2019
DOI: 10.15587/1729-4061.2019.175978
|View full text |Cite
|
Sign up to set email alerts
|

Development of the model of the antagonistic agents behavior under a cyber conflict

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 24 publications
0
17
0
1
Order By: Relevance
“…One of the promising areas, according to the USA NIST experts, is the use of McEliece and Niederreiter crypto-code structures. Practical algorithms for providing basic security services: confidentiality, integrity and authenticity are proposed in [57][58][59]. This approach, taking into account their commercial implementation, does not contain cryptocurrencies and provides not only the required level of cryptographic security, but also the reliability and efficiency of the transmitted data.…”
Section: Discussion Of the Results Of The Methodology Study Using Thementioning
confidence: 99%
“…One of the promising areas, according to the USA NIST experts, is the use of McEliece and Niederreiter crypto-code structures. Practical algorithms for providing basic security services: confidentiality, integrity and authenticity are proposed in [57][58][59]. This approach, taking into account their commercial implementation, does not contain cryptocurrencies and provides not only the required level of cryptographic security, but also the reliability and efficiency of the transmitted data.…”
Section: Discussion Of the Results Of The Methodology Study Using Thementioning
confidence: 99%
“…The methodology is based on a comprehensive approach to assessing the effectiveness of the DL system based on the contributions of subsystems of regulatory, organizational, scientific-methodological, information and telecommunications, mathematical and software, logistics, personnel, financial and economic support. It is based on the methods of probability theory [7] and analysis of hierarchies [9] to describe the impact of the importance of contributions of subsystems of the DL system.…”
Section: Methodology For Evaluation Of the Efficiency Of The Functionmentioning
confidence: 99%
“…In the Russian-language literature to denote [1][2][3][4][5] these concepts use "bookmarks", "loopholes" and "back door" and even "secret passages". Methods of embedding bookmarks in cryptographic algorithms can be divided into three main groups: weak bookmarks, transmission of information through hidden channels, the SETUP mechanism [6][7]. Weak bookmarks are a deliberate weakening of the algorithm, which allows you to know the secret information of the user based on open information [8][9].…”
Section: Literature Analysis and Problem Statementmentioning
confidence: 99%