ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2015 / 2
№
Price
Author
Article's name
1
0.00 rub
Moldovyan N. A.
Moldovyan D. N.
Vaichikauskas M. A.
Generation of cubic equations as method for public encryption
2
0.00 rub
Moldovyan N. A.
Muravyov A. V.
Kostina A. A.
Encryption protocols using the small-size shared keys and single-use public keys
3
0.00 rub
Zaytsev D. S.
Panasenko S. P.
Pimenov A. V.
Syrchin V. K.
RFID reader for access control systems design approach
4
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Network objects access rights control implementation
5
0.00 rub
Ivanov A. I.
Lozhnikov P. S.
Kachajkin E. I.
Verification of authenticity for handwritten signatures using Bayesian-Hamming networks and quadric form networks
6
0.00 rub
Bokov D. M.
Melnikov M. I.
Shelupanov A. A.
Mitsel A. A.
Ekhlakov Yu. P.
Usage of wireless mesh networks in Safe City hardware-software complex
7
0.00 rub
Bylinkin A. A.
Multi-channel detection of radio signal with unknown structure against the noise background
8
0.00 rub
Livshitz I. I.
The analysis of vulnerabilities and threats to the national payment system of the Russian Federation
9
0.00 rub
Kuznetcov A. V.
Method of establishment and maintenance of event management and event life cycle within information security management system
10
0.00 rub
Semenov A. V.
Kostyuck A. V.
Protecting IC secure keys on Physical Unclonable Functions in case of untrusted foundry
11
0.00 rub
Studennikov K. O.
Lopin V. N.
The complex approach to information risk management based on the VIKOR
12
0.00 rub
Shakursky V. K.
Shakursky M. V.
Steganographic transform based on contraction mapping
86
ISSUES
921
ARTICLES
2288
DOWNLOADS
The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP