Технологии создания систем электронной коммерции: Учебно-методическое пособие
In 2018, the authors of this article developed a cryptographic mechanism, which was adopted in 2019 as a recommendations on standardization R 1323565.1.028-2019 “Cryptographic mechanisms for secure interaction of control and measuring Devices” by Technical Committee “Cryptographic Information Protection”. These recommendations contain a description of the family of cryptographic protocols designed to produce key information, as well as for the exchange of encrypted information with integrity protection. The article describes the cryptographic mechanisms used in the protocol, their difference from the existing solutions, peculiarities of the key system and methods of authentication of participants in secure interaction. The results of the program implementation developed by the authors will be presented.
We consider implementation of the TLS 1.3 protocol taking into account the experience of Russian researchers and developers, as well as national regulations. We subsequently propose a modification of the protocol which fixes several issues. The changes concern the way of interaction between parties in different modes of connection, cryptographic primitives and the key system of the protocol.
We study several Russian key-agreement cryptographic protocols for compliance with specified security properties in view of possible adoption of these protocols as standardized solutions intended to be used in the Russian Federation. We have used a number of automatic cryptographic protocol verification tools available in the Internet such as Proverif, AVISPA-SPAN and Scyther, to simulate examined protocols. We find a number of vulnerabilities and propose ways to fix them.
Event logs collected by modern information and technical systems usually contain enough data for automated process models discovery. A variety of algorithms was developed for process models discovery, conformance checking, log to model alignment, comparison of process models, etc., nevertheless a quick analysis of ad-hoc selected parts of a journal still have not get a full-fledged implementation. This paper describes an ROLAP-based method of multidimensional event logs storage for process mining. The result of the analysis of the journal is visualized as directed graph representing the union of all possible event sequences, ranked by their occurrence probability. Our implementation allows the analyst to discover process models for sublogs defined by ad-hoc selection of criteria and value of occurrence probability
I give the explicit formula for the (set-theoretical) system of Resultants of m+1 homogeneous polynomials in n+1 variables