Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Abstract:
      For the hijacking of confidential data from computer users who want to give me some information about the safety of their own information, the vicious hand, and the vicious news program. One of these concerns є realizing encryptionis more than necessary for the additional protection of digital signatures before atribute. For cryptosystem robots, encryption with a secure key requires three algorithms: the encryption algorithm, the encryption algorithm, and the key generation algorithm. One of the promising ways to develop encryption with advanced keys is to choose a model for a high degree of discrete logarithms for generating keys, so the Diffie-Hellman algorithm ranks. The spectrum of possible cyber attacks is analyzed, the specifics of their implementation, those are straightforward, the theoretical aspects of the protocol are exchanged with the exchange of Diffie-Hellman keys, the implementation of the protocol is tested, and the protocol is analyzed. [ABSTRACT FROM AUTHOR]
    • Abstract:
      Copyright of Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov is the property of Odessa National Academy of Food Technologies and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)