This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Sat 21 of Dec, 2024 [18:29 UTC]
Menu

Category D.4.6 Security and Protection

Access controls Authentication Cryptographic controls Information flow controls Invasive software (e.g., viruses, worms, Trojan horses) Security kernels Verification
Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

..
 

Objects (15)

D.4.6 Security and Protection Article ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of info 
D.4.6 Security and Protection Article ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to and within it, is made. Main techniques for accomplishing an attack to virtual enviro 
D.4.6 Security and Protection Article ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to and within it, is made. Main techniques for accomplishing an attack to virtual enviro 
D.4.6 Security and Protection Article APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’ groups of compression, to the co-efficient of information security of selected objects� 
D.4.6 Security and Protection Article CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of parti 
D.4.6 Security and Protection Article CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In contrast to traditional biometric systems, proposed algorithm does not authenticate user by  
D.4.6 Security and Protection Article EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... Abstract: The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression fo 
D.4.6 Security and Protection Article IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small devices are very widespread around the world - security are still being understood. As a result 
D.4.6 Security and Protection Article INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89 information attacks, joined in 33 groups and 73 methods of compression, joined in 10 grou 
D.4.6 Security and Protection Article INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordi 
D.4.6 Security and Protection Article PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS Abstract: The paper is devoted to analysis of effectiveness the usage of modern statistical model of digital image for revealing the stego images with data, embedded in transformation domain of cover 
D.4.6 Security and Protection Article RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-eff 
D.4.6 Security and Protection Article THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS Abstract: This paper suggest a generic threat model for the processes in e-learning systems. After a breaf discussion of the particularities of e-learning systems from the security point of view, the 
D.4.6 Security and Protection Article VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ... Abstract: The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in 
D.4.6 Security and Protection Article КОСВЕННАЯ СТЕГАНОГРАФИЯ Аннотация: Описывается оригинальный метод шифрования и дешифрования на основе способа, называемого косвенн 

Page: 1/1
1  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.21 secs ]   [ Memory usage: 9.10MB ]   [ GZIP Disabled ]   [ Server load: 0.38 ]