2004
DOI: 10.1615/telecomradeng.v62.i8.80
|View full text |Cite
|
Sign up to set email alerts
|

Methods of a Computer-Based Technology for Production of Counterfeit-Protected Electronic Documents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Nowadays, the interest of specialists in the field of information security, in particular, protection of electronic documents from forgery, focuses on the development of cryptography methods based on the use of deterministic-chaotic processes more and more often [3,4]. This class of processes is characterized by instability, which results in non-repeatability of the values of elements in a sequence of numbers with a representative bit grid.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, the interest of specialists in the field of information security, in particular, protection of electronic documents from forgery, focuses on the development of cryptography methods based on the use of deterministic-chaotic processes more and more often [3,4]. This class of processes is characterized by instability, which results in non-repeatability of the values of elements in a sequence of numbers with a representative bit grid.…”
Section: Introductionmentioning
confidence: 99%