2022
DOI: 10.15587/978-617-7319-57-2
|View full text |Cite
|
Sign up to set email alerts
|

Modeling of security systems for critical infrastructure facilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…[34][35][36][37][38][39]. In addition, the research carried out [1][2][3][27][28][29][30][31][32][33][34][35][36][37][38][39] makes it possible to use various algebrogeometric codes, LDPC codes with defective codes, which makes it possible to build hybrid crypto-code constructions and provide the required efficiency and strength of confidential cryptography. The initial data for constructing such structures is the required parameters of durability and efficiency of transmitted information.…”
Section: Materials and Research Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [9], it is expand the areas of smart technologies. Such systems typically use the Secure Sockets Layer (SSL)/Transport Level Security (TLS) (SSL/TLS) protocol stack to provide security services, which allows providing authentication, integrity, and confidentiality services [1][2][3][4][5]. This stack is formed on complex symmetric algorithms that simultaneously provide both encryption and generation of MAC codes [1,[6][7][8].…”
Section: Introductionmentioning
confidence: 99%