Method for Information Security Events Detection in a Cloud Signature Systems
The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. The following parameters are proposed: the number of...
Saved in:
Main Authors: | V. A. Gerasimov, O. V. Boyprav |
---|---|
Format: | Article |
Language: | Russian |
Published: |
Ministry of Education of the Republic of Belarus, Establishment The Main Information and Analytical Center
2024-06-01
|
Series: | Цифровая трансформация |
Subjects: | |
Online Access: | https://dt.bsuir.by/jour/article/view/851 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
On the invariance of the digital description of a handwritten signature
by: U. Yu. Akhundjanov, et al.
Published: (2023-02-01) -
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
by: Chen Zhang, et al.
Published: (2025-01-01) -
A chaotic digital signature algorithm based on a dynamic substitution box
by: Rolando Flores-Carapia, et al.
Published: (2025-01-01) -
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
by: Hossein Pilaram, et al.
Published: (2021-01-01) -
Chemical signatures of social information in Barbary macaques
by: Brigitte M. Weiß, et al.
Published: (2025-01-01)