Open Access
Issue
E3S Web Conf.
Volume 273, 2021
XIV International Scientific and Practical Conference “State and Prospects for the Development of Agribusiness - INTERAGROMASH 2021”
Article Number 08045
Number of page(s) 7
Section Agricultural Management and Environmental Economics
DOI https://doi.org/10.1051/e3sconf/202127308045
Published online 22 June 2021
  1. A.V. Babash, Cryptographical methods of information protection: textbook (KNORUS, Moscow, 2016) [Google Scholar]
  2. P. Razumov, N. Boldyrikhin, L. Cherckesova, et al., E3S Web of Conferences, 224, 01033 (2020) [EDP Sciences] [Google Scholar]
  3. V.V. Zhilin, I.I. Drozdova, I.A. Sakharov, et al., in Proceedings of IEEE East-West Design and Test Symposium, EWDTS 2019, Institute of Electrical and Electronics Engineers, Inc, 8884375 (2019), DOI: 10.1109/EWDTS.2019.8884375 [Google Scholar]
  4. N.A. Gaydamakin, Access differentiation to information in computer systems (Ural State Technical University Publishing House, Yekaterinburg, 2013) [Google Scholar]
  5. N.A Gaydamakin, Theoretical foundations of computer security: textbook (Ural State Technical University Publishing House, Yekaterinburg, 2018) [Google Scholar]
  6. N.A. Gaydamakin, Automated information systems, databases and data banks (Helios ARV, Moscow, 2012) [Google Scholar]
  7. P.N. Devyanin, O.O. Mikhalsky, D.I. Pravikov, A.Yu. Shcherbakov, Theoretical foundations of computer security (Radio and Communications, Moscow, 2010) [Google Scholar]
  8. S.P. Panasenko, Encryption algorithms. Special Handbook (BHV Petersburg Publishing House, St. Petersburg, 2019) [Google Scholar]
  9. A.V. Cheremushkin, Cryptographic protocols. Basic properties and vulnerabilities: textbook (Publishing center "Academy", Moscow, 2015) [Google Scholar]
  10. B. Schneier, Applied cryptography. Protocols, algorithms, source texts in the C language (Triumph Publishing House, Moscow, 2013) [Google Scholar]
  11. D. Beazly, Python. Detailed handbook (Symbol–Plus, St. Petersburg, 2013) [Google Scholar]
  12. WhatsApp Messenger, URL: https://ru.wikipedia.org/wiki/WhatsApp [Google Scholar]
  13. M. Ganguly, WhatsApp Design Feature Means Some Encrypted Messages Could Be Read by Third Party (2017) [Google Scholar]
  14. U. Can, and B. Alatas, Physica A: Statistical Mechanics and its Applications, 535, 1–38 (2019) [Google Scholar]
  15. V. Singh, S.K. Pandey, Performance Management of Integrated Systems and its Applications in Software Engineering, 11–20 (2020) [Google Scholar]
  16. Europol EC3. (Sep. 2020). Internet Organised Crime Threat Assess-ment(IOCTA) (2020), URL: https://www.europol.europa.eu/iocta-report [Google Scholar]
  17. D. Berman, A. Buczak, J. Chavis, and C. Corbett, A survey of deeplearning methods for cyber security (2019), URL: https://www.researchgate.net/publication/332178214_A_Survey_of_Deep_Learning_Methods_for_Cyber_Security [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.