length in the Schubert incidence systems and multivariate flow ciphers
by: V. A. Ustimenko
Published: (2014) -
Secure and practical randomized stream ciphers based on Reed–Solomon codes
by: A. N. Aleksejchuk, et al.
Published: (2017) -
Two-tier replication based on Eager Group – Lazy Master model
by: Khadzhynov, W., et al.
Published: (2004)