Abstract
The present paper reviews a method for establishing secure information systems by complicating the possibility to research them for potential adversaries. A formalized model of a researcher and a definition of a research secure system are presented. A theorem for conditions required for creating a system perfectly secured from research. The Shannon's theorem of absolute security of perfect secrecy ciphers in cryptography is an instance of the theorem presented in the paper.
Export citation and abstract BibTeX RIS
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.