Entanglement Structure and Information Protection in Noisy Hybrid Quantum Circuits. [PDF]
In the context of measurement-induced entanglement phase transitions, the influence of quantum noises, which are inherent in real physical systems, is of great importance and experimental relevance.
Shuo Liu +3 more
semanticscholar +1 more source
Mechanisms of protection of information in computer networks and systems
Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified.
Sergey Petrovich Evseev +2 more
doaj +1 more source
Protected Spaces in Smart Cities and the Identification of New Radio Signals in their Environment using a Complex Measurement Method [PDF]
This research focuses on the creation of a security boundary through the establishment of information security, more specifically by creating an environment that allows for information security for people-to-people communication.
Gábor Bréda, Péter János Varga
doaj +1 more source
Development and design of an FPGA-based encoder for NPN
This paper describes a cryptographic protection system hardware device designed to improve data encryption and decryption performance and preserve data integrity.
M.K. Ibraimov +4 more
doaj +1 more source
Assessment of information security risks of automated system using neuro-fuzzy logic
Objective. Automated systems are widely used in production, and an important criterion for their reliability is information security. The aim of the study is to provide a balance between possible losses as a result of the implementation of threats and ...
A. R. Aydinyan, O. L. Tsvetkova
doaj +1 more source
The contribution of a good relationship between internal audit and information systems to information protection outcomes: The case of banks in Greece [PDF]
Research Question: How is the impact of the relationship between internal control and information systems on information protection outcomes moderated by the characteristics of the internal auditor, the characteristics of quality information systems ...
Dimitrios Mitskinis
doaj +1 more source
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation [PDF]
The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems.
Aleksandra Horubała +3 more
doaj +1 more source
Modern system of education in the field of information security in the Russian Federation
The modern education system in the field of information security in the Russian Federation, based on consideration of educational and professional standards is analyzed.
M. S. Anureva
doaj +1 more source
ELECTRONIC VOTING TECHNOLOGIES IN RUSSIA
Following the global trend related to the use of digital technologies in the political process, Russia is actively introducing electronic voting technologies. Their application provides a number of advantages in the organization and conduct of elections,
O. V. Erokhina
doaj +1 more source
The results of the study of the values of the reflection coefficients and the effective scattering surface of the developed design of the electromagnetic radiation screen in the frequency range of 2…12 GHz are considered.
S. E. Savanovich, T. V. Borbotko
doaj +1 more source

