2021
DOI: 10.15587/978-617-7319-31-2
|View full text |Cite
|
Sign up to set email alerts
|

Synergy of building cybersecurity systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
49
0
3

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 39 publications
(64 citation statements)
references
References 0 publications
1
49
0
3
Order By: Relevance
“…The values given in Table 1 indicate that the collisional properties of authentication codes generated using mini-MASH-1, mini-MASH-2, mini-UMAC AES, and mini-UMAC CCC satisfy the second criterion of versatility. The data obtained by calculation allows to assert that the use of the UMAC scheme on the CCC significantly improves the collision properties of the integrity control and authentication codes [11].…”
Section: Software Implementation Of the Algorithm For The Occurrence Of Collisional Properties Of Hash Codesmentioning
confidence: 97%
“…The values given in Table 1 indicate that the collisional properties of authentication codes generated using mini-MASH-1, mini-MASH-2, mini-UMAC AES, and mini-UMAC CCC satisfy the second criterion of versatility. The data obtained by calculation allows to assert that the use of the UMAC scheme on the CCC significantly improves the collision properties of the integrity control and authentication codes [11].…”
Section: Software Implementation Of the Algorithm For The Occurrence Of Collisional Properties Of Hash Codesmentioning
confidence: 97%
“…To form an expert assessment, we use a modification of the threat classifier, which is proposed in [8,9] and shown in Fig. 4.…”
Section: Wireless Network Security Assessment Based On the Dual-conto...mentioning
confidence: 99%
“…To determine the economic costs of preventing an attack, we use an algorithm based on the cost indicators of threats. This approach makes it possible to estimate the economic costs of deliberate protection mechanisms, taking into account the ranking of potential threats and the importance of information resources to be protected [8]. Both sides of the attack are determined by the importance (ranking) of attacks that are economically feasible to carry out.…”
Section: Wireless Network Security Assessment Based On the Dual-conto...mentioning
confidence: 99%
See 2 more Smart Citations