ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 



THE INTERNET REPRESENTATION OF SCIENTIFIC  EDITIONS OF The Federal State Unitary Enterprise "The Scientific and Technical Center of the Defense Complex "Kompas" 

NEWS

24.06.2015
THE ISSUE OF THE JOURNAL “INFORMATION SECURITY QUESTIONS” (No 2. 2015)

THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 2. 2015)


Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600 Date 2 quarter 2015
Volume Issue 2
Page 1-78 Articles number 12
CONTENTS
N Article name Page
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
1 Generation of cubic equations as method for public encryption
       Moldovyan N. A.     (St.-Petersburg State Electrotechnical University "LETI"; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Moldovyan D. N.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Vaichikauskas M. A.     (St.-Petersburg State Electrotechnical University "LETI" )
3-7 
2 Encryption protocols using the small-size shared keys and single-use public keys
       Moldovyan N. A.     (St.-Petersburg State Electrotechnical University LETI; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Muravyov A. V.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Kostina A. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
8-12 
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
3 RFID reader for access control systems design approach
       Zaytsev D. S.     (ANCUD Ltd )
       Panasenko S. P.     (ANCUD Ltd )
       Pimenov A. V.     (ANCUD Ltd )
       Syrchin V. K.     (ANCUD Ltd )
13-18 
4 Network objects access rights control implementation
       Shcheglov K. A.     (JSC "Research and Production Enterprise "Information Technology in Business" )
       Shcheglov A. Yu.     (JSC "Research and Production Enterprise "Information Technology in Business"; St.-Petersburg National Research University of IT, Mechanics and Optics )
19-27 
5 Verification of authenticity for handwritten signatures using Bayesian-Hamming networks and quadric form networks
       Ivanov A. I.     (Penza Research Electrotechnical Institute )
       Lozhnikov P. S.     (Omsk State Technical University )
       Kachajkin E. I.     (Ministry of Justice of the Russian Federation )
28-34 
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT
6 Usage of wireless mesh networks in Safe City hardware-software complex
       Bokov D. M.     (Tomsk State University of Control Systems and Radioelectronics )
       Melnikov M. I.     (Tomsk State University of Control Systems and Radioelectronics )
       Shelupanov A. A.     (Tomsk State University of Control Systems and Radioelectronics )
       Mitsel A. A.     (Tomsk State University of Control Systems and Radioelectronics )
       Ekhlakov Yu. P.     (Tomsk State University of Control Systems and Radioelectronics )
35-41 
7 Multi-channel detection of radio signal with unknown structure against the noise background
       Bylinkin A. A.     (Moscow State University of Instrument Engineering and Computer Science )
42-47 
GENERAL SAFETY INFORMATION AND FACILITIES
8 The analysis of vulnerabilities and threats to the national payment system of the Russian Federation
       Livshits I. I.     (LLC "GasInformService" )
48-56 
9 Method of establishment and maintenance of event management and event life cycle within information security management system
       Kuznetsov A. V.     (LLC "Research and Development Center "Vulkan" )
57-62 
10 Protecting IC secure keys on Physical Unclonable Functions in case of untrusted foundry
       Semenov A. V.     ("18 Central research Institute", Departament of Defense )
       Kostyuck A. V.     ("18 Central research Institute", Departament of Defense )
63-68 
11 The complex approach to information risk management based on the VIKOR
       Studennikov K. O.     (Kursk State University )
       Lopin V. N.     (Kursk State University )
69-73 
12 Steganographic transform based on contraction mapping
       Shakursky V. K.     (State University of Togliatt )
       Shakursky M. V.     (Volga Region State University of Service )
74-78 