Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
    • № 1 2002
      • INFORMATION SECURITY ASPECTS

        Streltsov A. A.

        The information, forms and properties

        To quote:

        Streltsov A. A.

        The information, forms and properties // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Kalinin M. O.

        The structure and application of the language description of security politics

        To quote:

        Kalinin M. O.

        The structure and application of the language description of security politics // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Kononov A. A., Burdin O. A.

        The axiomatics estimation of a risk violation of information security of the computer organizational systems

        To quote:

        Kononov A. A., Burdin O. A.

        The axiomatics estimation of a risk violation of information security of the computer organizational systems // Information Security Problems. Computer Systems. 2002. № 1. DOI:
      • СОВРЕМЕННОЕ СОСТОЯНИЕ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КОМПЬЮТЕРНЫХ СИСТЕМ

        Zegzhda P. D., Novicov V. K., Prosichin V. P., Harchenko I. P.

        The modern aspects of security of informational – telecommunication systems

        To quote:

        Zegzhda P. D., Novicov V. K., Prosichin V. P., Harchenko I. P.

        The modern aspects of security of informational – telecommunication systems // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Kort S. S.

        The computer viruses and worms. The modern state of problem

        To quote:

        Kort S. S.

        The computer viruses and worms. The modern state of problem // Information Security Problems. Computer Systems. 2002. № 1. DOI:
      • APPLIED CRYPTOGRAPHY

        Rostovsev A. G., Machovenko E. B.

        Two methods to the analysis of the block ciphers

        To quote:

        Rostovsev A. G., Machovenko E. B.

        Two methods to the analysis of the block ciphers // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Eremeev M. A., Kornienko A. A.

        The development and researches of properties controlled operational substitutions above the vectors of the large dimension in interective block cryptoalgorithms

        To quote:

        Eremeev M. A., Kornienko A. A.

        The development and researches of properties controlled operational substitutions above the vectors of the large dimension in interective block cryptoalgorithms // Information Security Problems. Computer Systems. 2002. № 1. DOI:
      • EDUCATION PROBLEMS

        Vasilev Y. S., Zegzhda P. D.

        The problems and perspectives of technicians training in information security field

        To quote:

        Vasilev Y. S., Zegzhda P. D.

        The problems and perspectives of technicians training in information security field // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Zegzhda P. D., Kalinin M. O.

        The complex of laboratory works on discipline «The bases of an artificial intellect»

        To quote:

        Zegzhda P. D., Kalinin M. O.

        The complex of laboratory works on discipline «The bases of an artificial intellect» // Information Security Problems. Computer Systems. 2002. № 1. DOI:

        Machovenko E. B.

        The educational course «The additional chapters of the numerical analysis»

        To quote:

        Machovenko E. B.

        The educational course «The additional chapters of the numerical analysis» // Information Security Problems. Computer Systems. 2002. № 1. DOI:
    • № 2 2002
      • INFORMATION SECURITY ASPECTS

        Zegzhda D. P., Kalinin M. O.

        A mathematical basis of complex security policies design and specification

        To quote:

        Zegzhda D. P., Kalinin M. O.

        A mathematical basis of complex security policies design and specification // Information Security Problems. Computer Systems. 2002. № 2. DOI:
      • INFORMATION SECURITY APPLICATION

        Antimonov C. G. Kurikalov V. B.

        New «Virus–antivirus» line in computer and network world

        To quote:

        Antimonov C. G. Kurikalov V. B.

        New «Virus–antivirus» line in computer and network world // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Vovk A. M.

        GDB remote debugging

        To quote:

        Vovk A. M.

        GDB remote debugging // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Gorelenkov A. P., Zegzhda D. P.

        Implementation of the directory service based on Phoenox secure operating system

        To quote:

        Gorelenkov A. P., Zegzhda D. P.

        Implementation of the directory service based on Phoenox secure operating system // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Kort S. S., Petrov A. V.

        Store unit for the network automated vulnerabilities detection system

        To quote:

        Kort S. S., Petrov A. V.

        Store unit for the network automated vulnerabilities detection system // Information Security Problems. Computer Systems. 2002. № 2. DOI:
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Cryptology and information security

        To quote:

        Rostovtsev A. G.

        Cryptology and information security // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Okov I. N.

        Estimation of protection of cryptographic coded messages with certain distortion

        To quote:

        Okov I. N.

        Estimation of protection of cryptographic coded messages with certain distortion // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Savelev M. F.

        The linear codes in the wiretap channels

        To quote:

        Savelev M. F.

        The linear codes in the wiretap channels // Information Security Problems. Computer Systems. 2002. № 2. DOI:
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Fimin M. D.

        Memory management facilities of modem operating systems

        To quote:

        Fimin M. D.

        Memory management facilities of modem operating systems // Information Security Problems. Computer Systems. 2002. № 2. DOI:
      • NETWORK AND TELECOMMUNICATION SECURITY

        Tarazevitch S. A.

        Telephone networks security

        To quote:

        Tarazevitch S. A.

        Telephone networks security // Information Security Problems. Computer Systems. 2002. № 2. DOI:
      • EDUCATION PROBLEMS

        Vasilyev Y. S., Zegzhda P. D.

        Education problems and prospects in information security

        To quote:

        Vasilyev Y. S., Zegzhda P. D.

        Education problems and prospects in information security // Information Security Problems. Computer Systems. 2002. № 2. DOI:

        Ivanov A. V.

        The problems of scientific and educational literature protection from publicational spam

        To quote:

        Ivanov A. V.

        The problems of scientific and educational literature protection from publicational spam // Information Security Problems. Computer Systems. 2002. № 2. DOI:
    • № 3 2002
      • INFORMATION SECURITY ASPECTS

        Zegzhda D. P., Kalinin M. O.

        System security evalution

        To quote:

        Zegzhda D. P., Kalinin M. O.

        System security evalution // Information Security Problems. Computer Systems. 2002. № 3. DOI:
      • INFORMATION SECURITY APPLICATION

        Kort S. S., Lysak S. I.

        The buffer overflow problem in C++

        To quote:

        Kort S. S., Lysak S. I.

        The buffer overflow problem in C++ // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Zegzhda P. D., Otavin A. D.

        Methods of construction of the protected information systems and their application in educational process

        To quote:

        Zegzhda P. D., Otavin A. D.

        Methods of construction of the protected information systems and their application in educational process // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Dmitriev I. L., Ovtchinnikova E. V.

        The prospects of public key infrastructurte usage for securt distributed networks development

        To quote:

        Dmitriev I. L., Ovtchinnikova E. V.

        The prospects of public key infrastructurte usage for securt distributed networks development // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Dmitriev I. L., Novikov A. A.

        Public key infrastructure and its usage in Russian railway transport

        To quote:

        Dmitriev I. L., Novikov A. A.

        Public key infrastructure and its usage in Russian railway transport // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Zegzhda D. P., Tarazevitch S. A.

        Today’s situation in computer technologies security and its reasons

        To quote:

        Zegzhda D. P., Tarazevitch S. A.

        Today’s situation in computer technologies security and its reasons // Information Security Problems. Computer Systems. 2002. № 3. DOI:
      • TECHNICAL SOLUTION

        Merkusheva A. V.

        Algorithm for two-phase scrembling on the basis of transforming the wavelet – mapping of speech signal by meanse of H – equivalent matrices

        To quote:

        Merkusheva A. V.

        Algorithm for two-phase scrembling on the basis of transforming the wavelet – mapping of speech signal by meanse of H – equivalent matrices // Information Security Problems. Computer Systems. 2002. № 3. DOI:
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Tomilin V. N.

        Usage of cell communications to create additional channels of secret information distribution

        To quote:

        Tomilin V. N.

        Usage of cell communications to create additional channels of secret information distribution // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Platonov V. V.

        Firewall technology is base of network security systems

        To quote:

        Platonov V. V.

        Firewall technology is base of network security systems // Information Security Problems. Computer Systems. 2002. № 3. DOI:
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G. and Makhovenko E. B.

        Cryptosystem based on category of isogenious elliptic curves

        To quote:

        Rostovtsev A. G. and Makhovenko E. B.

        Cryptosystem based on category of isogenious elliptic curves // Information Security Problems. Computer Systems. 2002. № 3. DOI:
      • EDUCATION PROBLEMS

        Vus M. A.

        On the «Bases of information security and protection» special cours for humane students

        To quote:

        Vus M. A.

