The analysis of hidden channels of information leakage with respect to
r...
To design a discretionary access control policy, a technique is proposed...
The possibility of use the keys preliminary distribution KDP-scheme for
...
In article the modification of the Blom's keys preliminary distribution
...
This article suggests an algorithm of impulse noise filtration, based on...
This article presents the method of steganography detection, which is fo...
This article suggests an algorithm of formation a training set for artif...
The problem of optimal authorization of a user in a system with a role-b...
During the development of the security subsystem of modern information
s...