Approach to the Construction of Models of Protection of Automated Systems from Unauthorized Access
Keywords:
mathematical modeling, automatic control theory, information securityAbstract
The main problem of constructing a model of protection of automated systems from unauthorized access are presented. A part of the job for software development required to reach one of the goals is formulated.References
Hashizume Naoki, Momose Fumiyuki, Chao Jinhui. On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics. - 2008.
Brown Daniel R. L. The Encrypted Elliptic Curve Hash. - 2008.
Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы / А. А. Болотов [и др.]. - М. : КомКнига, 2006. - 328 с.
Downloads
Published
15.12.2011
How to Cite
Karpova О. О., Krotov Л. Н., Krotova Е. Л., & Osipovich А. Э. (2011). Approach to the Construction of Models of Protection of Automated Systems from Unauthorized Access. Vestnik IzhGTU Imeni M.T. Kalashnikova, (4), 148–149. Retrieved from https://izdat.istu.ru/index.php/vestnik/article/view/2634
Issue
Section
Articles