Results 31 to 40 of about 141 (124)

The bases of development of systems of control and protection information from internal threats

open access: yesRUDN Journal of Informatization in Education, 2013
The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.
V E Zhuzhzhalov   +3 more
doaj  

Роль технико-технологической безопасности в системе экономической безопасности организации

open access: yesИсследование проблем экономики и финансов, 2023
Введение. Технико-технологическая безопасность имеет важное место в системе экономической безопасности организации. Она является одной из составляющих компонентов общей безопасности и направлена на обеспечение безопасности технических и технологических ...
Людмила Александровна Уточкина
doaj  

SOFTWARE TOOLS FOR MODELING of physical processes in the protection of the speech information

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A version of software for the simulation of physical processes in the protection of the speech information in the Java language in the software package Eclipse is shown.
I. V. Savchenko
doaj  

AIR BUBBLE PANEL FOR INFORMATION PROTECTION FROM LEAKAGE VIA TECHNICAL CHANNELS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The description of the design and characteristics of the low weight and size combined air bubble panel for information protection from a leakage via acoustic, electromagnetic and optical technical channels are considered. Values of speech intelligibility
O. B. Zelmanski   +2 more
doaj  

TENDENCIES OF AUTOMATED CONTROL SYSTEMS DEVELOPMENT

open access: yesСовременная наука и инновации, 2022
Questions of new information technologies using in development and deployment of automation systems at the enterprises and business processes are considered.
Valery Abramovich Krishtal
doaj  

Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials

open access: yesТруды Института системного программирования РАН, 2018
Fully homomorphic encryption (FHE) is a recognized tool to obtain the cryptographic protec-tion of cloud computing. However, the characteristics of existing FHE schemes are not suffi-cient for use in practice the security of some FHE is unsatisfying ...
Ph. Burtyka
doaj   +1 more source

SHIELDING AND MASKING PROPERTIES OF THE METAMATERIAL AS SCREENS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
One of the significant channels of information leakage can be radio emission of information source. Channel protection against leakage of information can be provided by shielding the source of information, or by ensuring the secrecy of the object ...
S. F. Ali
doaj  

Principles of selection of the content for teaching students of higher education institutions to technologies of protection of information in the conditions of fundamentalization of education

open access: yesRUDN Journal of Informatization in Education, 2012
In article principles of selection of the maintenance of training of students of high schools to technologies of protection of the information in conditions fundamentalization of education are discussed.
V V Grinshkun, E D Dimov
doaj  

AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with ...
U. A. Vishniakou, M. M. Gongag Sas
doaj  

Home - About - Disclaimer - Privacy