ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 



THE INTERNET REPRESENTATION OF SCIENTIFIC  EDITIONS OF The Federal State Unitary Enterprise "The Scientific and Technical Center of the Defense Complex "Kompas" 

NEWS

24.10.2015
THE ISSUE OF THE JOURNAL “INFORMATION SECURITY QUESTIONS” (No 3. 2015)

THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 3. 2015)


Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600  Date 3 quarter 2015
Volume Issue 3
Page 1-96 Articles number 12
CONTENTS
N Article name Page 
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
1 Fully homomorphic encryption (Review)
       Babenko L. K.     (Southern Federal University )
       Burtyka F. B.     (Southern Federal University )
       Makarevich O. B.     (Southern Federal University )
       Trepacheva A. V.     (Southern Federal University )
3-26 
2 Stream deniable encryption protocol with shared key
       Moldovyan N. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences; St.-Petersburg State Electrotechnical University "LETI" )
       Bashirov Z. S.     (St.-Petersburg State Electrotechnical University "LETI" )
       Solnyshkin Zh. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
27-31 
3 Threshold authenticatrion protocols
       Moldovyan N. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences; St.-Petersburg State Electrotechnical University "LETI" )
       Shapovalov P. I.     (St.-Petersburg State Electrotechnical University "LETI" )
32-36 
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
4 Hidden biometric identification technologies of users of computer systems (Review)
       Vasiliev V. I.     (Ufa State Aviation Technical University )
       Lozhnikov P. S.     (Omsk State Technical University )
       Sulavko A. E.     (Omsk State Technical University )
       Eremenko A. V.     (Omsk Transport University )
37-47 
5 Biometric identification of handwritten images via correlation analog of Bayes' rule
       Ivanov A. I.     (Penza Research Electrotechnical Institute )
       Kachajkin E. I.     (Ministry of Justice of the Russian Federation )
       Lozhnikov P. S.     (Omsk State Technical University )
       Sulavko A. E.     (Omsk State Technical University )
48-54 
6 LAN vulnerability analysis and development of security solutions
       Chertok A. V.     (ITMO University )
       Chertok E. V.     (St.-Petersburg State University of Economics )
55-61 
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT
7 Using method DARB in the risk management of information security of the server
       Kornev D. A.     (Kursk branch of the Financial University under the Government of the Russian Federation )
       Lopin V. N.     (Kursk branch of the Financial University under the Government of the Russian Federation )
62-65 
GENERAL SAFETY INFORMATION AND FACILITIES
8 Determining the level of information security in the facility informatization based on assessment of the protection measures
       Azhmukhamedov I. M.     (Astrakhan State Technical University )
       Romanov F. V.     (Astrakhan State Technical University )
       Knyazeva O. M.     ("UpGrade" )
66-72 
9 Autoregressive model in a steganographic method based on the direct spread spectrum
       Baltaev R. Kh.     (Perm State University )
       Lunegov I. V.     (Perm State University )
73-78 
10 Making a stochastic model of complex protection system of the voice data for control of its security
       Grebenev D. V.     (Academy of Federal Guard Service of Russian Federation )
       Gavrilov I. V.     (Academy of Federal Guard Service of Russian Federation )
79-84 
11 The definition of boundary conditions in the majorizing estimate of the extinction coefficient levels of side electromagnetic radiation technical means
       Taranov A. B.     (Academy of Federal Guard Service of Russian Federation )
       Basov O. O.     (Academy of Federal Guard Service of Russian Federation )
85-90 
12 Approach to the comparison of operational reliability of the monitoring of the state of information security at the facilities
       Markov D. V.     (Military unit No. 11928 )
       Taraskin M. M.     (Military unit No. 11928 )
91-96 