Results 31 to 40 of about 1,954 (70)

Cows, clicks, ciphers, and satire

open access: yesNECSUS, 2015
The social network game Farmville, which allows players to grow crops, raise animals, and produce a variety of goods, proved enormously successful within a year of its launch in 2009, attracting 110 million Facebook users.
Tom Tyler
doaj   +1 more source

Information Security of Soviet Partisans and Underground during World War II

open access: yesБезопасность информационных технологий, 2011
This article deals with the ciphers and some other methods of data protection and communication means used by the soviet partisans during World War II.
D. A. Larin
doaj  

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
doaj   +1 more source

«The black room» the Russian foreign Ministry against Napoleon

open access: yesVestnik MGIMO-Universiteta, 2012
This article deals with the successful activity of the Russian Empire cryptographers against Napoleon and his troops. Also some organizational work aspects of interception of French army cipher messages are considered.
D. E. Larin
doaj   +1 more source

Kriptografi Polyalphabetic

open access: yesMatematika, 2018
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan.
Yurika Permanasari, Erwin Harahap
doaj   +1 more source

About the Soviet Cryptographs Contribution on the Victory by Moscow

open access: yesБезопасность информационных технологий, 2011
On December 5, 2011, we mark the 70th anniversary of the first great defeat on the fascist Germany during the Soviet troops’ counter-offensive of Moscow, which has become the first step towards to the Victory Day.
D. A. Larin
doaj  

The Methods of Information Security Based on Blurring of System

open access: yesБезопасность информационных технологий, 2016
The paper present the model of researching system with own known input, output and set of discrete internal states. These theoretical objects like an absolutely protected from research system and an absolutely indiscernible data transfer channel are ...
Mikhail Andreevich Styugin
doaj  

Child Health Clinical Outcome Review Programme: Health Care Utilisation, Care Pathways and Educational Status in Children and Young People with Adolescent Mental Health problems with a focus on Self harm, Eating Disorders and Anxiety and Depression

open access: yesInternational Journal of Population Data Science, 2017
Objectives To use routinely collected datasets and data linkage to identify patterns of healthcare utilisation by children and young people (CYP) with adolescent mental health (AMH) disorders across the four UK Nations, with a particular focus on self ...
Sophie Wood   +4 more
doaj   +1 more source

Inhibitor Petri Net that Executes an Arbitrary Given Markov Normal Algorithm

open access: yesМоделирование и анализ информационных систем, 2011
The inhibitor Petri net with a fixed structure that executes an arbitrary given Markov normal algorithm was constructed. The algorithm and its input string are encoded by nonnegative integer numbers and put into dedicated places of the Petri net which ...
D. A. Zaitsev
doaj  

Features of Structural Hardware Transformation of Information in Cryptosystems

open access: yesDoklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki
The article considers types, functions and some features of cryptosystems, as well as circuit design options for expanding their functionality. Options for generating keys and ciphers used in cryptosystems with a typical structural organization, and ...
A. F. Chernyavskiy   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy