Features of cryptographic protection of state information resources
نویسندگان
چکیده
منابع مشابه
analysis of reading comprehension needs of the students of paramedical studies: the case of the students of health information management (him)
چکیده ندارد.
15 صفحه اولCryptographic Protection of the Information and Algorithms of Enciphering
In order to organize informational security the juridical documents, technical means and cryptographically algorithms, systematic, apparatus-systematic or apparatus-technical means are widely used. And with the advent of high-speed digital lines of information transfer requirements for cryptographic means of enciphering is growing more and more. In cryptosystem based on stream ciphers the enter...
متن کاملthe impact of skopos on syntactic features of the target text
the present study is an experimental case study which investigates the impacts, if any, of skopos on syntactic features of the target text. two test groups each consisting of 10 ma students translated a set of sentences selected from advertising texts in the operative and informative mode. the resulting target texts were then statistically analyzed in terms of the number of words, phrases, si...
15 صفحه اولCryptographic protection of health information: cost and benefit.
Medical, legal, and economic reasons inevitably force health care establishments to apply more and more open distributed IT systems rather than the less flexible and more expensive mainframes. Managing, for example, electronic patient records by various users at different locations by means of large scale client server systems requires new security provisions for storing, archiving and communic...
متن کاملCompressing Cryptographic Resources
A private-key cryptosystem may be viewed as a means by which a trusted dealer privately conveys a large, shared pseudo-random object to a pair of players, using little communication. Alternatively, the messages distributed by the dealer may be viewed as a secure compression of a pair of large identical random pads (or random functions) into a shorter shared “key” or “seed”. We pose the question...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Scientific Journal of Information Security
سال: 2012
ISSN: 2411-071X,2225-5036
DOI: 10.18372/2225-5036.17.3395