Results 31 to 40 of about 1,954 (70)
Cows, clicks, ciphers, and satire
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj +1 more source
Information Security of Soviet Partisans and Underground during World War II
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua+2 more
doaj +1 more source
«The black room» the Russian foreign Ministry against Napoleon
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj +1 more source
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan.
Yurika Permanasari, Erwin Harahap
doaj +1 more source
About the Soviet Cryptographs Contribution on the Victory by Moscow
On December 5, 2011, we mark the 70th anniversary of the first great defeat on the fascist Germany during the Soviet troops’ counter-offensive of Moscow, which has become the first step towards to the Victory Day.
D. A. Larin
doaj
The Methods of Information Security Based on Blurring of System
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj
Objectives To use routinely collected datasets and data linkage to identify patterns of healthcare utilisation by children and young people (CYP) with adolescent mental health (AMH) disorders across the four UK Nations, with a particular focus on self ...
Sophie Wood+4 more
doaj +1 more source
Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj
Features of Structural Hardware Transformation of Information in Cryptosystems
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy+2 more
doaj +1 more source