ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2023 / 2
№
Price
Author
Article's name
1
500.00 rub
Kostina A. A.
Unified methods for defining vector finite fields as primitives of multivariate cryptography algorithms
2
500.00 rub
Filipova E. E.
Using Key Distribution as a way to protect the organization of information exchange
3
500.00 rub
Troshkov A. M.
Ermakova A. N.
Bogdanova S. V.
Shuvaev A. V.
Habarov A. N.
IT-synthesis of colorimetric and hyperbolic coding of biometric characteristics
4
500.00 rub
Panfilova I. E.
Sulavko A. E.
Methods for determining the live presence of a user in front of a video camera in the task of biometric face authentication
5
500.00 rub
Troshkov A. M.
Troshkov M. A.
Ermakova A. N.
Bogdanova S. V.
Shuvaev A. V.
Development of a colorimetric encryption algorithm for biometric systems
6
500.00 rub
Arkhipov A. N.
Pikov V. A.
Kabakov V. V.
The order and results of experimental studies of the influence of obfuscation on the quality of detecting information security threats implemented through exploits in files of non-executable formats
7
500.00 rub
Furman K. V.
Suraev E. P.
Egorova V. V.
Panov A. S.
Pitelinsky K. V.
Approach to automation of fuzzing-testing processes in the cycle of continuous software development
8
500.00 rub
Kabakov V. V.
Fokin N. I.
Formation of a universal algorithm for determining information security threats for personal data information systems
9
500.00 rub
Moldovyan A. A.
Post-quantum digital signature algorithm with doubled verification equation
10
500.00 rub
Panasenko S. P.
A method to implement the requirement to control the movement of data carriers outside the controlled zone
11
500.00 rub
Puzanov A. V.
Puzanova K. A.
Directions for improving cybersecurity of mobile technology control systems
91
ISSUES
960
ARTICLES
2324
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP