Искать
Отображаемые элементы 1-2 из 2
Models of Pseudonondeterministic Cryptographic Transformations
(ВНТУ, 2017)
The analyses of possible approaches of
cryptographic transformation performance from the
automata theory point of view are presented. The choice
of pseudonondeterministic approach for cryptographic
transformations ...
System of the SQL Injection Prevention
(ВНТУ, 2017)
One of the most dangerous vulnerability in
cyberspace is SQL Injection. There is known approaches
to protect Web-applications against SQL Injection attacks
in the article. To improve the web software security it ...

