Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
    • № 1 2002
      • INFORMATION SECURITY ASPECT

        Streltsov A. A.

        The information, forms and properties

        Kalinin M. O.

        The structure and application of the language description of security politics

        Kononov A. A., Burdin O. A.

        The axiomatics estimation of a risk violation of information security of the computer organizational systems
      • СОВРЕМЕННОЕ СОСТОЯНИЕ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КОМПЬЮТЕРНЫХ СИСТЕМ

        Zegzhda P. D., Novicov V. K., Prosichin V. P., Harchenko I. P.

        The modern aspects of security of informational – telecommunication systems

        Kort S. S.

        The computer viruses and worms. The modern state of problem
      • APPLIED CRYPTOGRAPHY

        Rostovsev A. G., Machovenko E. B.

        Two methods to the analysis of the block ciphers

        Eremeev M. A., Kornienko A. A.

        The development and researches of properties controlled operational substitutions above the vectors of the large dimension in interective block cryptoalgorithms
      • EDUCATION PROBLEMS

        Vasilev Y. S., Zegzhda P. D.

        The problems and perspectives of technicians training in information security field

        Zegzhda P. D., Kalinin M. O.

        The complex of laboratory works on discipline «The bases of an artificial intellect»

        Machovenko E. B.

        The educational course «The additional chapters of the numerical analysis»
    • № 2 2002
      • INFORMATION SECURITY ASPECT

        Zegzhda D. P., Kalinin M. O.

        A mathematical basis of complex security policies design and specification
      • INFORMATION SECURITY APPLICATION

        Antimonov C. G. Kurikalov V. B.

        New «Virus–antivirus» line in computer and network world

        Vovk A. M.

        GDB remote debugging

        Gorelenkov A. P., Zegzhda D. P.

        Implementation of the directory service based on Phoenox secure operating system

        Kort S. S., Petrov A. V.

        Store unit for the network automated vulnerabilities detection system
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Cryptology and information security

        Okov I. N.

        Estimation of protection of cryptographic coded messages with certain distortion

        Savelev M. F.

        The linear codes in the wiretap channels
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Fimin M. D.

        Memory management facilities of modem operating systems
      • NETWORK AND TELECOMMUNICATION SECURITY

        Tarazevitch S. A.

        Telephone networks security
      • EDUCATION PROBLEMS

        Vasilyev Y. S., Zegzhda P. D.

        Education problems and prospects in information security

        Ivanov A. V.

        The problems of scientific and educational literature protection from publicational spam
    • № 3 2002
      • INFORMATION SECURITY ASPECT

        Zegzhda D. P., Kalinin M. O.

        System security evalution
      • INFORMATION SECURITY APPLICATION

        Kort S. S., Lysak S. I.

        The buffer overflow problem in C++

        Zegzhda P. D., Otavin A. D.

        Methods of construction of the protected information systems and their application in educational process

        Dmitriev I. L., Ovtchinnikova E. V.

        The prospects of public key infrastructurte usage for securt distributed networks development

        Dmitriev I. L., Novikov A. A.

        Public key infrastructure and its usage in Russian railway transport

        Zegzhda D. P., Tarazevitch S. A.

        Today’s situation in computer technologies security and its reasons
      • TECHNICAL SOLUTION

        Merkusheva A. V.

        Algorithm for two-phase scrembling on the basis of transforming the wavelet – mapping of speech signal by meanse of H – equivalent matrices
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Tomilin V. N.

        Usage of cell communications to create additional channels of secret information distribution

        Platonov V. V.

        Firewall technology is base of network security systems
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G. and Makhovenko E. B.

        Cryptosystem based on category of isogenious elliptic curves
      • EDUCATION PROBLEMS

        Vus M. A.

        On the «Bases of information security and protection» special cours for humane students

        Zegzhda P. D., Kalinin M. O.

        Practices on artificial intelligence courses
    • № 4 2002
      • INFORMATION SECURITY ASPECT

        Talalueva M. A., Fisenko V. K.

        Eveloping of interstate glossary of information security is about to happen

        Frolov D. B., Manoilo A. V., Veprintsev V. B.

        The particularies of information policy in the age of the information society
      • INFORMATION SECURITY APPLICATION

        Dmitriev I. L.

        Analysis of modern public key infrastructure systems
      • TECHNICAL SOLUTION

        Vorobjev E. G.

        The use of the polarization signals properties for increasing of radio communication systems stability against jamming

        Tarasov А. А.

        Tasks of maintenance of functional stability of computer systems

        Yashin A. I.

        Simulation and representation of the allocated engineering systems’ geoinformation fields for an estimation and prediction of the information’s leakage variants
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Zegzhda D. P., Fimin M. D.

        Inter-process communication in microkernel-based operating systems
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Kazennov V. N.

        Dynamical defence from DDOS-attacks on public WWW-server

        Kazennov V. N.

        Defence from DOS-attacks on statefull inspection firewalls

        Nekrasova Т. Р., Aksenova E. E.

        The peculiarities of the price formation policy for telecommunication companies
      • APPLIED CRYPTOGRAPHY

        Grigoriev V.R., Zyazin V. P., Kostsov E. G., Piskunov S. V.

        On the possibility of effective implementation of high-speed optoelectronic cryptomodules for the promising communication systems

        Nazarov A. N., Sikorsky A. B., Derkach E. I.

        Algorithms of uncryptographics protection information to delivery of reporting in cellular wireless communication system in conditions of radioelectronic reluctance

        Shtanko S. V., Ysko S. A.

        Features of information protection in information command and control system radiochannels with use of cryptographic protocols
  • 2001 year
  • 2000 year
  • 1999 year