Preview

Advanced Engineering Research (Rostov-on-Don)

Advanced search

Search


Order results by:     
 
Issue Title
 
Vol 11, No 9 (2011) VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS Abstract  similar documents
Nadezhda S. Mogilevskaya, Sergey S. Kolchanov
"... The possibility of using colored Petri nets for the analysis of key distribution cryptographic ..."
 
Vol 12, No 1-2 (2012) SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC Abstract  similar documents
Nadezhda S. Mogilevskaya
"... The idea of analyzing cryptographic key generation protocols through BAN - logic methods ..."
 
Vol 19, No 2 (2019) Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem Abstract  PDF (Eng)  similar documents
P. V. Razumov, I. A. Smirnov, I. A. Pilipenko, A. V. Selyova, L. V. Cherkesova
"... Introduction. The NTRUEncrypt cryptographic system, the calculation of the algorithmic complexity ..."
 
Vol 16, No 4 (2016) Application of colored timed Petri nets for cement production simulation Abstract  similar documents
Irina A. Sedykh, Eugeny S. Anikeev
"... production - on the basis of the colored timed Petri nets including its analysis and estimation ..."
 
Vol 17, No 3 (2017) Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting Abstract  similar documents
Larisa V. Cherkesova, Olga A. Safaryan, Alexander V. Mazurenko, Nadezhda S. Arkhangelskaya
"... to use the apparatus of linear algebra to make effective decisions on cryptographic problems. To estimate ..."
 
Vol 11, No 7 (2011) DETECTION OF DEADLOCKS IN PARALLEL PROGRAMS AS SOLUTION OF LINEAR DIOPHANTINE EQUATIONS Abstract  similar documents
Olga F. Babakhyan
"... is considered. The system is presented in the form of a model through the formal specification by means of Petri ..."
 
Vol 18, No 2 (2018) Geometric realization of electronic elections based on threshold secret sharing Abstract  similar documents
A. V. Mazurenko, V. A. Stukopin
"... with the cryptographic security. Materials and Methods. The results are obtained on the basis of the following ..."
 
Vol 15, No 1 (2015) Correcting capacity of soft-decision decoder of ternary Reed - Muller second-order codes with a large number of errors Abstract  similar documents
Nadezhda Sergeyevna Mogilevskaya
"... , and in a number of the cryptographic applications. ..."
 
Vol 18, No 2 (2018) Architecture and implementation of online testing to check solutions to Olympiad programming problems Abstract  similar documents
E. V. Shagilova
 
Vol 18, No 3 (2018) DIFFERENTIATION OF POLYNOMIALS IN SEVERAL VARIABLES OVER GALOIS FIELDS OF FUZZY CARDINALITY AND APPLICATIONS TO REED-MULLER CODES Abstract  PDF (Eng)  similar documents
V. M. Deundyak, N. S. Mogilevskaya
"... -Muller coding theory, and are also used  in a number of cryptographic problems. The properties ..."
 
Vol 24, No 2 (2024) Modeling the Dynamic Loads Affecting a Bridge Crane during Start-Up Abstract  PDF (Eng)  PDF (Eng)  similar documents
I. R. Antipas
"... systems. It is vital to ensure that the proper crane maintenance and inspection protocols are in place ..."
 
1 - 11 of 11 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default articles containing any term in the query are returned (i.e., OR is implied)
  • Make sure that a word exists in an article by prefixing it with +; e.g., +journal +access scholarly academic
  • Combine multiple words with AND to find articles containing all terms; e.g., education AND research
  • Exclude a word by prefixing it with - or NOT; e.g., online -politics or online NOT politics
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing". Hint: Quoting Chinese or Japanese words will help you to find exact word matches in mixed-language fields, e.g. "中国".
  • Use parentheses to create more complex queries; e.g., archive ((journal AND conference) NOT theses)