The cryptographic strength of combinational hashing the authentication data in Internet-payment system
Saved in:
| Date: | 2013 |
|---|---|
| Main Author: | O. V. Kliuvak |
| Format: | Article |
| Language: | English |
| Published: |
2013
|
| Series: | Socio-economic problems of the modern period of Ukraine |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000800597 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Method of the trusted internet-payment systems evaluation based on the process approach
by: O. V. Kliuvak
Published: (2014)
by: O. V. Kliuvak
Published: (2014)
Features of Authentification Technologies in the Internet Payment Systems on the Basis of Bank Cards
by: O. V. Kliuvak
Published: (2010)
by: O. V. Kliuvak
Published: (2010)
Economic Analysis of the Levels of Efficiency and Quality of Internet Payment Systems of Enterprise
by: V. M. Yuzevych, et al.
Published: (2015)
by: V. M. Yuzevych, et al.
Published: (2015)
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014)
by: Mаtоv, O. Ya., et al.
Published: (2014)
The technologies of the Data Retrieval in Peer-to-Peer Networks Constructed on the Basis of the Distributed Hash Tables
by: A. V. Sergeev
Published: (2016)
by: A. V. Sergeev
Published: (2016)
Asymptotic Estimates of Universal Hashing on Algebraic Curves
by: Ye. V. Kotukh
Published: (2017)
by: Ye. V. Kotukh
Published: (2017)
Load balancing in IoT applications using consistent hashing
by: A. I. Shvayka
Published: (2016)
by: A. I. Shvayka
Published: (2016)
Load Balancing in IoT Applications Using Consistent Hashing
by: Shvayka, A.I.
Published: (2016)
by: Shvayka, A.I.
Published: (2016)
System of Cryptographic Transformations of Numbers by Means of Linear Recurrent Forms
by: A. V. Anisimov
Published: (2016)
by: A. V. Anisimov
Published: (2016)
Data on the system of electronic payments as a subject of a crime
by: O. V. Vasylenko
Published: (2019)
by: O. V. Vasylenko
Published: (2019)
Cryptographic Analysis of Random Sequences Generated by System with Chaotic Behavior
by: Vavriv, D. D.
Published: (2013)
by: Vavriv, D. D.
Published: (2013)
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019)
by: M. V. Yesina
Published: (2019)
Method for constructing primitive polynomials for cryptographic subsystems of dependable automated systems
by: G. N. Gulak
Published: (2020)
by: G. N. Gulak
Published: (2020)
Pattern Recognition in Biological Systems of Personality Authentication
by: Glushchenko, V.E., et al.
Published: (2008)
by: Glushchenko, V.E., et al.
Published: (2008)
Cryptographic properties of the new national encryption standard of Ukraine
by: A. N. Aleksejchuk, et al.
Published: (2016)
by: A. N. Aleksejchuk, et al.
Published: (2016)
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
Security of Poseidon hash function against non-binary differential and linear attacks
by: Kovalchuk, L., et al.
Published: (2021)
by: Kovalchuk, L., et al.
Published: (2021)
Increase of Authenticity of Assessment of Expenditures
by: S. V. Vashchylin
Published: (2013)
by: S. V. Vashchylin
Published: (2013)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Autoencoder for ECG signal outlier processing in system of biometric authention
by: V. V. Khoma, et al.
Published: (2019)
by: V. V. Khoma, et al.
Published: (2019)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Synthesis Models and Methods of Cryptographic Signals and their Optimization by Time Complexity Criterion
by: I. D. Horbenko, et al.
Published: (2017)
by: I. D. Horbenko, et al.
Published: (2017)
Analysis of the probabalistic filters usage for authentication tokens invalidation in distributed systems
by: S. V. Khruschak, et al.
Published: (2024)
by: S. V. Khruschak, et al.
Published: (2024)
Dangerous Combination of the Propaganda and the Internet in the Conditions of the Russian-Ukrainian War
by: S. Mazepa
Published: (2024)
by: S. Mazepa
Published: (2024)
Types of biometric authentication and methods of their evaluation
by: K. V. Kolesnikov, et al.
Published: (2017)
by: K. V. Kolesnikov, et al.
Published: (2017)
State, Method and Intermediate Results of the Drafting of Post-quantum Cryptographic Primitives
by: V. A. Ponomar
Published: (2017)
by: V. A. Ponomar
Published: (2017)
Analysis organization of the system of payment
by: R. K. Shurpenkova, et al.
Published: (2011)
by: R. K. Shurpenkova, et al.
Published: (2011)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Payment Systems in Ukraine and Risks of their Functioning
by: N. V. Trusova, et al.
Published: (2021)
by: N. V. Trusova, et al.
Published: (2021)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Authentication of Continuous Function is in Unidimensional Parabolic Equalization
by: N. A. Volodin, et al.
Published: (2013)
by: N. A. Volodin, et al.
Published: (2013)
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)
by: Ignatenko, O.P.
Published: (2025)
The issue of authentic interpretation: current state of research
by: O. M. Kostiuk
Published: (2016)
by: O. M. Kostiuk
Published: (2016)
The problem of personal data when using Internet of Things systems in the field of healthcare
by: S. M. Braichevskyi
Published: (2020)
by: S. M. Braichevskyi
Published: (2020)
Authentic interpretation of legal norms: theoretical aspect
by: M. V. Osiadla
Published: (2021)
by: M. V. Osiadla
Published: (2021)
Electronic payment system as an object of criminal encroachment
by: O. V. Vasylenko
Published: (2021)
by: O. V. Vasylenko
Published: (2021)
Transformation of Payment Systems in the Digital Economy
by: Yu. R. Kozyr
Published: (2023)
by: Yu. R. Kozyr
Published: (2023)
Classification of Payment Systems Based on Their Oversight
by: Yu. S. Balakina
Published: (2014)
by: Yu. S. Balakina
Published: (2014)
General First Order Matrix Difference System — Existence and Uniqueness via New Lattice Based Cryptographic Construction
by: Sastry, B.R., et al.
Published: (2007)
by: Sastry, B.R., et al.
Published: (2007)
Similar Items
-
Method of the trusted internet-payment systems evaluation based on the process approach
by: O. V. Kliuvak
Published: (2014) -
Features of Authentification Technologies in the Internet Payment Systems on the Basis of Bank Cards
by: O. V. Kliuvak
Published: (2010) -
Economic Analysis of the Levels of Efficiency and Quality of Internet Payment Systems of Enterprise
by: V. M. Yuzevych, et al.
Published: (2015) -
Hash functions and integrity of information objects
by: Mаtоv, O. Ya., et al.
Published: (2014) -
The technologies of the Data Retrieval in Peer-to-Peer Networks Constructed on the Basis of the Distributed Hash Tables
by: A. V. Sergeev
Published: (2016)