Browse Items
Explore our collection of items
Enhanced authorization for secure management of sensitive data in hybrid applications
Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers...
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet e...
Enhanced authorization for secure management of sensitive data in hybrid applications
Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers who seek unauthorized access to this data. Traditional approaches to authorization may not be suffi...
2023/10/23Specifics of implementation of the asymmetric encryption algorithm on elliptic curves
The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...
2023/06/26