Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
    • № 1 2005
      • INFORMATION SECURITY APPLICATION

        Baranov P. A.

        An overview of difficulties concerning development of mandatory access system (according to the Bell – Lapadula model) for a computer systems resources
        Pages 7-14

        Baranov P. A.

        Modern difficulties with the guaranteeing of information security of instant messaging
        Pages 15-22

        Bulygin Y.

        Licensing: structure and protecting license data from forgery
        Pages 23-28

        Kosolapov F. A.

        The analysis of general ways of evolution of the behavior blocking systems
        Pages 29-38
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda P. D., Prosihin V. P.

        Securing of telecommunication management systems for power industry
        Pages 39-48

        Sorokin V. N.

        Language for description of TCP/IP protocols stack implementation as device for NIDS effectivity improving
        Pages 49-53
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G., Shemyakina O. V.

        Protection of the Rijndael against side channel attacks using random isomorphisms
        Pages 54-62
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Kotenko I. V., Stepashkin M. V.

        Usage of dummy information systems
        Pages 63-73
      • TECHNICAL SOLUTION

        Fersman G. A., Ermolenko I. A., Morar V. V.

        Noise level estimation in two-channel cjrrelation measuring unstrument for protecting resources of computer networks
        Pages 74-79
    • № 2 2005
      • INFORMATION SECURITY ASPECTS

        Vovk A. M., Zegzhda D. P.

        Security model of hybrid operating system
        Pages 7-14

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys on the basis of subject – object model with using of automata theory and matrix of access
        Pages 15-19

        Kabanov Artem S.

        Technique of an estimation of efficiency of protective systems on electronic keys on the basis of expert estimation
        Pages 20-26

        Monin A. S.

        The analysis of existing technologies of management of information risks
        Pages 27-30
      • INFORMATION SECURITY APPLICATION

        Dudorov E. N.

        Possible approaches to revealing suspicious activity of the software
        Pages 31-37
      • NETWORK AND TELECOMMUNICATION SECURITY

        Kochetkov V.M.

        Digital rights management systems information security
        Pages 38-43
      • APPLIED CRYPTOGRAPHY

        Prokopyev S. E.

        Adaptation of Canetti security model for its using as the base of cryptographic services subsystem design
        Pages 44-58

        Shadrin O. S.

        Computing discrete logarithms using number field sieve
        Pages 59-64
      • TECHNICAL SOLUTION

        Levchuk S. A., Makarov S. B., Mesheryakov A. V., Prisyazhnyuk I. V.

        Noise immunity of MSK signals reception in the local alarm radiotechnical systems under influence of M-Nakagami fading
        Pages 65-73
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year