Информационная безопасность. История защиты информации в России
The purpose of this article is to provide an overview of Microsoft cryptographic technologies. We review a cryptographic algorithms classification scheme along with Microsoft recommendations regarding the use of ciphers and hash functions. We show how cryptography can be used to solve problems different from encryption, including ultimate data destruction on hard drives, identity management, digital signatures etc. We conclude the article with an overview of cryptographic functions implementation in Windows and.NET Framework focusing on enterprise applications development.
In this paper are shown methods of information protection and also algorithms of embedding of additional information into digital graphics images.
In this paper we consider choice problems under the assumption that the preferences of the decision maker are expressed in the form of a parametric partial weak order without assuming the existence of any value function. We investigate both the sensitivity (stability) of each non-dominated solution with respect to the changes of parameters of this order, and the sensitivity of the set of non-dominated solutions as a whole to similar changes. We show that this type of sensitivity analysis can be performed by employing techniques of linear programming.