Using hash functions to protect critical messages from changes in risky computing systems

Andrzej Smolarz, Nadia Pasieka, Andrzej Kotyra, Vasyl Sheketa, Mykola Pasieka, Svitlana Chupakhina, Petro Krul, Mykola Suprun. Using hash functions to protect critical messages from changes in risky computing systems. In Stefan Wolfgang Pickl, Volodymyr Lytvynenko, Maryna Zharikova, Volodymyr Sherstjuk, editors, Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), Kherson, Ukraine, September 16-17, 2021. Volume 3101 of CEUR Workshop Proceedings, pages 434-444, CEUR-WS.org, 2021. [doi]

Abstract

Abstract is missing.