Results 21 to 30 of about 71 (46)
Образ матері в піснях Михайла Ткача [PDF]
У статті висвітлено характерні особливості образу матері в пісенній ліриці Михайла Ткача: сакральний зміст, елегійність, дидактизм та ін. Доведено, що образ матері є віссю обертання так званого «маминого світу» – одного з головних концептів Ткачевої ...
Гуцуляк, Світлана Іванівна
core +2 more sources
Privacy Preserving Shortest Path Queries on Directed Graph [PDF]
Trust relation in this work refers to permission that is given to a user at source-host to access another user at target-host through an authentication key with a unique fingerprint.
chang, cormen, gasarch, meskanen
core +1 more source
Correlation, mutual information and neural networks [PDF]
This Master's thesis focuses on different measures of dependence. To study correlation, we introduce not only Pearson's, Spearman's and Kendall's correlation coefficients but also the maximal correlation coefficient.
Rainio, Oona
core
Comparative study of password storing using hash function with MD5, SHA1, SHA2, and SHA3 algorithm [PDF]
The main purpose of passwords is to prevent unauthorized people from accessing the system. The rise in internet users has led to an increase in password hacking, which has resulted in a variety of problems.
Boonmee, Salinun +3 more
core +1 more source
Quantum key distribution for data center security -- a feasibility study
Data centers are nowadays referred to as the digital world's cornerstone. Quantum key distribution (QKD) is a method that solves the problem of distributing cryptographic keys between two entities, with the security rooted in the laws of quantum physics.
Gambetta, Marco +4 more
core
The Rubik\u27s Crypto-Cube: a Trans-Composite Cipher [PDF]
Cryptography, the art or science of writing messages in code to disguise the content, has been a source of interest for millenia. Those who exchange secret messages do so through the medium of a cryptosystem, a single set of devices used in order to ...
Van der Vieren, Daniel R.
core +1 more source
Software for text document authorship verification system [PDF]
У даній кваліфікаційній бакалаврській роботі розроблено програмне забезпечення, що забезпечує верифікацію авторства цифрових документів шляхом формування унікального цифрового відбитка (хешу).
Protasov, Roman +1 more
core +1 more source
Performance Evaluation of Optimal Ate Pairing on Low-Cost Single Microprocessor Platform [PDF]
The framework of low-cost interconnected devices forms a new kind of cryptographic environment with diverse requirements. Due to the minimal resource capacity of the devices, light-weight cryptographic algorithms are favored. Many applications of IoT
Pesonen, Mikko
core
Historiallisia salakirjoitusmenetelmiä [PDF]
Tässä matematiikan opettajalinjan pro gradu -tutkielmassa käsitellään historiallisesti merkittäviä salakirjoitusmenetelmiä. Tutkielma on ensisijaisesti suunnattu oppimateriaaliksi, jonka lukijalta odotetaan lukion pitkän matematiikan oppimäärän ...
Soini, Satu
core
Compartmented Threshold RSA Based on the Chinese Remainder Theorem [PDF]
In this paper we combine the compartmented secret sharing schemes based on the Chinese remainder theorem with the RSA scheme in order to obtain, as a novelty, a dedicated solution for compartmented threshold decryption or compartmented threshold digital ...
Manuela Grindei +2 more
core

