Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
    • № 1 2004
      • INFORMATION SECURITY ASPECT

        Malyishev N. U., Moshnikov S.

        Application of extreme programming in information security
        Pages 7-13

        Bochkov M. V., Saenko I. B.

        Semi-Markov model of adaptive protection information from unauthorized access
        Pages 14-20
      • INFORMATION SECURITY APPLICATION

        Kornienko А. А., Sljusurenko I. M.

        Systems and methods of intrusion detection: current state and future trends
        Pages 21-34

        Ovchinnikova E. V.

        Development of interactive adaptive protection system
        Pages 35-39

        Baranov D. V.

        The information security via risk management
        Pages 40-43

        Baranov P. A.

        Review of program tools used for fighting spam and E-mail viruses
        Pages 44-51
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Kepke K. M., Zegzhda D. P.

        An approach to protection from distributed denial of service attacks
        Pages 52-56

        Garusev M. L.

        The use of event correlation for the developing the user profile of protected information system
        Pages 57-64
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Technology-cryptographic protection of the digital signature key
        Pages 65-71

        Erosh I., Skuratov V.

        Addressed message transferring with usage of matrices over GF(2) field
        Pages 72-78
      • EDUCATION PROBLEMS
        Submission for the prize of Russian Government
        Pages 79-80
    • № 2 2004
      • INFORMATION SECURITY ASPECT

        Borodakiy U. V., Dobrodeev A. U., Bedarev I. K., Paltchun B. P.

        On the optimum system configuration of technical regulations for crucial information objects
        Pages 7-12

        Sundeev P. V.

        Methodology of the analysis of information safety critical control systems
        Pages 13-22
      • INFORMATION SECURITY APPLICATION

        Leonid Bushuev

        Static and dynamic database model
        Pages 23-27

        Trifalenkov I. A.

        External communications security solutions: risk analysis approach
        Pages 28-34

        Dotsenko S., Zaitchikov A., Klaykhin V., Malish V.

        Application of th structural analysis ii the information protection system development
        Pages 35-44
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda P. D., Prosihin V. P., Dmitriev I. L.

        Security aspects of discreet information transactions transport network control
        Pages 45-53

        Sorokin V. N.

        Detecting beetles in remote host’s networking code
        Pages 54-56
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G., Makhovenko E. B.

        Two approaches to computing elliptic curve discrete logarithms
        Pages 57-63

        Rostovtsev A. G., Malyshev N. Ju.

        On the strength of Rijndael cipher with trivial key schedule
        Pages 64-71

        Prokopev S. E.

        The design of cryptographic services subsystem, optimizing development, verification and modification of cryptographic applications
        Pages 72-88
      • TECHNICAL SOLUTION

        Nurmieva M.

        On effective buffer management schemes for ATM switches
        Pages 89-97
    • № 3 2004
      • INFORMATION SECURITY ASPECT

        Kotenko A. G.

        The constructing of it security evaluation model complex
        Pages 7-14
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Frolov D. B.

        Internet-site and its legacy status. Part 1
        Pages 15-20
      • INFORMATION SECURITY APPLICATION

        Bochkov M. V.

        The statistical states identification method of computer network in conditions of a programme attacks
        Pages 21-27

        Bochkov M., Emelaynov A., Klaykhin V., Malish V. N.

        Algorithm of adaptive protection from unauthorized access to information in corporative computer network
        Pages 28-32
      • TECHNICAL SOLUTION

        Dymarsky Y., Nurmieva M.

        Approach to bandwidth allocation in multiservive network
        Pages 33-37

        Makarov S. B., Prisyazhnyuk I. V.

        Interference immunity of the MSK coherent demodulation in the private security radiosystems
        Pages 38-43
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Complex multiplication by isogeny of degree 3
        Pages 44-50

        Serov R. E.

        А new combined sign-encryption scheme with threshold decryption
        Pages 51-54

        Son  M. V.

        The decoding of RS-codes for the wire-tap channels
        Pages 55-60

        Ustinov A. A.

        Stochastic coding of messages of a redundant discrete source and its influence on the resistance of cryptographic systems of information protection
        Pages 61-71

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary
        Pages 72-84
    • № 4 2004
      • INFORMATION SECURITY APPLICATION

        Avramenko V., Bochkov M., Мatveev V.

        The method of the file contents safety control the summary
        Pages 7-14
      • TECHNICAL SOLUTION

        Makarov S. B, Markov A. M.

        Frequency and energy efficacy FM signals with MSK, which uses in telecommunication systems with bounded bandwidth
        Pages 15-23
      • APPLIED CRYPTOGRAPHY

        Erosh I.

        Some analogies between problems of modular arithmetic and matrix encoding
        Pages 24-31

        Rostovtsev A. G. and Makhovenko E. B.

        Hilbert polynomials and elliptic curve j-invariants
        Pages 32-38

        Ustinov A. A.

        Joint stochastic coding of the messages of several redundant sources based on cryptographical transformations
        Pages 39-49

        Ustinov A. A.

        An algorithm for stochastic coding of still images on the base of random sequences and analysis of its cryptographic properties
        Pages 50-59

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary
        Pages 60-75
      • ASPECTS OF INFORMATION SECURITY

        Frolov D. B., Starostin A. V.

        Internet site and its legacy status. Part 2
        Pages 76-79
      • EDUCATION PROBLEMS

        Zabolotskii V. P., Stepanov A. G., Usupov R. M.

        Issues of the information protection as the part of the general it training for the school and university students
        Pages 80-87
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year