Fundamentals of Computer Security
Fundamentals of Computer Security
Hi-index | 0.00 |
The usage of doubtful data for information protection is considered. It is shown that by means of unauthenticity it is possible to protect confidentiality, integrity and availability. The basic methods of usage of unauthenticity are mentioned. We introduce the mathematical models and present estimations of quality for information protection with help of injection of unreliable information.