Malyishev N. U., Moshnikov S.
To quote:
Malyishev N. U., Moshnikov S.
Application of extreme programming in information security // Information Security Problems. Computer Systems. 2004. № 1. Pp. 7-13. DOI:Pages:
7-13Bochkov M. V., Saenko I. B.
To quote:
Bochkov M. V., Saenko I. B.
Semi-Markov model of adaptive protection information from unauthorized access // Information Security Problems. Computer Systems. 2004. № 1. Pp. 14-20. DOI:Pages:
14-20Kornienko А. А., Sljusurenko I. M.
To quote:
Kornienko А. А., Sljusurenko I. M.
Systems and methods of intrusion detection: current state and future trends // Information Security Problems. Computer Systems. 2004. № 1. Pp. 21-34. DOI:Pages:
21-34Ovchinnikova E. V.
To quote:
Ovchinnikova E. V.
Development of interactive adaptive protection system // Information Security Problems. Computer Systems. 2004. № 1. Pp. 35-39. DOI:Pages:
35-39Baranov D. V.
To quote:
Baranov D. V.
The information security via risk management // Information Security Problems. Computer Systems. 2004. № 1. Pp. 40-43. DOI:Pages:
40-43Baranov P. A.
To quote:
Baranov P. A.
Review of program tools used for fighting spam and E-mail viruses // Information Security Problems. Computer Systems. 2004. № 1. Pp. 44-51. DOI:Pages:
44-51Kepke K. M., Zegzhda D. P.
To quote:
Kepke K. M., Zegzhda D. P.
An approach to protection from distributed denial of service attacks // Information Security Problems. Computer Systems. 2004. № 1. Pp. 52-56. DOI:Pages:
52-56Garusev M. L.
To quote:
Garusev M. L.
The use of event correlation for the developing the user profile of protected information system // Information Security Problems. Computer Systems. 2004. № 1. Pp. 57-64. DOI:Pages:
57-64Rostovtsev A. G.
To quote:
Rostovtsev A. G.
Technology-cryptographic protection of the digital signature key // Information Security Problems. Computer Systems. 2004. № 1. Pp. 65-71. DOI:Pages:
65-71Erosh I., Skuratov V.
To quote:
Erosh I., Skuratov V.
Addressed message transferring with usage of matrices over GF(2) field // Information Security Problems. Computer Systems. 2004. № 1. Pp. 72-78. DOI:Pages:
72-78To quote:
Submission for the prize of Russian Government // Information Security Problems. Computer Systems. 2004. № 1. Pp. 79-80. DOI:Pages:
79-80Borodakiy U. V., Dobrodeev A. U., Bedarev I. K., Paltchun B. P.
To quote:
Borodakiy U. V., Dobrodeev A. U., Bedarev I. K., Paltchun B. P.
On the optimum system configuration of technical regulations for crucial information objects // Information Security Problems. Computer Systems. 2004. № 2. Pp. 7-12. DOI:Pages:
7-12Sundeev P. V.
To quote:
Sundeev P. V.
Methodology of the analysis of information safety critical control systems // Information Security Problems. Computer Systems. 2004. № 2. Pp. 13-22. DOI:Pages:
13-22Leonid Bushuev
To quote:
Leonid Bushuev
Static and dynamic database model // Information Security Problems. Computer Systems. 2004. № 2. Pp. 23-27. DOI:Pages:
23-27Trifalenkov I. A.
To quote:
Trifalenkov I. A.
External communications security solutions: risk analysis approach // Information Security Problems. Computer Systems. 2004. № 2. Pp. 28-34. DOI:Pages:
28-34Dotsenko S., Zaitchikov A., Klaykhin V., Malish V.
To quote:
Dotsenko S., Zaitchikov A., Klaykhin V., Malish V.
Application of th structural analysis ii the information protection system development // Information Security Problems. Computer Systems. 2004. № 2. Pp. 35-44. DOI:Pages:
35-44Zegzhda P. D., Prosihin V. P., Dmitriev I. L.
To quote:
Zegzhda P. D., Prosihin V. P., Dmitriev I. L.
Security aspects of discreet information transactions transport network control // Information Security Problems. Computer Systems. 2004. № 2. Pp. 45-53. DOI:Pages:
45-53Sorokin V. N.
To quote:
Sorokin V. N.
Detecting beetles in remote host’s networking code // Information Security Problems. Computer Systems. 2004. № 2. Pp. 54-56. DOI:Pages:
54-56Rostovtsev A. G., Makhovenko E. B.
To quote:
Rostovtsev A. G., Makhovenko E. B.
Two approaches to computing elliptic curve discrete logarithms // Information Security Problems. Computer Systems. 2004. № 2. Pp. 57-63. DOI:Pages:
57-63Rostovtsev A. G., Malyshev N. Ju.
To quote:
Rostovtsev A. G., Malyshev N. Ju.
On the strength of Rijndael cipher with trivial key schedule // Information Security Problems. Computer Systems. 2004. № 2. Pp. 64-71. DOI:Pages:
64-71Prokopev S. E.
To quote:
Prokopev S. E.
The design of cryptographic services subsystem, optimizing development, verification and modification of cryptographic applications // Information Security Problems. Computer Systems. 2004. № 2. Pp. 72-88. DOI:Pages:
72-88Nurmieva M.
To quote:
Nurmieva M.
