Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/52197
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTataryn, Bohdan
dc.contributor.authorBasyuk, Taras
dc.contributor.authorBatiuk, Taras
dc.coverage.temporal23-24 April 2020, Lviv, Ukraine
dc.date.accessioned2020-06-12T11:10:36Z-
dc.date.available2020-06-12T11:10:36Z-
dc.date.created2020-04-23
dc.date.issued2020-04-23
dc.identifier.citationTataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems).
dc.identifier.issn2523-4013
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/52197-
dc.format.extent375
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofComputational linguistics and intelligent systems : proceedings of the 4nd International conference (2), 2020
dc.relation.urihttps://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
dc.relation.urihttps://patents.google.com/patent/US8024582B2/en
dc.relation.urihttps://www.umj.com.ua/article/5941/
dc.titleIntellectual System Backup and Encrypt Information
dc.typeArticle
dc.rights.holder© Національний університет “Львівська політехніка”, 2020
dc.contributor.affiliationLviv Polytechnic National University
dc.format.pages1
dc.identifier.citationenTataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems).
dc.relation.references1. Centralized secure backup system and method. - Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
dc.relation.references2. Encryption of data to be stored in an information processing system. - Access mode: https://patents.google.com/patent/US8024582B2/en
dc.relation.references3. A cryptographic file system.- Access Mode: https://www.umj.com.ua/article/5941/
dc.relation.references4. Vambol, A.: The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019)
dc.relation.references5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V.: Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019)
dc.relation.references6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L.: Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020)
dc.relation.references7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H.: Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016)
dc.relation.referencesen1. Centralized secure backup system and method, Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf
dc.relation.referencesen2. Encryption of data to be stored in an information processing system, Access mode: https://patents.google.com/patent/US8024582B2/en
dc.relation.referencesen3. A cryptographic file system, Access Mode: https://www.umj.com.ua/article/5941/
dc.relation.referencesen4. Vambol, A., The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019)
dc.relation.referencesen5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V., Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019)
dc.relation.referencesen6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L., Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020)
dc.relation.referencesen7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H., Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016)
dc.citation.spage375
dc.citation.epage375
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
Appears in Collections:Computational linguistics and intelligent systems. – 2020 р.

Files in This Item:
File Description SizeFormat 
2020v2_Tataryn_B-Intellectual_System_Backup_375.pdf162.54 kBAdobe PDFView/Open
2020v2_Tataryn_B-Intellectual_System_Backup_375__COVER.png320.53 kBimage/pngView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.