DC Field | Value | Language |
dc.contributor.author | Tataryn, Bohdan | |
dc.contributor.author | Basyuk, Taras | |
dc.contributor.author | Batiuk, Taras | |
dc.coverage.temporal | 23-24 April 2020, Lviv, Ukraine | |
dc.date.accessioned | 2020-06-12T11:10:36Z | - |
dc.date.available | 2020-06-12T11:10:36Z | - |
dc.date.created | 2020-04-23 | |
dc.date.issued | 2020-04-23 | |
dc.identifier.citation | Tataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems). | |
dc.identifier.issn | 2523-4013 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/52197 | - |
dc.format.extent | 375 | |
dc.language.iso | en | |
dc.publisher | Видавництво Львівської політехніки | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Computational linguistics and intelligent systems : proceedings of the 4nd International conference (2), 2020 | |
dc.relation.uri | https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf | |
dc.relation.uri | https://patents.google.com/patent/US8024582B2/en | |
dc.relation.uri | https://www.umj.com.ua/article/5941/ | |
dc.title | Intellectual System Backup and Encrypt Information | |
dc.type | Article | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2020 | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.format.pages | 1 | |
dc.identifier.citationen | Tataryn B. Intellectual System Backup and Encrypt Information / Bohdan Tataryn, Taras Basyuk, Taras Batiuk // Computational linguistics and intelligent systems : proceedings of the 4nd International conference, 23-24 April 2020, Lviv, Ukraine. — Lviv : Lviv Politechnic Publishing House, 2020. — Vol 2 : Proceedings of the 4nd International conference, COLINS 2020. Workshop, Lviv, Ukraine April 23-24, 2020. — P. 375. — (Intelligent Systems). | |
dc.relation.references | 1. Centralized secure backup system and method. - Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf | |
dc.relation.references | 2. Encryption of data to be stored in an information processing system. - Access mode: https://patents.google.com/patent/US8024582B2/en | |
dc.relation.references | 3. A cryptographic file system.- Access Mode: https://www.umj.com.ua/article/5941/ | |
dc.relation.references | 4. Vambol, A.: The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019) | |
dc.relation.references | 5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V.: Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019) | |
dc.relation.references | 6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L.: Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020) | |
dc.relation.references | 7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H.: Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016) | |
dc.relation.referencesen | 1. Centralized secure backup system and method, Access mode: https://patentimages.storage.googleapis.com/37/2d/09/338375715b9383/US6574733.pdf | |
dc.relation.referencesen | 2. Encryption of data to be stored in an information processing system, Access mode: https://patents.google.com/patent/US8024582B2/en | |
dc.relation.referencesen | 3. A cryptographic file system, Access Mode: https://www.umj.com.ua/article/5941/ | |
dc.relation.referencesen | 4. Vambol, A., The Matrix-based Knapsack Cipher in the Context of Additively Homomorphic Encryption. In: Computational linguistics and intelligent systems, 344-354. (2019) | |
dc.relation.referencesen | 5. Lytvyn, V., Peleshchak, I., Peleshchak, R., Vysotska, V., Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm. In: 3rd International Conference on Advanced Information and Communications Technologies, AICT, 447-450. (2019) | |
dc.relation.referencesen | 6. Chyrun, L., Chyrun, L., Kis, Y., Rybak, L., Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise. In: Lecture Notes in Computational Intelligence and Decision Making, 1020, 389-404. (2020) | |
dc.relation.referencesen | 7. Nazarkevych, M., Oliarnyk, R., Troyan, O., Nazarkevych, H., Data protection based on encryption using Ateb-functions. In: 2016 XIth International Scientific and Technical Conference Computer Sciences and Information Technologies (CSIT), 30-32. (2016) | |
dc.citation.spage | 375 | |
dc.citation.epage | 375 | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
Appears in Collections: | Computational linguistics and intelligent systems. – 2020 р.
|