THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 3. 2015)
Journal name | INFORMATION SECURITY QUESTIONS |
ISSN | 2073-2600 | Date | 3 quarter 2015 |
Volume | Issue | 3 | |
Page | 1-96 | Articles number | 12 |
N | Article name | Page | |
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY | |||
1 | Fully homomorphic encryption (Review)
Babenko L. K. (Southern Federal University ) Burtyka F. B. (Southern Federal University ) Makarevich O. B. (Southern Federal University ) Trepacheva A. V. (Southern Federal University ) | 3-26 | |
2 | Stream deniable encryption protocol with shared key
Moldovyan N. A. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences; St.-Petersburg State Electrotechnical University "LETI" ) Bashirov Z. S. (St.-Petersburg State Electrotechnical University "LETI" ) Solnyshkin Zh. A. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences ) | 27-31 | |
3 | Threshold authenticatrion protocols
Moldovyan N. A. (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences; St.-Petersburg State Electrotechnical University "LETI" ) Shapovalov P. I. (St.-Petersburg State Electrotechnical University "LETI" ) | 32-36 | |
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL | |||
4 | Hidden biometric identification technologies of users of computer systems (Review)
Vasiliev V. I. (Ufa State Aviation Technical University ) Lozhnikov P. S. (Omsk State Technical University ) Sulavko A. E. (Omsk State Technical University ) Eremenko A. V. (Omsk Transport University ) | 37-47 | |
5 | Biometric identification of handwritten images via correlation analog of Bayes' rule
Ivanov A. I. (Penza Research Electrotechnical Institute ) Kachajkin E. I. (Ministry of Justice of the Russian Federation ) Lozhnikov P. S. (Omsk State Technical University ) Sulavko A. E. (Omsk State Technical University ) | 48-54 | |
6 | LAN vulnerability analysis and development of security solutions
Chertok A. V. (ITMO University ) Chertok E. V. (St.-Petersburg State University of Economics ) | 55-61 | |
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT | |||
7 | Using method DARB in the risk management of information security of the server
Kornev D. A. (Kursk branch of the Financial University under the Government of the Russian Federation ) Lopin V. N. (Kursk branch of the Financial University under the Government of the Russian Federation ) | 62-65 | |
GENERAL SAFETY INFORMATION AND FACILITIES | |||
8 | Determining the level of information security in the facility informatization based on assessment of the protection measures
Azhmukhamedov I. M. (Astrakhan State Technical University ) Romanov F. V. (Astrakhan State Technical University ) Knyazeva O. M. ("UpGrade" ) | 66-72 | |
9 | Autoregressive model in a steganographic method based on the direct spread spectrum
Baltaev R. Kh. (Perm State University ) Lunegov I. V. (Perm State University ) | 73-78 | |
10 | Making a stochastic model of complex protection system of the voice data for control of its security
Grebenev D. V. (Academy of Federal Guard Service of Russian Federation ) Gavrilov I. V. (Academy of Federal Guard Service of Russian Federation ) | 79-84 | |
11 | The definition of boundary conditions in the majorizing estimate of the extinction coefficient levels of side electromagnetic radiation technical means
Taranov A. B. (Academy of Federal Guard Service of Russian Federation ) Basov O. O. (Academy of Federal Guard Service of Russian Federation ) | 85-90 | |
12 | Approach to the comparison of operational reliability of the monitoring of the state of information security at the facilities
Markov D. V. (Military unit No. 11928 ) Taraskin M. M. (Military unit No. 11928 ) | 91-96 | |