Methods for the protection of transmitted information system remote monitoring and control high-tech objects

There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.

Saved in:
Bibliographic Details
Main Authors: I. A. Kalmykov, V. P. Pashintsev, O. V. Velts, M. I. Kalmykov
Format: Article
Language:Russian
Published: North Caucasus Federal University 2022-05-01
Series:Вестник Северо-Кавказского федерального университета
Subjects:
Online Access:https://vestnikskfu.elpub.ru/jour/article/view/1633
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849244874592747520
author I. A. Kalmykov
V. P. Pashintsev
O. V. Velts
M. I. Kalmykov
author_facet I. A. Kalmykov
V. P. Pashintsev
O. V. Velts
M. I. Kalmykov
author_sort I. A. Kalmykov
collection DOAJ
description There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.
format Article
id doaj-art-eee6d84461734ae8a708d0e0ecf72c1d
institution Kabale University
issn 2307-907X
language Russian
publishDate 2022-05-01
publisher North Caucasus Federal University
record_format Article
series Вестник Северо-Кавказского федерального университета
spelling doaj-art-eee6d84461734ae8a708d0e0ecf72c1d2025-08-20T03:59:00ZrusNorth Caucasus Federal UniversityВестник Северо-Кавказского федерального университета2307-907X2022-05-010438431631Methods for the protection of transmitted information system remote monitoring and control high-tech objectsI. A. Kalmykov0V. P. Pashintsev1O. V. Velts2M. I. Kalmykov3NCFUNCFUNCFUNCFUThere is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.https://vestnikskfu.elpub.ru/jour/article/view/1633протокол доказательства с нулевым разглашениемметоды защиты данныхимитозащитамодулярная арифметикапсевдослучайная функцияzero-knowledge proof protocoldata protection methodsimulation protectionmodular arithmeticspseudorandom function
spellingShingle I. A. Kalmykov
V. P. Pashintsev
O. V. Velts
M. I. Kalmykov
Methods for the protection of transmitted information system remote monitoring and control high-tech objects
Вестник Северо-Кавказского федерального университета
протокол доказательства с нулевым разглашением
методы защиты данных
имитозащита
модулярная арифметика
псевдослучайная функция
zero-knowledge proof protocol
data protection method
simulation protection
modular arithmetics
pseudorandom function
title Methods for the protection of transmitted information system remote monitoring and control high-tech objects
title_full Methods for the protection of transmitted information system remote monitoring and control high-tech objects
title_fullStr Methods for the protection of transmitted information system remote monitoring and control high-tech objects
title_full_unstemmed Methods for the protection of transmitted information system remote monitoring and control high-tech objects
title_short Methods for the protection of transmitted information system remote monitoring and control high-tech objects
title_sort methods for the protection of transmitted information system remote monitoring and control high tech objects
topic протокол доказательства с нулевым разглашением
методы защиты данных
имитозащита
модулярная арифметика
псевдослучайная функция
zero-knowledge proof protocol
data protection method
simulation protection
modular arithmetics
pseudorandom function
url https://vestnikskfu.elpub.ru/jour/article/view/1633
work_keys_str_mv AT iakalmykov methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects
AT vppashintsev methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects
AT ovvelts methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects
AT mikalmykov methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects