Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
    • № 1 2004
      • INFORMATION SECURITY ASPECTS

        Malyishev N. U., Moshnikov S.

        Application of extreme programming in information security

        To quote:

        Malyishev N. U., Moshnikov S.

        Application of extreme programming in information security // Information Security Problems. Computer Systems. 2004. № 1. Pp. 7-13. DOI:

        Pages:

        7-13

        Bochkov M. V., Saenko I. B.

        Semi-Markov model of adaptive protection information from unauthorized access

        To quote:

        Bochkov M. V., Saenko I. B.

        Semi-Markov model of adaptive protection information from unauthorized access // Information Security Problems. Computer Systems. 2004. № 1. Pp. 14-20. DOI:

        Pages:

        14-20
      • INFORMATION SECURITY APPLICATION

        Kornienko А. А., Sljusurenko I. M.

        Systems and methods of intrusion detection: current state and future trends

        To quote:

        Kornienko А. А., Sljusurenko I. M.

        Systems and methods of intrusion detection: current state and future trends // Information Security Problems. Computer Systems. 2004. № 1. Pp. 21-34. DOI:

        Pages:

        21-34

        Ovchinnikova E. V.

        Development of interactive adaptive protection system

        To quote:

        Ovchinnikova E. V.

        Development of interactive adaptive protection system // Information Security Problems. Computer Systems. 2004. № 1. Pp. 35-39. DOI:

        Pages:

        35-39

        Baranov D. V.

        The information security via risk management

        To quote:

        Baranov D. V.

        The information security via risk management // Information Security Problems. Computer Systems. 2004. № 1. Pp. 40-43. DOI:

        Pages:

        40-43

        Baranov P. A.

        Review of program tools used for fighting spam and E-mail viruses

        To quote:

        Baranov P. A.

        Review of program tools used for fighting spam and E-mail viruses // Information Security Problems. Computer Systems. 2004. № 1. Pp. 44-51. DOI:

        Pages:

        44-51
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Kepke K. M., Zegzhda D. P.

        An approach to protection from distributed denial of service attacks

        To quote:

        Kepke K. M., Zegzhda D. P.

        An approach to protection from distributed denial of service attacks // Information Security Problems. Computer Systems. 2004. № 1. Pp. 52-56. DOI:

        Pages:

        52-56

        Garusev M. L.

        The use of event correlation for the developing the user profile of protected information system

        To quote:

        Garusev M. L.

        The use of event correlation for the developing the user profile of protected information system // Information Security Problems. Computer Systems. 2004. № 1. Pp. 57-64. DOI:

        Pages:

        57-64
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Technology-cryptographic protection of the digital signature key

        To quote:

        Rostovtsev A. G.

        Technology-cryptographic protection of the digital signature key // Information Security Problems. Computer Systems. 2004. № 1. Pp. 65-71. DOI:

        Pages:

        65-71

        Erosh I., Skuratov V.

        Addressed message transferring with usage of matrices over GF(2) field

        To quote:

        Erosh I., Skuratov V.

        Addressed message transferring with usage of matrices over GF(2) field // Information Security Problems. Computer Systems. 2004. № 1. Pp. 72-78. DOI:

        Pages:

        72-78
      • EDUCATION PROBLEMS
        Submission for the prize of Russian Government

        To quote:

        Submission for the prize of Russian Government // Information Security Problems. Computer Systems. 2004. № 1. Pp. 79-80. DOI:

        Pages:

        79-80
    • № 2 2004
      • INFORMATION SECURITY ASPECTS

        Borodakiy U. V., Dobrodeev A. U., Bedarev I. K., Paltchun B. P.

        On the optimum system configuration of technical regulations for crucial information objects

        To quote:

        Borodakiy U. V., Dobrodeev A. U., Bedarev I. K., Paltchun B. P.

        On the optimum system configuration of technical regulations for crucial information objects // Information Security Problems. Computer Systems. 2004. № 2. Pp. 7-12. DOI:

        Pages:

        7-12

        Sundeev P. V.

        Methodology of the analysis of information safety critical control systems

        To quote:

        Sundeev P. V.

        Methodology of the analysis of information safety critical control systems // Information Security Problems. Computer Systems. 2004. № 2. Pp. 13-22. DOI:

        Pages:

        13-22
      • INFORMATION SECURITY APPLICATION

        Leonid Bushuev

        Static and dynamic database model

        To quote:

        Leonid Bushuev

        Static and dynamic database model // Information Security Problems. Computer Systems. 2004. № 2. Pp. 23-27. DOI:

        Pages:

        23-27

        Trifalenkov I. A.

        External communications security solutions: risk analysis approach

        To quote:

        Trifalenkov I. A.

