Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/52197
Title: Intellectual System Backup and Encrypt Information
Authors: Tataryn, Bohdan
Basyuk, Taras
Batiuk, Taras
Affiliation: Lviv Polytechnic National University
Bibliographic description (Ukraine): Tataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems).
Bibliographic description (International): Tataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems).
Is part of: Computational linguistics and intelligent systems : proceedings of the 4nd International conference (2), 2020
Issue Date: 23-Apr-2020
Publisher: Видавництво Львівської політехніки
Lviv Politechnic Publishing House
Place of the edition/event: Львів
Lviv
Temporal Coverage: 23-24 April 2020, Lviv, Ukraine
Number of pages: 1
Page range: 375
Start page: 375
End page: 375
URI: https://ena.lpnu.ua/handle/ntb/52197
ISSN: 2523-4013
Copyright owner: © Національний університет “Львівська політехніка”, 2020
URL for reference material: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
https://patents.google.com/patent/US8024582B2/en
https://www.umj.com.ua/article/5941/
References (Ukraine): 1. Centralized secure backup system and method. - Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
2. Encryption of data to be stored in an information processing system. - Access mode: https://patents.google.com/patent/US8024582B2/en
3. A cryptographic file system.- Access Mode: https://www.umj.com.ua/article/5941/
4. Vambol, A.: The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019)
5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V.: Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019)
6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L.: Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020)
7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H.: Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016)
References (International): 1. Centralized secure backup system and method, Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
2. Encryption of data to be stored in an information processing system, Access mode: https://patents.google.com/patent/US8024582B2/en
3. A cryptographic file system, Access Mode: https://www.umj.com.ua/article/5941/
4. Vambol, A., The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019)
5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V., Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019)
6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L., Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020)
7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H., Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016)
Content type: Article
Appears in Collections:Computational linguistics and intelligent systems. – 2020 р.

Files in This Item:
File Description SizeFormat 
2020v2_Tataryn_B-Intellectual_System_Backup_375.pdf162.54 kBAdobe PDFView/Open
2020v2_Tataryn_B-Intellectual_System_Backup_375__COVER.png320.53 kBimage/pngView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.