THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 2. 2015)
Journal name | INFORMATION SECURITY QUESTIONS |
ISSN | 2073-2600 | Date | 2 quarter 2015 |
Volume | Issue | 2 | |
Page | 1-78 | Articles number | 12 |
N | Article name | Page | |
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY | |||
1 | Generation of cubic equations as method for public encryption
Moldovyan N. A. (St.-Petersburg State Electrotechnical University "LETI"; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) Moldovyan D. N. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) Vaichikauskas M. A. (St.-Petersburg State Electrotechnical University "LETI" ) | 3-7 | |
2 | Encryption protocols using the small-size shared keys and single-use public keys
Moldovyan N. A. (St.-Petersburg State Electrotechnical University LETI; St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) Muravyov A. V. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) Kostina A. A. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) | 8-12 | |
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL | |||
3 | RFID reader for access control systems design approach
Zaytsev D. S. (ANCUD Ltd ) Panasenko S. P. (ANCUD Ltd ) Pimenov A. V. (ANCUD Ltd ) Syrchin V. K. (ANCUD Ltd ) | 13-18 | |
4 | Network objects access rights control implementation
Shcheglov K. A. (JSC "Research and Production Enterprise "Information Technology in Business" ) Shcheglov A. Yu. (JSC "Research and Production Enterprise "Information Technology in Business"; St.-Petersburg National Research University of IT, Mechanics and Optics ) | 19-27 | |
5 | Verification of authenticity for handwritten signatures using Bayesian-Hamming networks and quadric form networks
Ivanov A. I. (Penza Research Electrotechnical Institute ) Lozhnikov P. S. (Omsk State Technical University ) Kachajkin E. I. (Ministry of Justice of the Russian Federation ) | 28-34 | |
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT | |||
6 | Usage of wireless mesh networks in Safe City hardware-software complex
Bokov D. M. (Tomsk State University of Control Systems and Radioelectronics ) Melnikov M. I. (Tomsk State University of Control Systems and Radioelectronics ) Shelupanov A. A. (Tomsk State University of Control Systems and Radioelectronics ) Mitsel A. A. (Tomsk State University of Control Systems and Radioelectronics ) Ekhlakov Yu. P. (Tomsk State University of Control Systems and Radioelectronics ) | 35-41 | |
7 | Multi-channel detection of radio signal with unknown structure against the noise background
Bylinkin A. A. (Moscow State University of Instrument Engineering and Computer Science ) | 42-47 | |
GENERAL SAFETY INFORMATION AND FACILITIES | |||
8 | The analysis of vulnerabilities and threats to the national payment system of the Russian Federation
Livshits I. I. (LLC "GasInformService" ) | 48-56 | |
9 | Method of establishment and maintenance of event management and event life cycle within information security management system
Kuznetsov A. V. (LLC "Research and Development Center "Vulkan" ) | 57-62 | |
10 | Protecting IC secure keys on Physical Unclonable Functions in case of untrusted foundry
Semenov A. V. ("18 Central research Institute", Departament of Defense ) Kostyuck A. V. ("18 Central research Institute", Departament of Defense ) | 63-68 | |
11 | The complex approach to information risk management based on the VIKOR
Studennikov K. O. (Kursk State University ) Lopin V. N. (Kursk State University ) | 69-73 | |
12 | Steganographic transform based on contraction mapping
Shakursky V. K. (State University of Togliatt ) Shakursky M. V. (Volga Region State University of Service ) | 74-78 | |