ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2013 / 2
№
Price
Author
Article's name
1
0.00 rub
Dodokhov A. L.
Sabanov A. G.
One of the approaches to ensuring data privacy in public cloud services
2
0.00 rub
Tyulkin M. V.
Kapger I. V.
Kapger A. I.
Aspects of symmetric cipher in the client Web-applications using Comet
3
0.00 rub
Lapshikov O. I.
Lopin V. N.
Neural network operational units and their application to the implementation of mutual-back cryptographic transformations
4
0.00 rub
Birichevskiy A. R.
Moldovyan N. A.
Berezin A. N.
Ryzhkov A. V.
Method of the deniable encryption
5
0.00 rub
Demiyanchuk A. A.
Moldovyan D. N.
Moldovyan A. A.
Public-encryption algorithms in zero-knowledge protocols
6
0.00 rub
Epifantsev B. N.
Lozhnikov P. S.
Sulavko A. E.
Alternative scenarios of authorization at identification of users by dynamics of subconscious movements
7
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Defending against application exploits model of access control
8
0.00 rub
Golobokov V. A.
The method of rational choice of structural and functional organization of the access to distributed data bank server for local mission operations centers
9
0.00 rub
Kornev D. A.
Lopin V. N.
Using an active detection methods against distributed attacks of SYN-flood type on the early stages
10
0.00 rub
Kotenko I. V.
Shorov A.V.
Infrastructure attack protection mechanisms based on bio-inspired approach "Network Nervous System"
11
0.00 rub
Anfinogenov S. O.
Aliev A. A.
Research of methods of automatic evaluation of distortion when embedding digital watermarks on still images
12
0.00 rub
Ivanov N. V.
Manual for estimation IS settings effectiveness for attack protection
13
0.00 rub
Samsonov F. A.
Security of Automated Systems for Special Applications: factorial parametric approach
14
0.00 rub
Azhmuhamedov I. M.
System analysis and evaluation of the level of threats to information security
86
ISSUES
921
ARTICLES
2289
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP