The constuction principles have been developed, and the complex of the protected speed data processing in the computer-aided system (CAS) has been created. The methods of system analysis and discrete mathematics, theory of probability, cryptography and information technology have been used. The expert investigations in the specialized laboratories have been made. The methodology of constructing program mechanisms for information protection in the computer system have been performed. The new principle of the cryptographic information conversion has been proposed, the non-determinated codes with large number of the potential-realized cryptoalgorithm modifications have been developed. The program-oriented unit cryptoalgorithms providing the hi...
Developed have been the method and the model of evaluation of the information protection level in AS...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
The analytical dependences of the complexity in the algebraic coding procedure of RC-codes upon the ...
System solutions of actual problems of information security of computer systems is achieved by a com...
The methodology of the comparative estimation for the quality of protection systems has been develop...
Computer criminality: computer viruses in MS/DOS medium; computer criminology are considered in the ...
The information compression method based on the fast arithmetic coding surpassing the known methods ...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
Loginova N. Program-Technical Aspects of Encryption Protection of Users' Data / Natalia Loginova,...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
The purpose of the work: the development of the theoretical bases, models and methods of improvement...
Abstract: The subject of security in the automatic information system is highly considered as an int...
The work is devoted to the organization of information protection in the information system for dete...
Developed have been the method and the model of evaluation of the information protection level in AS...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
The analytical dependences of the complexity in the algebraic coding procedure of RC-codes upon the ...
System solutions of actual problems of information security of computer systems is achieved by a com...
The methodology of the comparative estimation for the quality of protection systems has been develop...
Computer criminality: computer viruses in MS/DOS medium; computer criminology are considered in the ...
The information compression method based on the fast arithmetic coding surpassing the known methods ...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
In modern conditions of growth of informatization, to ensure the reliability of the functioning of d...
Loginova N. Program-Technical Aspects of Encryption Protection of Users' Data / Natalia Loginova,...
In this work we have discussed the following cryptographic protection methods: •elliptic cryptograph...
The purpose of the work: the development of the theoretical bases, models and methods of improvement...
Abstract: The subject of security in the automatic information system is highly considered as an int...
The work is devoted to the organization of information protection in the information system for dete...
Developed have been the method and the model of evaluation of the information protection level in AS...
(in English): This thesis describes and compares the most popular algorithms used in information sys...
The analytical dependences of the complexity in the algebraic coding procedure of RC-codes upon the ...