        External communications security solutions: risk analysis approach // Information Security Problems. Computer Systems. 2004. № 2. Pp. 28-34. DOI:

        Pages:

        28-34

        Dotsenko S., Zaitchikov A., Klaykhin V., Malish V.

        Application of th structural analysis ii the information protection system development

        To quote:

        Dotsenko S., Zaitchikov A., Klaykhin V., Malish V.

        Application of th structural analysis ii the information protection system development // Information Security Problems. Computer Systems. 2004. № 2. Pp. 35-44. DOI:

        Pages:

        35-44
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda P. D., Prosihin V. P., Dmitriev I. L.

        Security aspects of discreet information transactions transport network control

        To quote:

        Zegzhda P. D., Prosihin V. P., Dmitriev I. L.

        Security aspects of discreet information transactions transport network control // Information Security Problems. Computer Systems. 2004. № 2. Pp. 45-53. DOI:

        Pages:

        45-53

        Sorokin V. N.

        Detecting beetles in remote host’s networking code

        To quote:

        Sorokin V. N.

        Detecting beetles in remote host’s networking code // Information Security Problems. Computer Systems. 2004. № 2. Pp. 54-56. DOI:

        Pages:

        54-56
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G., Makhovenko E. B.

        Two approaches to computing elliptic curve discrete logarithms

        To quote:

        Rostovtsev A. G., Makhovenko E. B.

        Two approaches to computing elliptic curve discrete logarithms // Information Security Problems. Computer Systems. 2004. № 2. Pp. 57-63. DOI:

        Pages:

        57-63

        Rostovtsev A. G., Malyshev N. Ju.

        On the strength of Rijndael cipher with trivial key schedule

        To quote:

        Rostovtsev A. G., Malyshev N. Ju.

        On the strength of Rijndael cipher with trivial key schedule // Information Security Problems. Computer Systems. 2004. № 2. Pp. 64-71. DOI:

        Pages:

        64-71

        Prokopev S. E.

        The design of cryptographic services subsystem, optimizing development, verification and modification of cryptographic applications

        To quote:

        Prokopev S. E.

        The design of cryptographic services subsystem, optimizing development, verification and modification of cryptographic applications // Information Security Problems. Computer Systems. 2004. № 2. Pp. 72-88. DOI:

        Pages:

        72-88
      • TECHNICAL SOLUTION

        Nurmieva M.

        On effective buffer management schemes for ATM switches

        To quote:

        Nurmieva M.

        On effective buffer management schemes for ATM switches // Information Security Problems. Computer Systems. 2004. № 2. Pp. 89-97. DOI:

        Pages:

        89-97
    • № 3 2004
      • INFORMATION SECURITY ASPECTS

        Kotenko A. G.

        The constructing of it security evaluation model complex

        To quote:

        Kotenko A. G.

        The constructing of it security evaluation model complex // Information Security Problems. Computer Systems. 2004. № 3. Pp. 7-14. DOI:

        Pages:

        7-14
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Frolov D. B.

        Internet-site and its legacy status. Part 1

        To quote:

        Frolov D. B.

        Internet-site and its legacy status. Part 1 // Information Security Problems. Computer Systems. 2004. № 3. Pp. 15-20. DOI:

        Pages:

        15-20
      • INFORMATION SECURITY APPLICATION

        Bochkov M. V.

        The statistical states identification method of computer network in conditions of a programme attacks

        To quote:

        Bochkov M. V.

        The statistical states identification method of computer network in conditions of a programme attacks // Information Security Problems. Computer Systems. 2004. № 3. Pp. 21-27. DOI:

        Pages:

        21-27

        Bochkov M., Emelaynov A., Klaykhin V., Malish V. N.

        Algorithm of adaptive protection from unauthorized access to information in corporative computer network

        To quote:

        Bochkov M., Emelaynov A., Klaykhin V., Malish V. N.

        Algorithm of adaptive protection from unauthorized access to information in corporative computer network // Information Security Problems. Computer Systems. 2004. № 3. Pp. 28-32. DOI:

        Pages:

        28-32
      • TECHNICAL SOLUTION

        Dymarsky Y., Nurmieva M.

        Approach to bandwidth allocation in multiservive network

        To quote:

        Dymarsky Y., Nurmieva M.

        Approach to bandwidth allocation in multiservive network // Information Security Problems. Computer Systems. 2004. № 3. Pp. 33-37. DOI:

        Pages:

        33-37

        Makarov S. B., Prisyazhnyuk I. V.

        Interference immunity of the MSK coherent demodulation in the private security radiosystems

        To quote:

        Makarov S. B., Prisyazhnyuk I. V.

        Interference immunity of the MSK coherent demodulation in the private security radiosystems // Information Security Problems. Computer Systems. 2004. № 3. Pp. 38-43. DOI:

        Pages:

        38-43
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G.

        Complex multiplication by isogeny of degree 3

        To quote:

        Rostovtsev A. G.

