Tag: data protection
Technology of non-separated factorial coding of speech signals
Purpose. To ensure the exchange of confidential voice information in real time, providing its integrated protection against unauthorized eavesdropping and…
Three-stage permutation-based cryptographic protocol
Purpose. To increase the security of information exchange based on a three-stage cryptographic protocol. Specifications. The three-stage cryptographic protocol can…
INTERFERENCE RADIO CHANNELS OF INFORMATION TRANSMISSION
PURPOSE: Provision of information security and noise immunity of information transmission and processing systems. DESCRIPTION: The content of the project…
HARDWARE AND SOFTWARE COMPLEX FOR IDENTIFICATION AND AUTHENTICATION OF USERS WITH CHANNEL PROTECTION – BIK RIDER (BIK MOUSE)
PURPOSE: The complex is intended for use in any computer systems. It solves the problem of secure secure input of…