Protection of Valuable Information in Information Technologies


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.

作者简介

A. Grusho

Federal Research Center Computer Science and Control, Russian Academy of Sciences

编辑信件的主要联系方式.
Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

N. Grusho

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

M. Zabezhaylo

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

E. Timonina

Federal Research Center Computer Science and Control, Russian Academy of Sciences

Email: grusho@yandex.ru
俄罗斯联邦, Moscow, 119333

补充文件

附件文件
动作
1. JATS XML

版权所有 © Allerton Press, Inc., 2018