ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2012 / 1
№
Price
Author
Article's name
1
0.00 rub
Moldovyan N. A.
Al-Rahmi Ramzi Yahya
Synthesis of the algebraic block ciphers based on using the operations over binary polynomials
2
0.00 rub
Moldovyan N. A.
Vasilyev I. N.
Collective signature scheme with message recovery
3
0.00 rub
Grishachev V. V.
Estimation method of technical convert channel characteristic
4
0.00 rub
Ptitsyn A. V.
Automation of management by the mechanism of reflection of attacks on the method of the caching of the information
5
0.00 rub
Fazliakhmetov T. I.
Frid A. I.
The influence on unauthorized data modification risk of providing measuring data integrity method
6
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Principle and method of discretionary access control to newly created objects
7
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Principle and method of mandatory control of access to newly created objects
8
0.00 rub
Hodashinsky I. A.
Mescheriakov R. V.
Gorbunov I. V.
Fuzzy data mining applied to intrusion detection
9
0.00 rub
Ragimov E. R.
Methodology of optimal identification of program units arrangements in a complex of security software realizing of corporate network information security system
10
0.00 rub
Azhmuhamedov I. M.
Score damage security provide system based on fuzzy-cognitive approach
11
0.00 rub
Epifantsev B. N.
Lozhnikov P. S.
Sulavko A. E.
Comparison of algorithms of sings complexing in image recognition problems
91
ISSUES
960
ARTICLES
2324
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP