Search Results - "Cherkesova, Larisa"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Searching for and blocking destructive content in images by Zelensky, Alexander, Cherkesova, Larisa, Revyakina, Elena, Kulikova, Olga, Trubchik, Irina

    Published in E3S Web of Conferences (01-01-2023)
    “…Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network…”
    Get full text
    Journal Article Conference Proceeding
  2. 2

    System for detecting of potentially dangerous communications of network users by Zelensky, Alexander, Cherkesova, Larisa, Revyakina, Elena, Boldyrikhin, Nikolay, Klimova, Elena, Yengibaryan, Irina

    Published in E3S Web of Conferences (01-01-2023)
    “…This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee…”
    Get full text
    Journal Article Conference Proceeding
  3. 3

    Digitalization of the agro-industrial complex: analysis of existing vulnerabilities in quantum cryptography systems by Cherkesova, Larisa, Korochencev, Denis, Revyakina, Elena, Boldyrihin, Nikolay, Roshchina, Evgeniya

    Published in E3S Web of Conferences (01-01-2020)
    “…This article deals with vulnerabilities of quantum cryptography systems and quantum key distribution. Solutions that exclude the possibility of quantum attacks…”
    Get full text
    Journal Article Conference Proceeding
  4. 4

    Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting by Cherkesova, L. V., Safaryan, O. A., Mazurenko, A. V., Arkhangelskaya, N. S.

    “…Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their…”
    Get full text
    Journal Article