cryptographic protection

Methods of Blockchain Technology Formation in the Arms Sales Accounting System

The article explores the application of blockchain technology in the field of arms sales accounting. The authors examine the main methods of forming such technology, including distributed ledger, hash functions, cryptographic protection, smart contracts, consensus protocols, decentralized network, transactions, genesis block, decentralized governance, and public key. The authors analyze the potential of these methods in creating an efficient and secure arms sales accounting system.

ARCHITECTURE AND IMPLEMENTATION OF BASIC COMPONENTS OF NEURAL NETWORK PROTECTION SYSTEM AND DATA TRANSMISSION CODING

The development of basic components of the neural network protection system, data transmission coding based on an integrated approach, which includes an improved method of neural network encryption (decryption) and the method of adaptive barker-like coding (decoding) of data, which focuses on modern element base. The principles of specialization and adaptation of hardware and software to the structure of algorithms for neuro-like encryption (decryption) of data, neural network architecture, and barker-like code are used to develop the system.

The Quintessence of Information Security of a Cyber-physical System

The quintessence of an information security (IS) of cyber-physical systems (CPS) was presented, which is deployed on the level of complex security system (CSS) creation paradigm and conception as well as the CSS universal platform in the field “threats – profiles – tools”; it is also implemented in the part of CSS integral model of cyber-physical system “iPhone – Wi-Fi, Bluetooth – sensors” and cryptographic protection of CPS wireless communication environment based on block data encryption of algorithm “Kalyna”.