Browse Items

Explore our collection of items

Enhanced authorization for secure management of sensitive data in hybrid applications

Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers...

2023/10/23 1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet e...

2023/06/26 1
Enhanced authorization for secure management of sensitive data in hybrid applications

Sensitive data is often managed by cloud-based applications, which can be vulnerable to attackers who seek unauthorized access to this data. Traditional approaches to authorization may not be suffi...

2023/10/23
1
Specifics of implementation of the asymmetric encryption algorithm on elliptic curves

The modern world is inextricably linked with information technologies. Every year, the Internet expands, and thousands of sites that provide various services have been created. With a stable Intern...

2023/06/26
1