ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2014 / 1
№
Price
Author
Article's name
1
0.00 rub
Nepomnyashchikh A. V.
Kulikov G. V.
Sosnin Yu. V.
Nashchekin P. A.
Evaluation methods of information protection in automated systems from unauthorized access
2
0.00 rub
Sabanov A. G.
Multilevel analysis of authentication processes threats
3
0.00 rub
Sosnin Yu. V.
Kulikov G. V.
Nepomnyashchikh A. V.
Nashchekin P. A.
The basic modeling technology procedures to protect information from unauthorized access
4
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Principles of additional information security implementation while newly created file objects access control based on automatic marking
5
0.00 rub
Vasilyev I. N.
Moldovyan D. N.
Moldovyan A. A.
Group signature protocol based on the collective signature algorithm and masking public keys
6
0.00 rub
Kozina G. L.
Nikilishchev G. I.
Moldovyan N. A.
Blind signature protocol based on ECGDSA standard
7
0.00 rub
Kazarin O. V.
Martynov N. R.
Methods of protection against creation of subliminal channels in digital signature schemes
8
0.00 rub
Denisenko V. D.
Taraskin M. M.
A research methodology for threats to, vulnerabilities and risks of information protection system in an organization
9
0.00 rub
Buynevich D. S.
Golchevsky Yu. V.
Safe use of mobile devices in the executive authorities
10
0.00 rub
Horev A. A.
Simulation model of computer vision system compromising electromagnetic emanations detection by optimal receiver
11
0.00 rub
Makarevich O. B.
Babenko L. K.
Peskova O. Yu.
Bryuhomitsky Yu. A.
Analytical review of the relevant issues in the field of information security based on the results of the XIII International Scientific Conference "Information Security-2013"
90
ISSUES
953
ARTICLES
2324
DOWNLOADS
Section has not been found.
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP