Кафедра безпеки інформаційних технологій (БІТ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра безпеки інформаційних технологій (БІТ) за датою видання
Зараз показано 1 - 20 з 355
Результатів на сторінку
Варіанти сортування
Публікація Эквивалентность решения задач Диффи-Хеллмана и дискретного логарифма в мультипликативной группе конечного поля(ХНУРЭ, 2009) Надточий, Д. К.Equivalence of solving the Diffie-Hellman problem and solving discrete logarithm problem is considered.Публікація Биометрическая аутентификация на основе применения гибридной вэйвлет-нейронной сети(ХНУРЭ, 2009) Галушка, И. В.Iris patterns become interesting as an alternative approach to reliable visual recognition persons, and especially when there is a need to search very large databases. Although small (11 mm) and sometimes problematic to image, the iris has the great mathematical advantage that its pattern variability among different persons is enormous. In addition, the iris is well protected from the environment and stable over timeПублікація Виявлення залежності між сеансовими ключами ецп ecnr стандарту ISO/IEC 15946-4(ХНУРЭ, 2009) Шевчук, О. А.In modern schemes of digital signature signing algorithm divided in two steps: generation of pre-signature, and signing message with pre-signature. Main component of pre-signature is session key. Session key must be received absolutely randomly. Discovered situation when certain connection between session keys may be detectedПублікація Застосування геш-хамелеону у протоколах електронного цифрового підпису на основі білінійних відображень у системах на ідентифікаторах(ХНУРЭ, 2009) Погребняк, К. А.; Іщенко, Ю. М.The advantages of deployment of Identity-Based Systems and Hash-Chameleons are considered. The analysis of protocols of signatures with Hashchameleon based on using bilinear maps was made.Публікація Программное средство для проектирования многошаговых преобразователей кодов параллельного типа(ХНУРЭ, 2009) Бочаров, Е. В.In this paper is described the algorithm of work of a program that emulates the work of n-step transformer of codes of both parallel and consecutive typesПублікація Характеристика сертифікатів евростандарту та стандарту сертифіката Х509(ХНУРЭ, 2009) Фоков, В. И.Electronic digital signature can be used by any person as the hand made signature to make electronic document Law powerful . The law power of electronic document signed by Electronic digital signature is the same as the signature on the paper, signed by hand law active person or make a stamp on it.Публікація Розробка заходів захисту від ЛСАР(ХНУРЭ, 2009) Резніченко, С. О.; Ковальчук, Ю. М.The given work is devoted to research of possibilities of laser systems of acoustic reconnaissance. Research consists in building and the analysis of corresponding quantitative models, for obtaining the results which can be used in process of assessment of the information leakage channel and building the measures of protection.Публікація Анализ уязвимостей системы доменных имен в сетях TCP/IP(ХНУРЭ, 2009) Килипко, С. В.This report considers approach to describing the security issues for Domain Name System. Also author describes extensions to DNS that provide data integrity and authentication to security aware resolvers and applications thought the use of cryptographic digital signatures.Публікація Системы цифровой подписи и направленного шифрования на идентификаторах(ХНУРЭ, 2009) Козулин. A. A.This work is devoted applications of bilinear pairings in cryptography and contains basic concepts and ideas of the use of the id-based systems.Публікація Оптимізація витрат підприємства на захист інформації(ХНУРЭ, 2009) Левітін, П. Є.State standard DSTU 3396.1-96 defines the order or work on organization of information security. In the report the the question of optimization of information security cost is discussed for achieving the maximum profit from enterprise.Публікація Оцінка спектрального складу випромінювань ЗОТ в умовах відбиття від кількох поверхонь з різними характеристиками(ХНУРЭ, 2009) Ясиновий, С. Ю.Іп scientific the situation of providmg ot detence ot side electromagnetic radiations of facilities of the computing engineering is considered to facilities of radiorozvidki on small distances, taking into account the reflection of signal from a terrene and other substantial surfaces on the way of distribution of viprominyuvach-priymach. Research purpose - a construction of theoretical model of channel of side electromagnetic radiations is with the factor of interference.Публікація Технологии защиты информации на основе применения тестирования(ХНУРЭ, 2009) Семченко, Д. А.; Дейнеко, А. А.The given work is devoted to construction of model informational safety in ITS on the basis of carrying out of testing. The purpose of the work is creation of protected ITS system from the malefactor by research of various attacks for ITS system. The software is developed, permitting to create the protected information system.Публікація Корреляционные свойства блочных симметричных шифров, представленных на открытый конкурс(ХНУРЭ, 2009) Дроботько, Е. В.; Еригорьев, A. B.Analytical review of correlated characteristic’s estimation procedures of encryption transformation is given in the article. Authors provide some new results about an application of these estimation procedures for scaled versions of symmetric block ciphers, e.g. LABIRINT.Публікація Разработка показателей оценки эффективности систем обнаружения вторжений(ХНУРЭ, 2009) Герцог, А. Н.Intrusion detection system evaluation is considered. Qualitative and quantitative indicators of practical functionality IDSs are investigated for developing a scoring system.Публікація Анализ эффективности применения представлений больших целых чисел по множественным основаниям в несимметричной криптографии(ХНУРЭ, 2009) Шепляков, Р. И.The efficiency of using double oase ana multiple oase number representations in public-key cryptography is consideredПублікація Порівняльний аналіз методів аналізу ризиків Magerit та MEHARI(ХНУРЭ, 2009) Хоменко, А. В.Main deficiencies of risk analysis (RA) documentation were discussed. Methods Magerit and MEHARI were chosen as those are containing system features. Results of their comparison were given. A task of creating enhanced RA method suitable for practical appliance was posed.Публікація Анализ и оценивание информационных рисков(ХНУРЭ, 2009) Одарченко, А. С.; Дейнеко, А. А.In the given report questions of methods of an estimation of information risks are discussed. Existing techniques and algorithms of an estimation of risks and also an urgency and expediency of an estimation of information risks are considered. Ordered results possible adapt in different organizations with different levels of IMS.Публікація Функциональное тестирование программноаппаратных комплексов(ХНУРЭ, 2009) Мостовая, К. Л.; Денисов. Е. А.The given work is devoted to the functional testing approach of modern HW/SW systems in order to confirm that product meets the initial functional expectations. The work presents the approach of testing HW and SW components of complex digital systems.Публікація Пути повышения практической подготовки студентов по дисциплине «техническая защита информации»(ХНУРЭ, 2009) Халина, О. М.The given work is devoted consideration of problems of upgrading preparation of specialists with higher education, control of educational work and estimation of knowledges of studentsПублікація Стан створення та застосування методів генерування ЗСП(ХНУРЭ, 2009) Фролов, О. С.Qualified work contains the analysis of algorithms of generation general system parameters to the cryptography systems realized in group of points of elliptic curves. The comparative analysis of resistance of unsymmetrical systems realized in rings, fields and groups of points of elliptic curves is resulted. And also resistance of various algorithms of a digital signature attack of a selective fake. The advanced method of definition about random generated curve is developed.