Approach to the Construction of Models of Protection of Automated Systems from Unauthorized Access

Karpova O.O., Krotov L.N., Krotova E.L., Osipovich A.E.

Abstract


The main problem of constructing a model of protection of automated systems from unauthorized access are presented. A part of the job for software development required to reach one of the goals is formulated.

Keywords


mathematical modeling; automatic control theory; information security

References References

Hashizume Naoki, Momose Fumiyuki, Chao Jinhui. On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics. - 2008.

Brown Daniel R. L. The Encrypted Elliptic Curve Hash. - 2008.

Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы / А. А. Болотов [и др.]. - М. : КомКнига, 2006. - 328 с.


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM


Copyright (c) 2011 Bulletin of Kalashnikov ISTU

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


ISSN 1813-7903 (Print)
ISSN 2413-1172 (Online)