ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 



THE INTERNET REPRESENTATION OF SCIENTIFIC  EDITIONS OF The Federal State Unitary Enterprise "The Scientific and Technical Center of the Defense Complex "Kompas" 

NEWS

29.09.2020
THE  ISSUE OF THE JOURNAL “INFORMATION SECURITY QUESTIONS” (No 3. 2020)

THE  ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 3. 2020)

Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600 Date 3 quarter 2020
Volume Issue 3
Page 1-54 Articles number 10
C O N T E N T S
N Article name Page 
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
1 Algorithm for hiding the use of a two-component container in a steganographic system
       Shakurskiy M. V.     (Samara State Technical University)
3-5 
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
2 Modeling and verification of the access control subsystem of Accord-X data security tool
       Kanner A. M.     (JSC "OKB SAPR")
       Kanner T. M.     (JSC "OKB SAPR"; Moscow Institute of Physics and Technology (National Research University))
6-10 
3 Implementation of the configuration management concept using the software module "Passport PO"
       Mozolina N. V.     (Moscow Institute of Physics and Technology (State University))
11-15 
TECHNICAL PROTECTION OF INFORMATION. ELECTRONIC SIGNATURE IN INFORMATION SYSTEMS
4 An alternative method for designing signature schemes satisfying criterion of post-quantum security
       Kostina A. A.     (St. Petersburg Federal Research Center of the RAS)
       Moldovyan N. A.     (St. Petersburg Federal Research Center of the RAS)
16-21 
5 Complexity evaluation of the parameters calculation algorithms in the signature scheme based on the hidden discrete logarithm problem
       Abrosimov I. K.     (St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences)
22-28 
GENERAL INFORMATION AND OBJECT SECURITY ISSUES
6 Principles of development and implementation of the advanced educational program for the higher education in the Information security area
       Kanner T. M.     (JSC "OKB SAPR"; Moscow Institute of Physics and Technology (National Research University))
29-33 
7 Synthesis of purpose systems in the conditions of information-complex situations
       Dorovskoy V. A.     (Kerch State Maritime Technological University)
       Novak B. P.     (Kerch State Maritime Technological University)
       Degtyarev A. V.     (Kerch State Maritime Technological University)
       Sobolev A. S.     (Kerch State Maritime Technological University)
       Erofeev P. A.     (Kerch State Maritime Technological University)
34-39 
8 Analysis of face and neck thermograms for users drowsiness recognition based on the Bayesian classifier
       Zhumazhanova S. S.     (Omsk State Technical University)
       Sulavko A. E.     (Omsk State Technical University)
       Lozhnikov P. S.     (Omsk State Technical University)
40-47 
9 Models for assessing the risk of information security violations during the operation of correctional security systems
       Titov D. V.     (Vologda Institute of Law and Economics of the Federal Penitentiary Service of Russia)
       Filipova E. E.     (Vologda Institute of Law and Economics of the Federal Penitentiary Service of Russia)
48-50 
10 Network traffic obfuscation methods
       Nevolin A. O.     (Moscow Aviation Institute (National Research University))
51-54 