ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 



THE INTERNET REPRESENTATION OF SCIENTIFIC  EDITIONS OF The Federal State Unitary Enterprise "The Scientific and Technical Center of the Defense Complex "Kompas" 

NEWS

01.04.2015
THE ISSUE OF THE JOURNAL “INFORMATION SECURITY QUESTIONS” (No 1. 2015)

THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 1. 2015)


Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600 Date 1 quarter 2015
Volume Issue 1
Page 1-83 Articles number 15
CONTENTS
N Article name Page 

Technical protection of information. ENGINEERING Cryptography

1 Protocol for secure encryption with using small-size key
       Moldovyan N. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Goryachev A. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Muravyov A. V.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
3-8 
2 Modeling and recognition of cryptographic generators based on Markov chains of conditional order
       Maltsev M. V.     (Research Institute for Applied Problems of Mathematics and Informatics of BSU )
9-11 
3 Quality assessment for cryptographic generators based on high-order Markov chains
       Palukha V. Yu.     (Research Institute for Applied Problems of Mathematics and Informatics of BSU )
       Kharin Yu. S.     (Research Institute for Applied Problems of Mathematics and Informatics of BSU )
12-14 

Technical protection of information. ACCESS CONTROL

4 Critical applications isolated data processing technology
       Shcheglov K. A.     (JSC "Research and Production Enterprise" Information Technology in Business" )
       Shcheglov A. Yu.     (JSC "Research and Production Enterprise" Information Technology in Business"; St.-Petersburg National Research University of IT, Mechanics and Optics )
15-22 
5 Biometric authentication identity: matrix neural network functional in the Hamming metric
       Ivanov A. I.     (Penza Research Electrotechnical Institute )
       Malygina E. A.     (Penza State University )
23-29 

Technical protection of information. trusted environment

6 Applicability of software testing methods for software and hardware DST
       Kanner T. M.     (Closed Joint Stock Company "OKB SAPR" )
30-39 
7 An approach to the modeling of method DARB using TCP
       Kornev D. A.     (Kursk State University )
       Lopin V. N.     (Kursk State University )
40-44 
8 Clouds attached to the land
       Schastny D. Yu.     (OKB SAPR JSC )
45-47 

GENERAL SAFETY INFORMATION AND FACILITIES

9 Articulatory analysis of acoustic channels of information leakage through optical cable systems
       Grishachev V. V.     (Institute for Information Sciences and Security Technologies (IISST) of Russian State University of the Humanities (RSUH) )
       Kalinina Yu. D.     (Institute for Information Sciences and Security Technologies (IISST) of Russian State University of the Humanities (RSUH) )
       Tarasov A. A.     (Institute for Information Sciences and Security Technologies (IISST) of Russian State University of the Humanities (RSUH) )
48-55 
10 Integrated panel for information protection from a leakage via technical channels
       Zelmanski O. B.     (Belarusian State University of Informatics and Radioelectronics )
       Petrov S. N.     (Belarusian State University of Informatics and Radioelectronics )
56-60 
11 Comparison of the tools for network performance measurement
       Vorotnikov V. S.     (National Research University of Electronic Technology )
61-63 
12 Risk assessment in information system based on objective and expert evaluations
       Abdenov A. Zh.     (Novosibirsk State Technical University (NSTU) )
       Zarkumova-Raykhel R. N.     (Novosibirsk State Technical University (NSTU) )
64-70 
13 Security issues of government information resources in crisis situations
       Rustamov D. A.     (Institute of Information Technology of Azerbaijan National Academy of Sciences )
       Rzaev M. Ya.     (Institute of Information Technology of Azerbaijan National Academy of Sciences )
71-74 
14 The analysis of vulnerabilities and threats to the national payment system of the Russian Federation
       Livshitz I. I.     (LLC "GasInformService" )
75-80 
15 Detection of image areas for digital watermarking with usage of wavelet transformation
       Mitskevich M. N.     (Research Institute for Applied Problems of Mathematics and Informatics BSU )
81-83 