ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2022 / 1
№
Price
Author
Article's name
1
500.00 rub
Dubinin D. P.
The use of trust systems in order to ensure information security and restrict unauthorized access to information systems of financial organizations
2
500.00 rub
Kabakov V. V.
Ensuring information security by building combined access control and management systems
3
500.00 rub
Pikov V. A.
Kaigorodova V. A.
Batmanova O. V.
Justification of the need to develop a methodology for choosing information security tools for the implementation of the system of information protection from unauthorized access
4
500.00 rub
Zhilyaev A. E.
Sabanov A. G.
Shelupanova P. A.
Bragin D. S.
Mitsel A. A.
Kataev M. Yu.
An approach to the formation of assurance levels to assess the risks of authentication errors
5
500.00 rub
Kostina A. A.
Kurysheva A. A.
Moldovyan A. A.
Blind Signature Protocol with Doubled verification equation
6
500.00 rub
Shovkaluk A. P.
Assessment of the relevance and effectiveness of digital signature integration as tool for ensuring information security of information systems
7
500.00 rub
Moldovyan D. N.
Typical verification equations in algebraic digital signature algorithms with a hidden group
8
500.00 rub
Vilkhovsky D. E.
Method of detecting inserts embedded using the Koch-Zhao steganographic method in low stego-payload images
9
500.00 rub
Korolev I. D.
Gubarev V. V.
Kovnatsky M. F.
Methodology for determining the term of temporary restriction of citizens ' rights to leave the Russian Federation based on fuzzy modeling
10
500.00 rub
Krivonogov A. A.
Pitelinsky K. V.
Fedorov N. V.
Shchipunov T. V.
Smart contracts and their execution in the context of social engineering threats
90
ISSUES
953
ARTICLES
2324
DOWNLOADS
Section has not been found.
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP