Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
    • № 1 2005
      • INFORMATION SECURITY APPLICATION

        Baranov P. A.

        An overview of difficulties concerning development of mandatory access system (according to the Bell – Lapadula model) for a computer systems resources

        To quote:

        Baranov P. A.

        An overview of difficulties concerning development of mandatory access system (according to the Bell – Lapadula model) for a computer systems resources // Information Security Problems. Computer Systems. 2005. № 1. Pp. 7-14. DOI:

        Pages:

        7-14

        Baranov P. A.

        Modern difficulties with the guaranteeing of information security of instant messaging

        To quote:

        Baranov P. A.

        Modern difficulties with the guaranteeing of information security of instant messaging // Information Security Problems. Computer Systems. 2005. № 1. Pp. 15-22. DOI:

        Pages:

        15-22

        Bulygin Y.

        Licensing: structure and protecting license data from forgery

        To quote:

        Bulygin Y.

        Licensing: structure and protecting license data from forgery // Information Security Problems. Computer Systems. 2005. № 1. Pp. 23-28. DOI:

        Pages:

        23-28

        Kosolapov F. A.

        The analysis of general ways of evolution of the behavior blocking systems

        To quote:

        Kosolapov F. A.

        The analysis of general ways of evolution of the behavior blocking systems // Information Security Problems. Computer Systems. 2005. № 1. Pp. 29-38. DOI:

        Pages:

        29-38
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda P. D., Prosihin V. P.

        Securing of telecommunication management systems for power industry

        To quote:

        Zegzhda P. D., Prosihin V. P.

        Securing of telecommunication management systems for power industry // Information Security Problems. Computer Systems. 2005. № 1. Pp. 39-48. DOI:

        Pages:

        39-48

        Sorokin V. N.

        Language for description of TCP/IP protocols stack implementation as device for NIDS effectivity improving

        To quote:

        Sorokin V. N.

        Language for description of TCP/IP protocols stack implementation as device for NIDS effectivity improving // Information Security Problems. Computer Systems. 2005. № 1. Pp. 49-53. DOI:

        Pages:

        49-53
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G., Shemyakina O. V.

        Protection of the Rijndael against side channel attacks using random isomorphisms

        To quote:

        Rostovtsev A. G., Shemyakina O. V.

        Protection of the Rijndael against side channel attacks using random isomorphisms // Information Security Problems. Computer Systems. 2005. № 1. Pp. 54-62. DOI:

        Pages:

        54-62
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Kotenko I. V., Stepashkin M. V.

        Usage of dummy information systems

        To quote:

        Kotenko I. V., Stepashkin M. V.

        Usage of dummy information systems // Information Security Problems. Computer Systems. 2005. № 1. Pp. 63-73. DOI:

        Pages:

        63-73
      • TECHNICAL SOLUTION

        Fersman G. A., Ermolenko I. A., Morar V. V.

        Noise level estimation in two-channel cjrrelation measuring unstrument for protecting resources of computer networks

        To quote:

        Fersman G. A., Ermolenko I. A., Morar V. V.

        Noise level estimation in two-channel cjrrelation measuring unstrument for protecting resources of computer networks // Information Security Problems. Computer Systems. 2005. № 1. Pp. 74-79. DOI:

        Pages:

        74-79
    • № 2 2005
      • INFORMATION SECURITY ASPECTS

        Vovk A. M., Zegzhda D. P.

        Security model of hybrid operating system

        To quote:

        Vovk A. M., Zegzhda D. P.

        Security model of hybrid operating system // Information Security Problems. Computer Systems. 2005. № 2. Pp. 7-14. DOI:

        Pages:

        7-14

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys on the basis of subject – object model with using of automata theory and matrix of access

        To quote:

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys on the basis of subject – object model with using of automata theory and matrix of access // Information Security Problems. Computer Systems. 2005. № 2. Pp. 15-19. DOI:

        Pages:

        15-19

        Kabanov Artem S.

        Technique of an estimation of efficiency of protective systems on electronic keys on the basis of expert estimation

        To quote:

        Kabanov Artem S.

        Technique of an estimation of efficiency of protective systems on electronic keys on the basis of expert estimation // Information Security Problems. Computer Systems. 2005. № 2. Pp. 20-26. DOI:

        Pages:

        20-26

        Monin A. S.

        The analysis of existing technologies of management of information risks

        To quote:

        Monin A. S.

        The analysis of existing technologies of management of information risks // Information Security Problems. Computer Systems. 2005. № 2. Pp. 27-30. DOI:

        Pages:

        27-30
      • INFORMATION SECURITY APPLICATION

        Dudorov E. N.

        Possible approaches to revealing suspicious activity of the software

        To quote:

        Dudorov E. N.

        Possible approaches to revealing suspicious activity of the software // Information Security Problems. Computer Systems. 2005. № 2. Pp. 31-37. DOI:

        Pages:

        31-37
      • NETWORK AND TELECOMMUNICATION SECURITY

        Kochetkov V.M.

        Digital rights management systems information security

        To quote:

        Kochetkov V.M.

        Digital rights management systems information security // Information Security Problems. Computer Systems. 2005. № 2. Pp. 38-43. DOI:

        Pages:

        38-43
      • APPLIED CRYPTOGRAPHY

        Prokopyev S. E.

        Adaptation of Canetti security model for its using as the base of cryptographic services subsystem design

        To quote:

        Prokopyev S. E.

        Adaptation of Canetti security model for its using as the base of cryptographic services subsystem design // Information Security Problems. Computer Systems. 2005. № 2. Pp. 44-58. DOI:

        Pages:

        44-58

        Shadrin O. S.

        Computing discrete logarithms using number field sieve

        To quote:

        Shadrin O. S.

        Computing discrete logarithms using number field sieve // Information Security Problems. Computer Systems. 2005. № 2. Pp. 59-64. DOI:

        Pages:

        59-64
      • TECHNICAL SOLUTION

        Levchuk S. A., Makarov S. B., Mesheryakov A. V., Prisyazhnyuk I. V.

        Noise immunity of MSK signals reception in the local alarm radiotechnical systems under influence of M-Nakagami fading

        To quote:

        Levchuk S. A., Makarov S. B., Mesheryakov A. V., Prisyazhnyuk I. V.

        Noise immunity of MSK signals reception in the local alarm radiotechnical systems under influence of M-Nakagami fading // Information Security Problems. Computer Systems. 2005. № 2. Pp. 65-73. DOI:

        Pages:

        65-73
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year