Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
Saved in:
| Date: | 2020 |
|---|---|
| Main Authors: | Yu. Korolov, M. I. Ohurtsov, O. M. Khodzinskyi |
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Series: | Cybernetics and Computer Technologies |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001180908 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Identification of Technical Objects in the Special Networks According to the Principle of "Friend or Foe"
by: Yu. Korolov, et al.
Published: (2021)
by: Yu. Korolov, et al.
Published: (2021)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2022)
by: Ogurtsov, M.I.
Published: (2022)
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2023)
by: Ogurtsov, M.I.
Published: (2023)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Correlation of "friend or foe" in L. Staff and M. Maeterlinck
by: E. Tsykhovska
Published: (2013)
by: E. Tsykhovska
Published: (2013)
Recognition algorithms of multilevel images of multicharacter identification objects based on nonlinear equivalent metrices and analysis of experimental data
by: V. G. Krasilenko, et al.
Published: (2013)
by: V. G. Krasilenko, et al.
Published: (2013)
Recognition algorithms of multilevel images of multicharacter identification objects based on nonlinear equivalent metrices and analysis of experimental data
by: Krasilenko, V.G., et al.
Published: (2013)
by: Krasilenko, V.G., et al.
Published: (2013)
"A friend among foes and a foe among his own" (Ivan Franko as the newspaper "Kurjer Lwowski" employee)
by: V. Korniichuk
Published: (2017)
by: V. Korniichuk
Published: (2017)
Development of methods and algorithms for solving vehicle routing problem with time windows
by: M. I. Ohurtsov, et al.
Published: (2016)
by: M. I. Ohurtsov, et al.
Published: (2016)
Solving Combinatorial Optimization Problems on Quantum Computers
by: Yu. Korolov, et al.
Published: (2020)
by: Yu. Korolov, et al.
Published: (2020)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Multilevel bundle of objects contours in binary images
by: Yu. Sabelnikov
Published: (2017)
by: Yu. Sabelnikov
Published: (2017)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
To the Problems of the National State Recognition System Improving
by: M. I. Ohurtsov, et al.
Published: (2022)
by: M. I. Ohurtsov, et al.
Published: (2022)
Statement of the Problem of Complete Set of UAV Group on the Basis of Models of Granular Calculations and Fuzzy Logic
by: Yu. Korolov, et al.
Published: (2021)
by: Yu. Korolov, et al.
Published: (2021)
Comparative Analysis of Post-Quantum Asymmetric Encrypt Algorithms
by: V. V. Onopriienko, et al.
Published: (2019)
by: V. V. Onopriienko, et al.
Published: (2019)
A Research of the Influence of Quantum Annealing Parameters on the Quality of the Solution of the Number Factorization Problem
by: V. Y. Korolov, et al.
Published: (2023)
by: V. Y. Korolov, et al.
Published: (2023)
Requirements and Security Models for Post-quantum Cryptography Analysis
by: O. V. Potii, et al.
Published: (2017)
by: O. V. Potii, et al.
Published: (2017)
THE METHOD AND ALGORITHMS FOR IDENTIFICATION OF DYNAMIC OBJECTS ON BASIS OF INTEGRAL EQUATIONS
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
by: Diachuk, Aleksandr Anatolievich, et al.
Published: (2013)
The method and algorithms for identification of dynamic objects on basis of integral equations
by: Diachuk, O.A., et al.
Published: (2013)
by: Diachuk, O.A., et al.
Published: (2013)
Ca2+ channel-forming ORAI proteins: cancer foes or cancer allies?
by: Shuba, Ya.M.
Published: (2023)
by: Shuba, Ya.M.
Published: (2023)
Problems of UAV routing in search and monitoring
by: L. F. Hulianytskyi, et al.
Published: (2018)
by: L. F. Hulianytskyi, et al.
Published: (2018)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
Algorithms of Operation and Software of Multilevel System for Monitoring and Technical Diagnostics of Electrical Power Facilities Equipment
by: M. V. Myslovych, et al.
Published: (2016)
by: M. V. Myslovych, et al.
Published: (2016)
Multilevel certification system for engineers
by: M. M. Kiriukhin
Published: (2017)
by: M. M. Kiriukhin
Published: (2017)
Multilevel certification system for engineers
by: Kiriukhin, M.M
Published: (2017)
by: Kiriukhin, M.M
Published: (2017)
Information security as an object of crime
by: A. V. Landina
Published: (2016)
by: A. V. Landina
Published: (2016)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Assessment of safety of the “Shelter” object in the process of its transformation into an environmentally friendly system
by: Azarov S.I., et al.
Published: (2019)
by: Azarov S.I., et al.
Published: (2019)
About colleague and friend
by: M. O. Shulga, et al.
Published: (2022)
by: M. O. Shulga, et al.
Published: (2022)
Evaluation of influence of multilevel oxygen lance constructions on blowing efficiency of converter bath with post-combustion of waste gases
by: L. S. Molchanov, et al.
Published: (2018)
by: L. S. Molchanov, et al.
Published: (2018)
The Post-Global Security Space
by: M. V. Kovalchuk
Published: (2015)
by: M. V. Kovalchuk
Published: (2015)
Parallel algorithm for search and identification of similar information structures
by: A. P. Sergeev
Published: (2015)
by: A. P. Sergeev
Published: (2015)
Secure Data Exchange Protocol Development for Special Networks
by: M. I. Ohurtsov
Published: (2019)
by: M. I. Ohurtsov
Published: (2019)
Colleague, friend, and companion
by: K. M. Sytnyk, et al.
Published: (2004)
by: K. M. Sytnyk, et al.
Published: (2004)
Similar Items
-
Identification of Technical Objects in the Special Networks According to the Principle of "Friend or Foe"
by: Yu. Korolov, et al.
Published: (2021) -
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019) -
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2022) -
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2023) -
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)