        Complex multiplication by isogeny of degree 3 // Information Security Problems. Computer Systems. 2004. № 3. Pp. 44-50. DOI:

        Pages:

        44-50

        Serov R. E.

        А new combined sign-encryption scheme with threshold decryption

        To quote:

        Serov R. E.

        А new combined sign-encryption scheme with threshold decryption // Information Security Problems. Computer Systems. 2004. № 3. Pp. 51-54. DOI:

        Pages:

        51-54

        Son  M. V.

        The decoding of RS-codes for the wire-tap channels

        To quote:

        Son  M. V.

        The decoding of RS-codes for the wire-tap channels // Information Security Problems. Computer Systems. 2004. № 3. Pp. 55-60. DOI:

        Pages:

        55-60

        Ustinov A. A.

        Stochastic coding of messages of a redundant discrete source and its influence on the resistance of cryptographic systems of information protection

        To quote:

        Ustinov A. A.

        Stochastic coding of messages of a redundant discrete source and its influence on the resistance of cryptographic systems of information protection // Information Security Problems. Computer Systems. 2004. № 3. Pp. 61-71. DOI:

        Pages:

        61-71

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary

        To quote:

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary // Information Security Problems. Computer Systems. 2004. № 3. Pp. 72-84. DOI:

        Pages:

        72-84
    • № 4 2004
      • INFORMATION SECURITY APPLICATION

        Avramenko V., Bochkov M., Мatveev V.

        The method of the file contents safety control the summary

        To quote:

        Avramenko V., Bochkov M., Мatveev V.

        The method of the file contents safety control the summary // Information Security Problems. Computer Systems. 2004. № 4. Pp. 7-14. DOI:

        Pages:

        7-14
      • TECHNICAL SOLUTION

        Makarov S. B, Markov A. M.

        Frequency and energy efficacy FM signals with MSK, which uses in telecommunication systems with bounded bandwidth

        To quote:

        Makarov S. B, Markov A. M.

        Frequency and energy efficacy FM signals with MSK, which uses in telecommunication systems with bounded bandwidth // Information Security Problems. Computer Systems. 2004. № 4. Pp. 15-23. DOI:

        Pages:

        15-23
      • APPLIED CRYPTOGRAPHY

        Erosh I.

        Some analogies between problems of modular arithmetic and matrix encoding

        To quote:

        Erosh I.

        Some analogies between problems of modular arithmetic and matrix encoding // Information Security Problems. Computer Systems. 2004. № 4. Pp. 24-31. DOI:

        Pages:

        24-31

        Rostovtsev A. G. and Makhovenko E. B.

        Hilbert polynomials and elliptic curve j-invariants

        To quote:

        Rostovtsev A. G. and Makhovenko E. B.

        Hilbert polynomials and elliptic curve j-invariants // Information Security Problems. Computer Systems. 2004. № 4. Pp. 32-38. DOI:

        Pages:

        32-38

        Ustinov A. A.

        Joint stochastic coding of the messages of several redundant sources based on cryptographical transformations

        To quote:

        Ustinov A. A.

        Joint stochastic coding of the messages of several redundant sources based on cryptographical transformations // Information Security Problems. Computer Systems. 2004. № 4. Pp. 39-49. DOI:

        Pages:

        39-49

        Ustinov A. A.

        An algorithm for stochastic coding of still images on the base of random sequences and analysis of its cryptographic properties

        To quote:

        Ustinov A. A.

        An algorithm for stochastic coding of still images on the base of random sequences and analysis of its cryptographic properties // Information Security Problems. Computer Systems. 2004. № 4. Pp. 50-59. DOI:

        Pages:

        50-59

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary

        To quote:

        Yakovlev V., Korzhik V., Bakaev M.

        Key distribution protocols based on the of public noisy channels with the presence of active adversary // Information Security Problems. Computer Systems. 2004. № 4. Pp. 60-75. DOI:

        Pages:

        60-75
      • ASPECTS OF INFORMATION SECURITY

        Frolov D. B., Starostin A. V.

        Internet site and its legacy status. Part 2

        To quote:

        Frolov D. B., Starostin A. V.

        Internet site and its legacy status. Part 2 // Information Security Problems. Computer Systems. 2004. № 4. Pp. 76-79. DOI:

        Pages:

        76-79
      • EDUCATION PROBLEMS

        Zabolotskii V. P., Stepanov A. G., Usupov R. M.

        Issues of the information protection as the part of the general it training for the school and university students

        To quote:

        Zabolotskii V. P., Stepanov A. G., Usupov R. M.

        Issues of the information protection as the part of the general it training for the school and university students // Information Security Problems. Computer Systems. 2004. № 4. Pp. 80-87. DOI:

        Pages:

        80-87
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year