A Hadj Brahim, H Ali Pacha, M Naim… - The Journal of …, 2025 - Springer
Generating random values become increasingly desirable due to its advantages. In this paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
M Khomik, O Harasymchuk - Ukrainian Information Security …, 2023 - jrnl.nau.edu.ua
У зв'язку з бурхливим розвитком обчислювальної і вимірювальної техніки, а також із впровадженням новітніх технологій значно розширилась сфера застосування …
Y Martseniuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The primary objective of this research is to develop an advanced automated method for configuring and managing public cloud accounts and subscriptions on prominent platforms …
J Ni, J Zhang, G Wang, R Li, Y Shen - Symmetry, 2023 - mdpi.com
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric …
The increased use of VoIP technology heightens the potential threats to ordinary users. This study examines the peculiarities of implementing corporate VoIP telephony systems …
O Deineka, O Harasymchuk, A Partyka… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This paper discusses the design of a data classification policy for SOC 2 Type II compliance. SOC 2 Type II is a significant certification that attests to a service organization's ability to …
There is an increasing need for secure and fast encryption algorithms to support applications and communication protocols, and business models. In this paper, we present …
A fuzzy system for setting the priority of IT project work has been developed, in which a preliminary analysis of the metrics of readiness, permission and complexity of tasks is …
The article presents hardware modified additive Fibonacci generators, which use modular addition, with the base of the prime number. Generators differ from the classical presence in …