ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 



THE INTERNET REPRESENTATION OF SCIENTIFIC  EDITIONS OF The Federal State Unitary Enterprise "The Scientific and Technical Center of the Defense Complex "Kompas" 

NEWS

29.07.2016
THE ISSUE OF THE JOURNAL “INFORMATION SECURITY QUESTIONS” (No 2. 2016)

THE ISSUE OF THE JOURNAL
“INFORMATION SECURITY QUESTIONS”
(No 2. 2016)


Journal name INFORMATION SECURITY QUESTIONS
ISSN 2073-2600 Date 2 quarter 2016
Volume Issue 2
Page 1-74 Articles number 14
C O N T E N T S
N Article name Page 
TECHNICAL PROTECTION OF INFORMATION. ENGINEERING CRYPTOGRAPHY
1 Protocol for secure encryption with using small-size key based on difficulty of simultaneous solving factorization and discrete logarithm problems
       Berezin A. N.     (St.-Petersburg State Electrotechnical University "LETI" )
3-8 
2 No-key protocol for deniable encryption
       Moldovyan N. A.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Shcherbacov A. V.     (St.-Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
9-14 
TECHNICAL PROTECTION OF INFORMATION. ACCESS CONTROL
3 Implementing file types access rights control by using file extensions
       Shcheglov K. A.     (St.-Petersburg National Research University of IT, Mechanics and Optics )
       Shcheglov A. Yu.     (St.-Petersburg National Research University of IT, Mechanics and Optics )
15-22 
4 Creation of a discretionary security policy on partial set of data
       Belim S. V.     (Dostoevsky Omsk State University )
       Bogachenko N. F.     (Dostoevsky Omsk State University )
23-28 
5 Features of testing data security tools from unauthorized access at the virtual infrastructure
       Mozolina N. V.     (Moscow Institute of Physics and Technology (State University) )
       Lugovtsova K. A.     (Closed Joint Stock Company "OKB SAPR" )
29-31 
6 Transformation of the original image for recognition on neural network neocognitron
       Kozlov P. V.     (Perm National Research Polytechnic University )
       Yuzhakov A. A.     (Perm National Research Polytechnic University )
32-34 
TECHNICAL PROTECTION OF INFORMATION. TRUSTED ENVIRONMENT
7 The secure boot and integrity control of archived data. Part and the whole (Review )
       Altukhov A. A.     (Closed Joint Stock Company "OKB SAPR" )
35-39 
8 M&M! as the foundation for safe mobile systems
       Schastny D. Yu.     (Closed Joint Stock Company "OKB SAPR" )
40-41 
9 Mechanism of updating for protected microcomputers MKT
       Batrakov A. Yu.     (Closed Joint Stock Company "OKB SAPR" )
42-43 
TECHNICAL PROTECTION OF INFORMATION. ELECTRONIC SIGNATURE IN INFORMATION SYSTEMS
10 Group digital signature: new protocols
       Moldovyan A. A.     (St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Galanov A. I.     (St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences )
       Sinev V. E.     (St. Petersburg State Electrotechnical University "LETI" )
44-50 
GENERAL SAFETY INFORMATION AND FACILITIES
11 System analysis of criteria for evaluating the vulnerability of protected information technologies' subjects
       Amezhnova E. D.     (Khrunichev State Research and Production Space Center )
51-57 
12 Information and legal security production facility
       Pyshkin N. B.     (JSC "ZELTA-TV" )
       Vasilets V. I.     (JSC "ZELTA-TV" )
       Skvortsov V. E.     (LLC "MELZ" )
58-62 
13 Protection of information in medical information systems, the need to implement
       Karpov O. E.     (National Medical and Surgical Center named after Nikolai Pirogov )
       Mikerin D. S.     (National Medical and Surgical Center named after Nikolai Pirogov )
63-72 
14 New protected method of software licenses distribution
       Chadov A. Yu.     (Closed Joint Stock Company "OKB SAPR" )
73-74 