Results 21 to 30 of about 71 (46)

Образ матері в піснях Михайла Ткача [PDF]

open access: yes, 2019
У статті висвітлено характерні особливості образу матері в пісенній ліриці Михайла Ткача: сакральний зміст, елегійність, дидактизм та ін. Доведено, що образ матері є віссю обертання так званого «маминого світу» – одного з головних концептів Ткачевої ...
Гуцуляк, Світлана Іванівна
core   +2 more sources

Privacy Preserving Shortest Path Queries on Directed Graph [PDF]

open access: yes, 2018
Trust relation in this work refers to permission that is given to a user at source-host to access another user at target-host through an authentication key with a unique fingerprint.
chang, cormen, gasarch, meskanen
core   +1 more source

Correlation, mutual information and neural networks [PDF]

open access: yes, 2021
This Master's thesis focuses on different measures of dependence. To study correlation, we introduce not only Pearson's, Spearman's and Kendall's correlation coefficients but also the maximal correlation coefficient.
Rainio, Oona
core  

Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm [PDF]

open access: yes
The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems.
Boonmee, Salinun   +3 more
core   +1 more source

Quantum key distribution for data center security -- a feasibility study

open access: yes, 2023
Data centers are nowadays referred to as the digital world's cornerstone. Quantum key distribution (QKD) is a method that solves the problem of distributing cryptographic keys between two entities, with the security rooted in the laws of quantum physics.
Gambetta, Marco   +4 more
core  

The Rubik\u27s Crypto-Cube: a Trans-Composite Cipher [PDF]

open access: yes, 2010
Cryptography, the art or science of writing messages in code to disguise the content, has been a source of interest for millenia. Those who exchange secret messages do so through the medium of a cryptosystem, a single set of devices used in order to ...
Van der Vieren, Daniel R.
core   +1 more source

Software for text document authorship verification system [PDF]

open access: yes
У даній кваліфікаційній бакалаврській роботі розроблено програмне забезпечення, що забезпечує верифікацію авторства цифрових документів шляхом формування унікального цифрового відбитка (хешу).
Protasov, Roman   +1 more
core   +1 more source

Performance Evaluation of Optimal Ate Pairing on Low-Cost Single Microprocessor Platform [PDF]

open access: yes, 2020
The framework of low-cost interconnected devices forms a new kind of cryptographic environment with diverse requirements. Due to the minimal resource capacity of the devices, light-weight cryptographic algorithms are favored. Many applications of IoT
Pesonen, Mikko
core  

Historiallisia salakirjoitusmenetelmiä [PDF]

open access: yes, 2020
Tässä matematiikan opettajalinjan pro gradu -tutkielmassa käsitellään historiallisesti merkittäviä salakirjoitusmenetelmiä. Tutkielma on ensisijaisesti suunnattu oppimateriaaliksi, jonka lukijalta odotetaan lukion pitkän matematiikan oppimäärän ...
Soini, Satu
core  

Compartmented Threshold RSA Based on the Chinese Remainder Theorem [PDF]

open access: yes, 2008
In this paper we combine the compartmented secret sharing schemes based on the Chinese remainder theorem with the RSA scheme in order to obtain, as a novelty, a dedicated solution for compartmented threshold decryption or compartmented threshold digital ...
Manuela Grindei   +2 more
core  

Home - About - Disclaimer - Privacy