Technology system integration of hardware and software data protection
The article deals with the creation of hardware and software data protection. The analysis of characteristics of a hardware device based on digital signal processors for implementation of perfectly secure encryption. The algorithms of matching the required parameters between two remote devices. Desc...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Alishоv, N.I., Marchenko, V.A., Mishchenko, A.N. |
| Format: | Article |
| Language: | Russian |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/817 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Creation of design methods for the CUDA hardware and software platform
by: Pogorilyy, S.D., et al.
Published: (2025)
by: Pogorilyy, S.D., et al.
Published: (2025)
The Code is based on random numbers with irregular distribution
by: Mikhersky, R.M.
Published: (2025)
by: Mikhersky, R.M.
Published: (2025)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Software and technical complex for automatic georeferencing of space system «Sich-2» remote sensing data
by: Kussul, N.M., et al.
Published: (2025)
by: Kussul, N.M., et al.
Published: (2025)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Ontology-oriented data integration on the Semantic Web
by: Chystyakova, I.S.
Published: (2025)
by: Chystyakova, I.S.
Published: (2025)
Software architectural design for the interactive learning of sign language
by: Kryvonos, Yu.G., et al.
Published: (2025)
by: Kryvonos, Yu.G., et al.
Published: (2025)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Integration of Semantic WEB technologies with Business Intelligence 2.0 systems
by: Rogushina, J.V., et al.
Published: (2025)
by: Rogushina, J.V., et al.
Published: (2025)
Рaradigms of programming assembling type in software engeneering
by: Lavrischeva, E.M.
Published: (2025)
by: Lavrischeva, E.M.
Published: (2025)
Software engineering and big data software
by: Sydorov, N.O., et al.
Published: (2023)
by: Sydorov, N.O., et al.
Published: (2023)
Analytical review of approaches to integration of software systems
by: Dyvak, Y.A.
Published: (2021)
by: Dyvak, Y.A.
Published: (2021)
Development of integrated system of scientific periodicals based on the OJS
by: Kudim, K.A., et al.
Published: (2017)
by: Kudim, K.A., et al.
Published: (2017)
Development of formal models, algorithms, procedures, engineering and functioning of the software system “Instrumental complex for ontological engineering purpose”
by: Palagin, O.V., et al.
Published: (2025)
by: Palagin, O.V., et al.
Published: (2025)
Static method of consistency and completeness checking in formal model of distributed software systems
by: Kolchin, A.V., et al.
Published: (2025)
by: Kolchin, A.V., et al.
Published: (2025)
On performance of the In-Memory Data Grids
by: Rukhlis, K.A., et al.
Published: (2017)
by: Rukhlis, K.A., et al.
Published: (2017)
Application of software and hardware components of CAN-technology for accelerator control
by: Chepurnov, A., et al.
Published: (2004)
by: Chepurnov, A., et al.
Published: (2004)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
Algebra for the description of data in the composite schemes of algorithms
by: Akulovskiy, V.G.
Published: (2015)
by: Akulovskiy, V.G.
Published: (2015)
Hardware and software implementation of data acquisition system for pulsed NQR spectrometer
by: A. P. Samila
Published: (2017)
by: A. P. Samila
Published: (2017)
Канонічні та матричні задання квазігруп четвертого порядку
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
by: Sokhatsky, F. M.; Інститут прикладних проблем механіки і математики ім. Я. С. Підстригача НАН України, Львів, et al.
Published: (2024)
Hardware-Software Xml-Documents Processing
by: A. M. Serhiienko, et al.
Published: (2020)
by: A. M. Serhiienko, et al.
Published: (2020)
Hibrid approach to processing incomplete stream data in distributed real-time systems
by: Zhyliuk, Y., et al.
Published: (2025)
by: Zhyliuk, Y., et al.
Published: (2025)
Modern hardware-software complexes for training of welders
by: L. M. Lobanov, et al.
Published: (2018)
by: L. M. Lobanov, et al.
Published: (2018)
DS-theory. Research of R-data division factors in order to generate applied algorithms. Part 1
by: Kolesnyk, V.G.
Published: (2017)
by: Kolesnyk, V.G.
Published: (2017)
Technological model for the process of adaptive Web service composition engineering and exploiting
by: Slabospitskaya, О.A.
Published: (2017)
by: Slabospitskaya, О.A.
Published: (2017)
Weather anomaly monitoring method based on sensor network technology
by: Rahozin, D.V.
Published: (2017)
by: Rahozin, D.V.
Published: (2017)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
Software and hardware support for computational acceleration
by: M. K. Buza
Published: (2018)
by: M. K. Buza
Published: (2018)
Modern technological aspects of decision support systems
by: Churubrova, S.M.
Published: (2017)
by: Churubrova, S.M.
Published: (2017)
Matching data between electronic documents and database tables with automated SQL-query generation
by: Marulin, S.Yu.
Published: (2025)
by: Marulin, S.Yu.
Published: (2025)
Interactive method for cumulative analysis of software formal models behavior
by: Kolchin, A.V.
Published: (2018)
by: Kolchin, A.V.
Published: (2018)
Analysis of storage and display frameworks based on aspect-oriented technologies
by: Glybovets, M.M., et al.
Published: (2025)
by: Glybovets, M.M., et al.
Published: (2025)
Similar Items
-
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)