ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 

SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”

26.06.2020
THE  ISSUE OF THE JOURNAL (No 2. 2020)
Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600 Date 2 quarter 2020
Volume Issue 2
Page 1-76 Articles number 10
C O N T E N T S
N Article name Page 
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
1 A method of embedding information in the low bits of raster images without compression, using a two-component container
       Shakurskiy M. V.     (Samara State Technical University)
3-7 
2 New about the Wheatstone cipher
       Simon A. B.     (JSC "Uralmashplant")
8-13 
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
3 Tools and means for monitoring peripheral status
       Pakhomov M. V.     (Moscow Institute of Physics and Technology (National Research University))
14-19 
4 Secure remote control
       Ogolyuk A. A.     (St. Petersburg National Research University of Information Technologies, Mechanics and Optics)
       Malkina N. M.     (St. Petersburg National Research University of Information Technologies, Mechanics and Optics)
20-23 
5 Analysis of face and neck thermograms for users drowsiness recognition based on the Bayesian classifier
       Zhumazhanova S. S.     (Omsk State Technical University)
       Sulavko A. E.     (Omsk State Technical University)
       Lukin D. V.     (Omsk State Technical University)
24-30 
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT
6 Artificial intelligence in a secure execution based on immune network models of pattern recognition using biometrics-code converters as an example
       Shalina E. V.     (Omsk State Transport University)
       Malinin N. V.     (Omsk State Technical University)
       Sulavko A. E.     (Omsk State Technical University)
       Stadnikov D. G.     (Omsk State Technical University)
31-40 
TECHNICAL PROTECTION OF INFORMATION. ELECTRONIC SIGNATURE IN INFORMATION SYSTEMS
7 Post-quantum Signature Scheme with Double Masking of the Exponentiation Operation
       Moldovyan D. N.     (St. Petersburg Institute for Informatics and Automation of State Electrotechnical University "LETI")
       Moldovyan, A. A.     (St. Petersburg Institute for Informatics and Automation the RAS)
       Kostina A. A.     (St. Petersburg Institute for Informatics and Automation the RAS)
41-48 
GENERAL INFORMATION AND OBJECT SECURITY ISSUES
8 Analysis of existing methods for assessing the security of information systems
       Petrenko V. I.     (Federal State Autonomous Educational Institution of Higher Education "North Caucasus Federal University")
       Sherstobitov A. V.     (Federal State Autonomous Educational Institution of Higher Education "North Caucasus Federal University")
49-58 
9 Optimization of the convolutional operations for usage of them in convolutional neural networks, which are implemented on the FPGA basis
       Kushchenko A. S.     (South Federal University, Institute of Computer Technologies and Information Security; JSC "Scientific Design Bureau of Computing Systems")
       Makarevich O. B.     (South Federal University, Institute of Computer Technologies and Information Security)
       Polovko I. Yu.     (South Federal University, Institute of Computer Technologies and Information Security)
59-62 
10 Methodology for the development of rules for safe Internet connectivity
                                               (Review)

       Vilkov A. S.     (Military unit No. 11928)
       Vilkov S. L.     (Military unit No. 11928)
       Taraskin M. M.     (Military unit No. 11928)
63-76 
ALL NEWS