On effective buffer management schemes for ATM switches // Information Security Problems. Computer Systems. 2004. № 2. Pp. 89-97. DOI:Pages:
89-97Kotenko A. G.
To quote:
Kotenko A. G.
The constructing of it security evaluation model complex // Information Security Problems. Computer Systems. 2004. № 3. Pp. 7-14. DOI:Pages:
7-14Frolov D. B.
To quote:
Frolov D. B.
Internet-site and its legacy status. Part 1 // Information Security Problems. Computer Systems. 2004. № 3. Pp. 15-20. DOI:Pages:
15-20Bochkov M. V.
To quote:
Bochkov M. V.
The statistical states identification method of computer network in conditions of a programme attacks // Information Security Problems. Computer Systems. 2004. № 3. Pp. 21-27. DOI:Pages:
21-27Bochkov M., Emelaynov A., Klaykhin V., Malish V. N.
To quote:
Bochkov M., Emelaynov A., Klaykhin V., Malish V. N.
Algorithm of adaptive protection from unauthorized access to information in corporative computer network // Information Security Problems. Computer Systems. 2004. № 3. Pp. 28-32. DOI:Pages:
28-32Dymarsky Y., Nurmieva M.
To quote:
Dymarsky Y., Nurmieva M.
Approach to bandwidth allocation in multiservive network // Information Security Problems. Computer Systems. 2004. № 3. Pp. 33-37. DOI:Pages:
33-37Makarov S. B., Prisyazhnyuk I. V.
To quote:
Makarov S. B., Prisyazhnyuk I. V.
Interference immunity of the MSK coherent demodulation in the private security radiosystems // Information Security Problems. Computer Systems. 2004. № 3. Pp. 38-43. DOI:Pages:
38-43Rostovtsev A. G.
To quote:
Rostovtsev A. G.
Complex multiplication by isogeny of degree 3 // Information Security Problems. Computer Systems. 2004. № 3. Pp. 44-50. DOI:Pages:
44-50Serov R. E.
To quote:
Serov R. E.
А new combined sign-encryption scheme with threshold decryption // Information Security Problems. Computer Systems. 2004. № 3. Pp. 51-54. DOI:Pages:
51-54Son M. V.
To quote:
Son M. V.
The decoding of RS-codes for the wire-tap channels // Information Security Problems. Computer Systems. 2004. № 3. Pp. 55-60. DOI:Pages:
55-60Ustinov A. A.
To quote:
Ustinov A. A.
Stochastic coding of messages of a redundant discrete source and its influence on the resistance of cryptographic systems of information protection // Information Security Problems. Computer Systems. 2004. № 3. Pp. 61-71. DOI:Pages:
61-71Yakovlev V., Korzhik V., Bakaev M.
To quote:
Yakovlev V., Korzhik V., Bakaev M.
Key distribution protocols based on the of public noisy channels with the presence of active adversary // Information Security Problems. Computer Systems. 2004. № 3. Pp. 72-84. DOI:Pages:
72-84Avramenko V., Bochkov M., Мatveev V.
To quote:
Avramenko V., Bochkov M., Мatveev V.
The method of the file contents safety control the summary // Information Security Problems. Computer Systems. 2004. № 4. Pp. 7-14. DOI:Pages:
7-14Makarov S. B, Markov A. M.
To quote:
Makarov S. B, Markov A. M.
Frequency and energy efficacy FM signals with MSK, which uses in telecommunication systems with bounded bandwidth // Information Security Problems. Computer Systems. 2004. № 4. Pp. 15-23. DOI:Pages:
15-23Erosh I.
To quote:
Erosh I.
Some analogies between problems of modular arithmetic and matrix encoding // Information Security Problems. Computer Systems. 2004. № 4. Pp. 24-31. DOI:Pages:
24-31Rostovtsev A. G. and Makhovenko E. B.
To quote:
Rostovtsev A. G. and Makhovenko E. B.
Hilbert polynomials and elliptic curve j-invariants // Information Security Problems. Computer Systems. 2004. № 4. Pp. 32-38. DOI:Pages:
32-38Ustinov A. A.
To quote:
Ustinov A. A.
Joint stochastic coding of the messages of several redundant sources based on cryptographical transformations // Information Security Problems. Computer Systems. 2004. № 4. Pp. 39-49. DOI:Pages:
39-49Ustinov A. A.
To quote:
Ustinov A. A.
An algorithm for stochastic coding of still images on the base of random sequences and analysis of its cryptographic properties // Information Security Problems. Computer Systems. 2004. № 4. Pp. 50-59. DOI:Pages:
50-59Yakovlev V., Korzhik V., Bakaev M.
To quote:
Yakovlev V., Korzhik V., Bakaev M.
Key distribution protocols based on the of public noisy channels with the presence of active adversary // Information Security Problems. Computer Systems. 2004. № 4. Pp. 60-75. DOI:Pages:
60-75Frolov D. B., Starostin A. V.
To quote:
Frolov D. B., Starostin A. V.
Internet site and its legacy status. Part 2 // Information Security Problems. Computer Systems. 2004. № 4. Pp. 76-79. DOI:Pages:
76-79Zabolotskii V. P., Stepanov A. G., Usupov R. M.
To quote:
Zabolotskii V. P., Stepanov A. G., Usupov R. M.
Issues of the information protection as the part of the general it training for the school and university students // Information Security Problems. Computer Systems. 2004. № 4. Pp. 80-87. DOI:Pages:
80-87