ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2013 / 3
№
Price
Author
Article's name
1
0.00 rub
Moldovyan N. A.
Ryzhkov A. V.
A method for commutative encryption based on probabilistic encryption
2
0.00 rub
Belim S. V.
Brechka D. M.
Using the analytic hierarchy process to select an entry in the access control list
3
0.00 rub
Gorbachyov I. E.
Yeremeyev M. A.
Model of the analysis of incidents of illegal access in application to tasks of estimation of security of automated system
4
0.00 rub
Iskhakov A. Yu.
Mescheriakov R. V.
Hodashinsky I. A.
Two-factor authentication based on the software token
5
0.00 rub
Kozlov P. V.
Lipin Yu. N.
Yuzhakov A. A.
Evaluation of algorithm for recognition of a human face
6
0.00 rub
Kotenko I. V.
Novikova E. S.
Visualisation techniques for security information and event management
7
0.00 rub
Levinsas T. V.
Manage information flows based on their label security in the modern multi-tier service-oriented information systems
8
0.00 rub
Sabanov A. G.
Classification of authentication processes
9
0.00 rub
Tikhonov I. A.
Models quality infrared images of the vascular bed for biometric authentication of users of information systems
10
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Access control models to newly create file object. Secure system development requirements
11
0.00 rub
Kazarin O. V.
Working out models and methods of proactive protection information systems on the basis secure computation
12
0.00 rub
Berezin A. N.
Moldovyan N. A.
Latyshev D. M.
Collective 240-bit digital signature protocol over non-cyclic finite group
13
0.00 rub
Golov I. Yu.
Strategic plan for the U.S. federal cybersecurity research and development program
14
0.00 rub
Bondarenko A. V.
Organization and regulatory-legal support of cyber warfare in the Russian Federation based on the advanced foreign experience
15
0.00 rub
Balyberdin A. L.
Vus M. A.
About relevance of improvement of system of protection of the state secret
91
ISSUES
960
ARTICLES
2324
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP