Tag: data protection

Technology of non-separated factorial coding of speech signals

Purpose. To ensure the exchange of confidential voice information in real time, providing its integrated protection against unauthorized eavesdropping and…

Three-stage permutation-based cryptographic protocol

Purpose. To increase the security of information exchange based on a three-stage cryptographic protocol. Specifications. The three-stage cryptographic protocol can…

INTERFERENCE RADIO CHANNELS OF INFORMATION TRANSMISSION

PURPOSE: Provision of information security and noise immunity of information transmission and processing systems. DESCRIPTION: The content of the project…

HARDWARE AND SOFTWARE COMPLEX FOR IDENTIFICATION AND AUTHENTICATION OF USERS WITH CHANNEL PROTECTION – BIK RIDER (BIK MOUSE)

PURPOSE: The complex is intended for use in any computer systems. It solves the problem of secure secure input of…