Methods for the protection of transmitted information system remote monitoring and control high-tech objects
There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
North Caucasus Federal University
2022-05-01
|
| Series: | Вестник Северо-Кавказского федерального университета |
| Subjects: | |
| Online Access: | https://vestnikskfu.elpub.ru/jour/article/view/1633 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849244874592747520 |
|---|---|
| author | I. A. Kalmykov V. P. Pashintsev O. V. Velts M. I. Kalmykov |
| author_facet | I. A. Kalmykov V. P. Pashintsev O. V. Velts M. I. Kalmykov |
| author_sort | I. A. Kalmykov |
| collection | DOAJ |
| description | There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data. |
| format | Article |
| id | doaj-art-eee6d84461734ae8a708d0e0ecf72c1d |
| institution | Kabale University |
| issn | 2307-907X |
| language | Russian |
| publishDate | 2022-05-01 |
| publisher | North Caucasus Federal University |
| record_format | Article |
| series | Вестник Северо-Кавказского федерального университета |
| spelling | doaj-art-eee6d84461734ae8a708d0e0ecf72c1d2025-08-20T03:59:00ZrusNorth Caucasus Federal UniversityВестник Северо-Кавказского федерального университета2307-907X2022-05-010438431631Methods for the protection of transmitted information system remote monitoring and control high-tech objectsI. A. Kalmykov0V. P. Pashintsev1O. V. Velts2M. I. Kalmykov3NCFUNCFUNCFUNCFUThere is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.https://vestnikskfu.elpub.ru/jour/article/view/1633протокол доказательства с нулевым разглашениемметоды защиты данныхимитозащитамодулярная арифметикапсевдослучайная функцияzero-knowledge proof protocoldata protection methodsimulation protectionmodular arithmeticspseudorandom function |
| spellingShingle | I. A. Kalmykov V. P. Pashintsev O. V. Velts M. I. Kalmykov Methods for the protection of transmitted information system remote monitoring and control high-tech objects Вестник Северо-Кавказского федерального университета протокол доказательства с нулевым разглашением методы защиты данных имитозащита модулярная арифметика псевдослучайная функция zero-knowledge proof protocol data protection method simulation protection modular arithmetics pseudorandom function |
| title | Methods for the protection of transmitted information system remote monitoring and control high-tech objects |
| title_full | Methods for the protection of transmitted information system remote monitoring and control high-tech objects |
| title_fullStr | Methods for the protection of transmitted information system remote monitoring and control high-tech objects |
| title_full_unstemmed | Methods for the protection of transmitted information system remote monitoring and control high-tech objects |
| title_short | Methods for the protection of transmitted information system remote monitoring and control high-tech objects |
| title_sort | methods for the protection of transmitted information system remote monitoring and control high tech objects |
| topic | протокол доказательства с нулевым разглашением методы защиты данных имитозащита модулярная арифметика псевдослучайная функция zero-knowledge proof protocol data protection method simulation protection modular arithmetics pseudorandom function |
| url | https://vestnikskfu.elpub.ru/jour/article/view/1633 |
| work_keys_str_mv | AT iakalmykov methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects AT vppashintsev methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects AT ovvelts methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects AT mikalmykov methodsfortheprotectionoftransmittedinformationsystemremotemonitoringandcontrolhightechobjects |