2021
DOI: 10.31891/2307-5732-2021-303-6-49-54
|View full text |Cite
|
Sign up to set email alerts
|

Usage of Hash Methods in the Cryptographic Data Analysis

Abstract: The tasks of information security system include identifying potential or actual sources of threat to system’s work and minimizing consequences of unauthorized influence on it. While solving them, arises the need of restoration of the initial state of the information system, especially the data integrity. While performing information message analysis the other task may be finding differences between two data fragments or their instances. This paper offers methods of the complex solution of the information secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 0 publications
0
0
0
Order By: Relevance