ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2017 / 3
№
Price
Author
Article's name
1
0.00 rub
Moldovyan N. A.
Abrosimov I. K.
Kovaleva I. V.
Post-quantum No-key Encryption Protocol
2
0.00 rub
Mozolina N. V.
Configuration integrity monitoring task solution constructed on the attribute-based access control
3
0.00 rub
Bylinkin A. A.
Theoretical assessment of efficiency of signals multipathing detection on the noise background algorithm
4
0.00 rub
Schastny D. Yu.
Trusted startup tools development perspective from the developer's aspect
5
0.00 rub
Epictetov D. A.
Altukhov A. A.
Special removable device as a medium for transferring logs of trusted boot device
6
0.00 rub
Altukhov A. A.
The trusted communication sessions concept as method of mobile device safe use in the enterprise (Review)
7
0.00 rub
Lydin S. S.
The problem of choosing the information security tools for the virtualization infrastructure
8
0.00 rub
Konyavskaya S. V.
The practice of combining functions in the protection of information: the pros and cons
9
0.00 rub
Kovalenko A. P.
Moskvitin G. I.
Some directions of obtaining computer information in the conduct of competitive (economic) intelligence
10
0.00 rub
Pyshkin N. B.
Vasilets V. I.
Skvortsov V. E.
Building and description of the algorithm for the information security of the industrial facility
11
0.00 rub
Chadov A. Yu.
Ugarov D. V.
Local software license server with a license return mechanism
12
0.00 rub
Smirnov N. Ya.
Chaus E. A.
A survey of research on determining visited Web-sites in encrypted HTTP-traffic using deep packet analysis techniques (Review)
91
ISSUES
960
ARTICLES
2324
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP