Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Methods for Privacy Support in the Decentralized Environment
Application of Bluetooth, Wi-Fi and Gps Technologies in the means of Contact Tracking
Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks
Cryptographic Transformations in a Decentralized Blockchain Environment
Statistical and Signature Analysis Methods of Intrusion Detection
Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms
Methods of Evaluation and Comparative Research of Cryptographic Conversions
Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems
Comparative Analysis of Consensus Algorithms that use a Directed Acyclic Graph Instead of a Blockchain, and Construction of Estimates of the SPECTRE Protocol Security to the Double Spend Attack
Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks
The Methods of Data Comparison in Residue Numeral System
Data Control in the System of Residual Classes
Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks.

Browse Subjects

Show more subjects...

Statistics

from
to
Export