ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 

SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas” The scientific and practical journal
“INFORMATION SECURITY QUESTIONS”
("Voprosy zaŝity informacii")

  • 24.06.2015
    THE ISSUE OF THE JOURNAL (No 2. 2015)
    Journal name INFORMATION SECURITY QUESTIONS
    ISSN 2073-2600 Date 2 quarter 2015
    Volume Issue 2
    Page 1-78 Articles number 12
    CONTENTS
    N Article name Page
    TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
    1 Generation of cubic equations as method for public encryption
           Moldovyan N. A.     (St.-Petersburg State Electrotechnical University "LETI"; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
           Moldovyan D. N.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
           Vaichikauskas M. A.     (St.-Petersburg State Electrotechnical University "LETI" )
    3-7 
    2 Encryption protocols using the small-size shared keys and single-use public keys
           Moldovyan N. A.     (St.-Petersburg State Electrotechnical University LETI; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
           Muravyov A. V.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
           Kostina A. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
    8-12 
    TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
    3 RFID reader for access control systems design approach
           Zaytsev D. S.     (ANCUD Ltd )
           Panasenko S. P.     (ANCUD Ltd )
           Pimenov A. V.     (ANCUD Ltd )
           Syrchin V. K.     (ANCUD Ltd )
    13-18 
    4 Network objects access rights control implementation
           Shcheglov K. A.     (JSC "Research and Production Enterprise "Information Technology in Business" )
           Shcheglov A. Yu.     (JSC "Research and Production Enterprise "Information Technology in Business"; St.-Petersburg National Research University of IT, Mechanics and Optics )
    19-27 
    5 Verification of authenticity for handwritten signatures using Bayesian-Hamming networks and quadric form networks
           Ivanov A. I.     (Penza Research Electrotechnical Institute )
           Lozhnikov P. S.     (Omsk State Technical University )
           Kachajkin E. I.     (Ministry of Justice of the Russian Federation )
    28-34 
    TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT
    6 Usage of wireless mesh networks in Safe City hardware-software complex
           Bokov D. M.     (Tomsk State University of Control Systems and Radioelectronics )
           Melnikov M. I.     (Tomsk State University of Control Systems and Radioelectronics )
           Shelupanov A. A.     (Tomsk State University of Control Systems and Radioelectronics )
           Mitsel A. A.     (Tomsk State University of Control Systems and Radioelectronics )
           Ekhlakov Yu. P.     (Tomsk State University of Control Systems and Radioelectronics )
    35-41 
    7 Multi-channel detection of radio signal with unknown structure against the noise background
           Bylinkin A. A.     (Moscow State University of Instrument Engineering and Computer Science )
    42-47 
    GENERAL SAFETY INFORMATION AND FACILITIES
    8 The analysis of vulnerabilities and threats to the national payment system of the Russian Federation
           Livshits I. I.     (LLC "GasInformService" )
    48-56 
    9 Method of establishment and maintenance of event management and event life cycle within information security management system
           Kuznetsov A. V.     (LLC "Research and Development Center "Vulkan" )
    57-62 
    10 Protecting IC secure keys on Physical Unclonable Functions in case of untrusted foundry
           Semenov A. V.     ("18 Central research Institute", Departament of Defense )
           Kostyuck A. V.     ("18 Central research Institute", Departament of Defense )
    63-68 
    11 The complex approach to information risk management based on the VIKOR
           Studennikov K. O.     (Kursk State University )
           Lopin V. N.     (Kursk State University )
    69-73 
    12 Steganographic transform based on contraction mapping
           Shakursky V. K.     (State University of Togliatt )
           Shakursky M. V.     (Volga Region State University of Service )
    74-78 
    ALL NEWS
    

    The scientific and practical journal
    “INFORMATION SECURITY QUESTIONS”
    ("Voprosy zaŝity informacii")