Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Model and method of chunk processing of payload for HTTP authorization protocols
S Surkov - 2020 IEEE 15th International Conference on …, 2020 - ieeexplore.ieee.org
The existing HTTP authorizations methods, which guarantee the authentication of the
payload were analyzed. The most implementations of modern existing servers and their …
payload were analyzed. The most implementations of modern existing servers and their …
[PDF][PDF] Improvement оf Security for Web Services by Research and Development оf Oauth Server
SS Surkov, ON Martynyuk - Електротехнічні та комп'ютерні …, 2016 - irbis-nbuv.gov.ua
With the crucial growth of information-technologies is rapidly growing sociability. The
clearest example-there are many social networks. To solve the problem of authorization for …
clearest example-there are many social networks. To solve the problem of authorization for …
Comparison of authorization protocols for large requests in the operation queue environment
СС Сурков - Вестник современных информационных технологий, 2020 - elibrary.ru
Authorization protocols play a foundation role in web security. There is a risk that the data
may be changed in places where it is transmitted in the unencrypted form, for example, in a …
may be changed in places where it is transmitted in the unencrypted form, for example, in a …
[PDF][PDF] Reduction of the Harmful Effect of Critical Modes in the Operation Queue Environment for Authorization Protocols for Large Requests
СС Сурков - Прикладные аспекты информационных технологий, 2020 - academia.edu
An essential part of web security is kee** the payload intact from changes. The data
during transmission could be changed, where the encryption is not used, or the data gets …
during transmission could be changed, where the encryption is not used, or the data gets …
Research & development of smart home protocol structure, safety and security
SS Surkov, OM Martynyuk - Современные информационные и …, 2016 - elibrary.ru
This paper describes the communication between smart home componens such as central
server and smart home modules and safety and security of the communication. The …
server and smart home modules and safety and security of the communication. The …
The Model of Payload Authentication for HTTP Protocol Family
S Surkov - 2021 IEEE 12th International Conference on …, 2021 - ieeexplore.ieee.org
During transmission of the data, it can be intercepted and modified. Such behavior is called
the MITM (Man In The Middle) attack. Despite the usage of encryption in public networks …
the MITM (Man In The Middle) attack. Despite the usage of encryption in public networks …
A Method of the Result Preparation in Addition-Based Circuits
O Drozd, A Sachenko, K Grzeszczyk… - 2019 10th IEEE …, 2019 - ieeexplore.ieee.org
This paper is devoted to development of a method of the results preparation for development
of the digital circuits carrying out addition operation which is basic for arithmetic calculations …
of the digital circuits carrying out addition operation which is basic for arithmetic calculations …
[PDF][PDF] Communication model and protocol between smart home components
AN Martynyuk, SS Surkov - Electrotechnic and Computer Systems, 2016 - eltecs.op.edu.ua
301 УДК 519.718.7:681.3.069 SS Surkov, ON Martynyuk, PhD COMMUNICATION MODEL
AND PROTOCOL BETWEEN SMART HOME COMPONENT Page 1 Сурков ССОпубликовано …
AND PROTOCOL BETWEEN SMART HOME COMPONENT Page 1 Сурков ССОпубликовано …
Порівняння протоколів авторизації для великих запитів у середовищі черг операцій
СС Сурков - Вісник сучасних інформаційних технологій, 2020 - hait.op.edu.ua
Анотація Протоколи авторизації відіграють основну роль в веб-безпеки. Існує
небезпека того, що дані будуть змінені в місцях, де вони передаються в …
небезпека того, що дані будуть змінені в місцях, де вони передаються в …
[PDF][PDF] Зниження шкідливого впливу критичних режимів у середовищі черг операцій для протоколів авторизації великих запитів
СС Сурков - Прикладні аспекти інформаційних технологій, 2020 - aait.op.edu.ua
DOI: https://doi.org/10.15276/aait.03.2020.3 UDC 004.75 REDUCTION OF THE HARMFUL
EFFECT OF CRITICAL MODES IN THE OPERATION QUEU Page 1 Applied Aspects of …
EFFECT OF CRITICAL MODES IN THE OPERATION QUEU Page 1 Applied Aspects of …