All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Possibilities of Usage Neural Networks in Cryptography

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F70883521%3A28140%2F10%3A63509075" target="_blank" >RIV/70883521:28140/10:63509075 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Possibilities of Usage Neural Networks in Cryptography

  • Original language description

    In this modern ?data-based? world we discover some problems which deal with own privacy. This problem is probability of lose own private data and information. A lot of people are connect to worldwide computer network knows as Internet. Yes Internet has more advantages and features which make own live easier and more comfortable. But which prize we pay for this comfort? We have global network with all of its advantages and ALL disadvantages. People around the World now know what unlimited space on Internet is. But they maybe know a one problem; this problem is accessibility of privacy and protected data across Internet network. We must protect our privacy data from unauthorized usage by third part. Yes we might use antivirus software, firewall, antispamprograms and something other security tools for our protection. But there is only one ?totally? safe application for secure our data. This application is cryptographic software. But which is the best? There are many standards and methods

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2010

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Internet, bezpečnost a konkurenceschopnost organizací. Řízení procesů a využití moderních teerminálových technologií

  • ISBN

    978-83-61645-16-0

  • ISSN

  • e-ISSN

  • Number of pages

    5

  • Pages from-to

  • Publisher name

    Univerzita Tomáše Bati ve Zlíně, Fakulta aplikované informatiky

  • Place of publication

    Zlín

  • Event location

    Zlín

  • Event date

    Jan 1, 2010

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article