Просмотр собрания по группе - Авторы Yevseiev S. P.

Перейти к: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
или введите несколько первых букв:  
Результаты 5 по 24 из 42 < назад   дальше >
Дата выпускаНазваниеАвтор(ы)
2019Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomyYevseiev S. P.; Aleksiyev V. O.; Balakireva S.; Peleshok Y.; Milov O. V.; Petrov O.; Rayevnyeva O. V.; Tomashevsky B.; Tyshyk I.; Shmatko O. V.
2019Development of a scenario modeling of conflict tools in a security system based on formal grammarsMilov O. V.; Yevseiev S. P.; Vlasov A.; Herasimov S.; Dmitriiev O.; Kasianenko M.; Pievtsov H.; Peleshok Y.; Tkach Y.; Faraon S.
2021Development of an optimization method for measuring the doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulsesYevseiev S. P.; Kuznietsov O. O.; Herasimov S.; Horielyshev S.; Karlov A.; Kovalov I.; Kolomiitsev O.; Lukashuk O.; Milov O. V.; Panchenko V.
2019Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s schemeYevseiev S. P.; Korol O. G.; Havrylova A. A.
2020Development of methodological principles for the construction of a corporate information-educational system of innovative-active university in the framework of anti-corruption activitiesYevseiev S. P.; Rayevnyeva O. V.; Ponomarenko V. S.; Milov O. V.
2020Development of Methods for Improving Crypto Transformations in the Block-Symmetric CodeKochan R.; Yevseiev S. P.; Korolyov R. V.; Milevskyi S. V.; Ireifidzh I.; Gancarczyk T.; Szklarczyk R.
2016Development of multi-factor authentication method based on modified crypto-code Systems Niederreiter – Mac-ElisЕвсеев C. П.; Коц Г. П.; Лекарев Е. В.; Євсеєв С. П.; Лєкарєв Є. В.; Yevseiev S. P.; Kots H. P.; Liekariev Y. V.
2019Development of niederreiter hybrid crypto-code structure on flawed codesYevseiev S. P.; Tsyhanenko O.; Gavrilova A. A.; Guzhva V.; Milov O. V.; Moskalenko V. V.; Opirskyy I.; Roma O.; Tomashevsky B.; Shmatko O. V.
2019Development of the interacting agents behavior scenario in the cyber security systemMilov O. V.; Yevseiev S. P.; Aleksiyev V. O.; Berdnik P.; Voitko O.; Dyptan V.; Ivanchenko Y.; Pavlenko M.; Salii A.; Yarovyy S.
2017The development of the method of multifactor authentication based on hybrid crypto­code constructions on defective codesYevseiev S. P.; Kots H. P.; Minukhin S. V.; Korol O. G.; Kholodkova A. V.; Євсеєв С. П.; Коц Г. П.; Мінухін С. В.; Король О. Г.; Холодкова А. В.; Евсеев C. П.; Минухин С. В.
2018Enhancement of productivity of random sequences generation for information protection systemsBezshtanko V.; Bondarenko V. A.; Gavrylenko O.; Yevseiev S. P.; Ivanchenko S.; Kazakova N.; Korolyov R. V.; Mazor S.; Romanenko V.; Fraze-Frazenko O.
2020Improved umac algorithm with crypto-code mceliece’s schemeYevseiev S. P.; Havrylova A. A.
2020Improved UMAC algorithm with crypto-code McEliece’s schemeYevseiev S. P.; Havrylova A. A.
2021Introduction to specialty: working program of the discipline for students specialty in 125 “Cybersecurity” educational program “Cybersecurity” first (bachelor's) levelYevseiev S. P.; Kovalenko S. M.
2021Management of information security: working program of the discipline for students specialty in 125 “Cybersecurity” educational program “Cybersecurity” first (bachelor's) levelYevseiev S. P.; Goloskokova A. O.
2020Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum periodYevseiev S. P.; Korolyov R. V.; Tkachov A.; Laptiev O.; Opirskyy I.; Soloviova O.
2021Peculiarities of blockchain technology introduction in the field of healthcare: current situation and prospectsKliuchka Y.; Shmatko O. V.; Yevseiev S. P.; Milevskyi S. V.
2018Practical implementation of the Niederreiter modified crypto-code system on truncated elliptic codesYevseiev S. P.; Tsyhanenko O.; Ivanchenko S.; Aleksiyev V. O.; Verheles D.; Volkov S.; Korolev R. V.; Kots H. P.; Milov O. V.; Shmatko O. V.
2019Practical UMAC algorithms based on crypto code designsKorol O. G.; Havrylova A. A.; Yevseiev S. P.
2021Synergy of building cybersecurity systemsYevseiev S. P.; Ponomarenko V. S.; Laptiev O.; Milov O. V.; Korol O. G.; Milevskyi S. V.; Pohasii S.; Tkachov A.; Shmatko O. V.; Melenti Y.; Sievierinov О. V.; Ostapov S. E.; Gavrilova A. A.; Tsyhanenko O.; Herasimov S.; Nyemkova E.; Tomashevsky B.; Hrod I.; Opirskyy I.; Zvieriev V.; Prokopenko O.; Savchenko V.; Barabash O.; Sobchuk V.; Shuklin G.; Khvostenko V.; Tymochko O.; Pavlenko M.; Trystan A.; Florov S.