Baranov P. A.
To quote:
Baranov P. A.
An overview of difficulties concerning development of mandatory access system (according to the Bell – Lapadula model) for a computer systems resources // Information Security Problems. Computer Systems. 2005. № 1. Pp. 7-14. DOI:Pages:
7-14Baranov P. A.
To quote:
Baranov P. A.
Modern difficulties with the guaranteeing of information security of instant messaging // Information Security Problems. Computer Systems. 2005. № 1. Pp. 15-22. DOI:Pages:
15-22Bulygin Y.
To quote:
Bulygin Y.
Licensing: structure and protecting license data from forgery // Information Security Problems. Computer Systems. 2005. № 1. Pp. 23-28. DOI:Pages:
23-28Kosolapov F. A.
To quote:
Kosolapov F. A.
The analysis of general ways of evolution of the behavior blocking systems // Information Security Problems. Computer Systems. 2005. № 1. Pp. 29-38. DOI:Pages:
29-38Zegzhda P. D., Prosihin V. P.
To quote:
Zegzhda P. D., Prosihin V. P.
Securing of telecommunication management systems for power industry // Information Security Problems. Computer Systems. 2005. № 1. Pp. 39-48. DOI:Pages:
39-48Sorokin V. N.
To quote:
Sorokin V. N.
Language for description of TCP/IP protocols stack implementation as device for NIDS effectivity improving // Information Security Problems. Computer Systems. 2005. № 1. Pp. 49-53. DOI:Pages:
49-53Rostovtsev A. G., Shemyakina O. V.
To quote:
Rostovtsev A. G., Shemyakina O. V.
Protection of the Rijndael against side channel attacks using random isomorphisms // Information Security Problems. Computer Systems. 2005. № 1. Pp. 54-62. DOI:Pages:
54-62Kotenko I. V., Stepashkin M. V.
To quote:
Kotenko I. V., Stepashkin M. V.
Usage of dummy information systems // Information Security Problems. Computer Systems. 2005. № 1. Pp. 63-73. DOI:Pages:
63-73Fersman G. A., Ermolenko I. A., Morar V. V.
To quote:
Fersman G. A., Ermolenko I. A., Morar V. V.
Noise level estimation in two-channel cjrrelation measuring unstrument for protecting resources of computer networks // Information Security Problems. Computer Systems. 2005. № 1. Pp. 74-79. DOI:Pages:
74-79Vovk A. M., Zegzhda D. P.
To quote:
Vovk A. M., Zegzhda D. P.
Security model of hybrid operating system // Information Security Problems. Computer Systems. 2005. № 2. Pp. 7-14. DOI:Pages:
7-14Kabanov Artem S.
To quote:
Kabanov Artem S.
Technique of construction of models of protective systems on electronic keys on the basis of subject – object model with using of automata theory and matrix of access // Information Security Problems. Computer Systems. 2005. № 2. Pp. 15-19. DOI:Pages:
15-19Kabanov Artem S.
To quote:
Kabanov Artem S.
Technique of an estimation of efficiency of protective systems on electronic keys on the basis of expert estimation // Information Security Problems. Computer Systems. 2005. № 2. Pp. 20-26. DOI:Pages:
20-26Monin A. S.
To quote:
Monin A. S.
The analysis of existing technologies of management of information risks // Information Security Problems. Computer Systems. 2005. № 2. Pp. 27-30. DOI:Pages:
27-30Dudorov E. N.
To quote:
Dudorov E. N.
Possible approaches to revealing suspicious activity of the software // Information Security Problems. Computer Systems. 2005. № 2. Pp. 31-37. DOI:Pages:
31-37Kochetkov V.M.
To quote:
Kochetkov V.M.
Digital rights management systems information security // Information Security Problems. Computer Systems. 2005. № 2. Pp. 38-43. DOI:Pages:
38-43Prokopyev S. E.
To quote:
Prokopyev S. E.
Adaptation of Canetti security model for its using as the base of cryptographic services subsystem design // Information Security Problems. Computer Systems. 2005. № 2. Pp. 44-58. DOI:Pages:
44-58Shadrin O. S.
To quote:
Shadrin O. S.
Computing discrete logarithms using number field sieve // Information Security Problems. Computer Systems. 2005. № 2. Pp. 59-64. DOI:Pages:
59-64Levchuk S. A., Makarov S. B., Mesheryakov A. V., Prisyazhnyuk I. V.
To quote:
Levchuk S. A., Makarov S. B., Mesheryakov A. V., Prisyazhnyuk I. V.
Noise immunity of MSK signals reception in the local alarm radiotechnical systems under influence of M-Nakagami fading // Information Security Problems. Computer Systems. 2005. № 2. Pp. 65-73. DOI:Pages:
65-73