Published 12 issues per year
ISSN Print: 0040-2508
ISSN Online: 1943-6009
Indexed in
Methods of Authentication of Information Protection Systems and Controlling Software
ABSTRACT
The problem of the impact of destructive programs on hardware information protection systems is analyzed. Methods for monitoring the legality of commands of the software controlling protection hardware are proposed.
-
Tanygin M.O., Alshaeaa H.Y., Altukhova V.A., Establishing Trusted Channel for Data Exchange between Source and Receiver by Modified One-time Password Method, 2019 International Russian Automation Conference (RusAutoCon), 2019. Crossref
-
Primenko D. V., Spevakov A. G., Spevakova S. V., Depersonalization of Personal Data in Information Systems, in Advances in Automation, 641, 2020. Crossref
-
Tanygin M. O., Efremov M. A., Hyder Ya. A., Analysis of the Secure Data Transmission System Parameters, in Advances in Automation, 641, 2020. Crossref
-
Tanygin M. O., Dobritsa V. P., Alshaeaa H. Y., Study of the Influence of the Unauthorized Blocks Number on the Collision Probability, in Advances in Automation II, 729, 2021. Crossref
-
Maxim Olegovich Tanygin, Vyacheslav Porfirevich Dobritsa, Yahya Alshaeaa Hyder, Study of the influence of the unauthorized blocks number on the speed and RAM expenses during the data analysis process, IOP Conference Series: Materials Science and Engineering, 928, 3, 2020. Crossref