        On the «Bases of information security and protection» special cours for humane students // Information Security Problems. Computer Systems. 2002. № 3. DOI:

        Zegzhda P. D., Kalinin M. O.

        Practices on artificial intelligence courses

        To quote:

        Zegzhda P. D., Kalinin M. O.

        Practices on artificial intelligence courses // Information Security Problems. Computer Systems. 2002. № 3. DOI:
    • № 4 2002
      • INFORMATION SECURITY ASPECTS

        Talalueva M. A., Fisenko V. K.

        Eveloping of interstate glossary of information security is about to happen

        To quote:

        Talalueva M. A., Fisenko V. K.

        Eveloping of interstate glossary of information security is about to happen // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Frolov D. B., Manoilo A. V., Veprintsev V. B.

        The particularies of information policy in the age of the information society

        To quote:

        Frolov D. B., Manoilo A. V., Veprintsev V. B.

        The particularies of information policy in the age of the information society // Information Security Problems. Computer Systems. 2002. № 4. DOI:
      • INFORMATION SECURITY APPLICATION

        Dmitriev I. L.

        Analysis of modern public key infrastructure systems

        To quote:

        Dmitriev I. L.

        Analysis of modern public key infrastructure systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:
      • TECHNICAL SOLUTION

        Vorobjev E. G.

        The use of the polarization signals properties for increasing of radio communication systems stability against jamming

        To quote:

        Vorobjev E. G.

        The use of the polarization signals properties for increasing of radio communication systems stability against jamming // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Tarasov А. А.

        Tasks of maintenance of functional stability of computer systems

        To quote:

        Tarasov А. А.

        Tasks of maintenance of functional stability of computer systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Yashin A. I.

        Simulation and representation of the allocated engineering systems’ geoinformation fields for an estimation and prediction of the information’s leakage variants

        To quote:

        Yashin A. I.

        Simulation and representation of the allocated engineering systems’ geoinformation fields for an estimation and prediction of the information’s leakage variants // Information Security Problems. Computer Systems. 2002. № 4. DOI:
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Zegzhda D. P., Fimin M. D.

        Inter-process communication in microkernel-based operating systems

        To quote:

        Zegzhda D. P., Fimin M. D.

        Inter-process communication in microkernel-based operating systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Kazennov V. N.

        Dynamical defence from DDOS-attacks on public WWW-server

        To quote:

        Kazennov V. N.

        Dynamical defence from DDOS-attacks on public WWW-server // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Kazennov V. N.

        Defence from DOS-attacks on statefull inspection firewalls

        To quote:

        Kazennov V. N.

        Defence from DOS-attacks on statefull inspection firewalls // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Nekrasova Т. Р., Aksenova E. E.

        The peculiarities of the price formation policy for telecommunication companies

        To quote:

        Nekrasova Т. Р., Aksenova E. E.

        The peculiarities of the price formation policy for telecommunication companies // Information Security Problems. Computer Systems. 2002. № 4. DOI:
      • APPLIED CRYPTOGRAPHY

        Grigoriev V.R., Zyazin V. P., Kostsov E. G., Piskunov S. V.

        On the possibility of effective implementation of high-speed optoelectronic cryptomodules for the promising communication systems

        To quote:

        Grigoriev V.R., Zyazin V. P., Kostsov E. G., Piskunov S. V.

        On the possibility of effective implementation of high-speed optoelectronic cryptomodules for the promising communication systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Nazarov A. N., Sikorsky A. B., Derkach E. I.

        Algorithms of uncryptographics protection information to delivery of reporting in cellular wireless communication system in conditions of radioelectronic reluctance

        To quote:

        Nazarov A. N., Sikorsky A. B., Derkach E. I.

        Algorithms of uncryptographics protection information to delivery of reporting in cellular wireless communication system in conditions of radioelectronic reluctance // Information Security Problems. Computer Systems. 2002. № 4. DOI:

        Shtanko S. V., Ysko S. A.

        Features of information protection in information command and control system radiochannels with use of cryptographic protocols

        To quote:

        Shtanko S. V., Ysko S. A.

        Features of information protection in information command and control system radiochannels with use of cryptographic protocols // Information Security Problems. Computer Systems. 2002. № 4. DOI:
  • 2001 year
  • 2000 year
  • 1999 year