ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 

SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”



To obtain access to full text of journal and articles you must register!



2014 / 2

Price Author Article's name
1
0.00 rub

Berezin A. N.

Moldovyan N. A.

Scherbakov V. A.

General method for constructing cryptoschemes based on difficulty of simultaneous solving factoring and discrete logarithm problems
2
0.00 rub

Moldovyan N. A.

Goryachev A. A.

Vaichikauskas M. A.

Extention of Rabin cryptosystem: public-key deniable encryption algorithm
3
0.00 rub

Shcheglov K. A.

Shcheglov A. Yu.

Principles of system file objects access control based on automatic marking
4
0.00 rub

Belim S. V.

Belim S. Yu.

Bogachenko N. F.

The discretionary access control in the systems with the object hierarchy
5
0.00 rub

Sabanov A. G.

Multilevel risks analysis method of authentication for remote electronic interaction
6
0.00 rub

Soloviev V. P.

Kornev D. A.

Influence of the characteristics of a source of information on the likelihood of attacks
7
0.00 rub

Kazarin O. V.

Sorokin A. D.

Interactive identification protocols based on the scheme of domestic digital signature standard
8
0.00 rub

Korzhik V. I.

Fedyanin I. A.

Kopylova O. D.

Synthesis of high rate stegosystem resistant to blind steganalysis
9
0.00 rub

Zaitseva A. V.

On the approaches to the construction of entropy steganographic systems for message protection in information networks
10
0.00 rub

Shpenst V. A.

Sekretev A. N.

Development of a method of routing for the wireless decentralized networks for the purpose of capacity increase taking into account radio relay nature of translation of traffic
11
0.00 rub

Vorotnikov V. S.

Shchagin A. V.

Algorithm for choosing optimal parameters for automatic measurement of network performance
12
0.00 rub

Bylinkin A. A.

Experimental study of signals of radio and television stations
13
0.00 rub

Petrov A. A.

Ogolyuk A. A.

Software methods of protection.NET applications against unauthorized copying