2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT) 2016
DOI: 10.1109/stc-csit.2016.7589861
|View full text |Cite
|
Sign up to set email alerts
|

Data protection based on encryption using Ateb-functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The differential equations given in (3) with power nonlinearity are solved. The graphic solutions with various parameters of m and n are shown to satisfy the conditions of (4) and (5), and they are periodic. It is shown that solutions of the differential equations with power nonlinearity acquire the values shown in Fig.…”
Section: Construction and Properties Of Ateb-functions For Filtrationmentioning
confidence: 99%
See 1 more Smart Citation
“…The differential equations given in (3) with power nonlinearity are solved. The graphic solutions with various parameters of m and n are shown to satisfy the conditions of (4) and (5), and they are periodic. It is shown that solutions of the differential equations with power nonlinearity acquire the values shown in Fig.…”
Section: Construction and Properties Of Ateb-functions For Filtrationmentioning
confidence: 99%
“…This reduces the noise of the image. The Gabor filter based on the Ateb-functions is effective for filtration, since it contains a generalization of trigonometric functions [5,6].…”
Section: Introductionmentioning
confidence: 99%
“…As is known [5,6], the theoretical stability is determined on the condition that there are no time limits for unauthorized decryption, and therefore it is an answer to the question that the cryptosystem cannot be split in principle. They can be constructed using a random equally probable encryption key, which key length is not less than the length of the open text.…”
Section: Introductionmentioning
confidence: 99%
“…To solve a number of data processing tasks, such as time series predicting [1,2]; computer network traffic modeling [3]; development of the prevention subsystems for the smart home system [4]; development of information technology for environmental monitoring [5]; medical diagnostics [6]; image processing [7,8,9]; dynamic pricing; there is a critical need for an accurate and fast solution of the approximation task.…”
Section: Introductionmentioning
confidence: 99%