To obtain access to full text of journal and articles you must register!
2010 / 2
№ | Price | Author | Article's name |
---|---|---|---|
1 | ![]() 0.00 rub | Do Thi Bac Nguyen Hieu Minh Moldovyan U. A. Moldovyanu P. A. | Fast Hash Functions Based on Controlled Permutations |
2 | ![]() 0.00 rub | Ho Ngoc Duy Do Thi Bac Moldovyan A. A. Moldovyan D. N. | Fast block ciphers based on switchable substitutionpermutation networks |
3 | ![]() 0.00 rub | Grishachev V. V. Kosenko O. A. | The practical estimation of convert audio (voice) channel efficiency from fiber-optic communications |
4 | ![]() 0.00 rub | Abdenov A. Zh. Zarkumova R. N. | Choice of means of effective protection by the instrumentality of game theory methods |
5 | ![]() 0.00 rub | Usov P. A. | Criticism of information leakage protection systems |
6 | ![]() 0.00 rub | Usov P. A. | Of efficient data diode making |
7 | ![]() 0.00 rub | Panasenko S. P. | The principles of distributed information security systems server modules development. Part 3 (Part 1, 2 - 2009. № 2. P. 30-34, 34-44.) |
8 | ![]() 0.00 rub | Panasenko S. P. | The principles of distributed information security systems server modules development. Part 4 |