• Rotational Rebound Attacks on Reduced Skein. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. Constant-Size Commitments to Polynomials and Applications.

    курс лекций (5,3 M)
  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    статья (854,9 K)
  • Актуальность разработки библиотек для работы с графами. Библиотека AGraph, внутреннее представление графов. Базовые средства и использование атрибутов. Поддержка различных видов графов. Ввод и вывод графов. Создание специализированных классов графов.

    реферат (69,7 K)
  • Alan Mathison Turning - an English computer scientist, mathematician, cryptanalyst. He was highly influential in the development of theoretical computer science, providing a formalisation of the concepts of algorithm, computation with the Turing machine.

    презентация (3,1 M)
  • Linux — название Unix-подобных операционных систем на основе одноимённого ядра. Основные области применения Linux. ASP Linux и ALT Linux: описание, специфические особенности, версии дистрибутивов. Сравнительная характеристика этих операционных систем.

    курсовая работа (43,1 K)
  • Proposed a new concept of keyless encryption, "Amorphic scheme", which is semantically secured and has "Perfect Secrecy" level. Briefly run on well-known cryptographic attacks in order to clearly show how strong the amorphic encryption concept is.

    статья (1,7 M)
  • The Needham-Schroeder public-key authentication protocol. An attack on the protocol and the consequences of this attack. Proving that the revised protocol is safe against all attacks which not dependent upon properties of the encryption method used.

    статья (41,6 K)
  • In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.

    статья (648,0 K)
  • The basics of cryptography: encryption and decryption, its classification, as well as explanations the terminology and technology you will encounter as you use PGP products. Understanding digital signature, passphrase, key splitting and technical details.

    учебное пособие (1,1 M)
  • Higher-level programming language (commonly C, C++, or java) and familiarity with the fundamentals of data structures and algorithms. The study of the theory of computation. A hierarchy of formal language and automata. Limits of algorithmic computation.

    книга (12,9 M)
  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    книга (4,2 M)
  • Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.

    статья (547,8 K)
  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    статья (23,8 K)
  • The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.

    статья (656,4 K)
  • A novel tool for analyzing classical cryptographic protocols to model the more complex Internet security protocol families. The modifications that were necessary in the tool and how the tool illuminates flaws in the Transport Layer Security protocol.

    статья (85,6 K)
  • The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.

    статья (83,5 K)
  • Question classification extracts useful information. Mathematical Machinery and Document Processing. State of the Art Query-based Summarization and Question Answering Systems. Answering Simple and Complex Questions, their experimental evaluation.

    дипломная работа (784,8 K)
  • Antivirus is used to prevent, detect and remove malware, including computer viruses and worms. Such programs may also prevent and remove adware, spyware and other forms of malware. Identification methods: signature based detection and file emulation.

    доклад (16,6 K)
  • Исследование истории основания американской корпорации Apple, производителя персональных и планшетных компьютеров, программного обеспечения. Описания первых программируемых микрокомпьютеров, компьютеров серии Macintosh, современной продукции корпорации.

    презентация (1,8 M)
  • The peculiarity of improving the organization of information on plus trees, accounting, examination and use as breeding objects. The use of free software (Python, JavaScript) and the use of the PostgreSQL relational database with the PostGIS module.

    статья (2,0 M)
  • Application software, the main types of software and operating systems. Ethics and intellectual property rights: when it is possible to copy. Guidelines for creating documents. Characteristics of communication software. Computer terms and their use.

    учебное пособие (558,1 K)
  • On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.

    учебное пособие (4,6 M)
  • Error correction and the cascade protocol. Individual attacks in an realistic environment. Dynamic initial block-size. Statistical analysis of QKD networks in real-life environment. Quantum-cryptographic networks from a prototype to the citizen.

    книга (4,7 M)
  • Особенности ArcCatalog. Предварительный просмотр данных и географических границ, управление источниками данных. Использование данных в ArcMap и ArcToolbox. Советы по изучению ArcCatalog, просмотр и создание метаданных. Книга Introducing ArcCatalog.

    реферат (1,3 M)
  • Presents the main transformational processes of scientific understanding of the role of "artificial" and "natural" intellect. The natural intellect is presented as a social phenomenon that arose from the interaction of individual cerebral structures.

    статья (41,0 K)
  • Специализированные туристические порталы и сайты. Преимущества ASP при внедрении сложных бизнес-систем и при подключении большого числа офисов. Пути развития информационных технологий в туризме. Схема построения глобальных систем бронирования туруслуг.

    контрольная работа (24,1 K)
  • A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.

    статья (219,0 K)
  • The information technology for graphical data from unmanned aircraft real time processing. The structure and functionality of the automated system, image processing algorithms and video. The used of technology in the development of a pilot workplace.

    статья (446,7 K)
  • Характеристика, история создания микроконтроллера и его место в современном мире. Ключевые особенности контроллера. Функции внутрисхемного программирования и управления. Программные и аппаратные средства поддержки разработок для микроконтроллеров.

    реферат (1,3 M)
  • Содержание понятия "системы бизнес-интеллекта", его родовидовые признаки и функциональные преимущества. Влияние соответствующе й системы на изменение маркетинговой политики с учетом актуальных данных, полученных из внутренних и внешних источников.

    статья (24,9 K)