Using hash functions to protect critical messages from changes in risky computing systems

Andrzej Smolarz, Nadia Pasieka, Andrzej Kotyra, Vasyl Sheketa, Mykola Pasieka, Svitlana Chupakhina, Petro Krul, Mykola Suprun. Using hash functions to protect critical messages from changes in risky computing systems. In Stefan Wolfgang Pickl, Volodymyr Lytvynenko, Maryna Zharikova, Volodymyr Sherstjuk, editors, Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), Kherson, Ukraine, September 16-17, 2021. Volume 3101 of CEUR Workshop Proceedings, pages 434-444, CEUR-WS.org, 2021. [doi]

Authors

Andrzej Smolarz

This author has not been identified. Look up 'Andrzej Smolarz' in Google

Nadia Pasieka

This author has not been identified. Look up 'Nadia Pasieka' in Google

Andrzej Kotyra

This author has not been identified. Look up 'Andrzej Kotyra' in Google

Vasyl Sheketa

This author has not been identified. Look up 'Vasyl Sheketa' in Google

Mykola Pasieka

This author has not been identified. Look up 'Mykola Pasieka' in Google

Svitlana Chupakhina

This author has not been identified. Look up 'Svitlana Chupakhina' in Google

Petro Krul

This author has not been identified. Look up 'Petro Krul' in Google

Mykola Suprun

This author has not been identified. Look up 'Mykola Suprun' in Google