Issues

IssueYearTitleAuthorsDownloads
12009Analysis of network safety with Markov 's chainsKirko I.N., Kuhnir V.P.306
72014On some open questions about apn functionsVitkup V.A.306
72014Security conditions for information flows by memory within the mrosl DP-modelDevyanin P. N.306
72014Unreliability of circuits in the basis by Rosser - TurkettAlekhina M.A., Barsukova O. U.306
12009Argument of knowledge of a Goppa codeword and of a bounded errorFedyukovych V. E.305
32010Teaching the protected computer nets design at the Cisco platformKolegov D. N.305
32010Cryptanalysis with graphical processing units (GPU )Semenov A. A., Bulavintsev V. G, Bespalov D. V.305
62013Modification of compiled applications for the android platform by means of aspect-oriented programmingStefantsov D. A., Potapkin A.I, Zaytsev G. Yu305
62013On local primitiveness of graphs and nonnega-tive matricesKyazhin S. N.305
42011The security model for cross-platform web services of municipal procurement supportIsaev S. V., Kononov D.D303
42011Minimal extensions for cycles with vertices of two typesBondarenko P.P., Abrosimov M.B.303
72014Some properties of q-ary bent functionsShishkin V. A.303
72014Boolean functions generated by the most significant bits of linear recurrent sequencesBylkov D.N.303
72014The universal vulnerability exploitation platform for CTFSviridov P. Y., Ivachev A. S., Zaytsev G. Y.303
72014About basises with unreliability coefficient 5Vasin A. V.303
72014Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equationsGotsulenko V. V.303
12009The method for secure video streaming over distributed networksShcherba E. V.302
62013Development of a DDoS-attack detection system using queuing theoryVolkov D.A., Shcherba E. V.302
62013Pipelining of combinational circuitsKardash S.N., Pottosin Yu.V.302
12009Correct evaluation of alternatives weight coefficients in the method of analytical hierarchiesKolesnikova S. I.301
32010Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systemsYankovskaya A.E., Gedike A. I.301
52012Cryptographic properties of block ciphers based on shift registersFomichev V. M., Koreneva A.M.301
62013Parallelization of the decoding algorithm in video compression standard H.265/HEVCChernyak R. I.301
72014Sufficient conditions for local primitiveness of nonprimitive digraphsKyazhin S. N.301
12009Discrete logarithm problem in subgroups of prime orderPankratova I. A.300
52012Estimates for the number of boolean functions having affine or quadratic approximations with a given accuracySerov A. A., Zubkov A.M.300
52012Problems of almost threshold secret sharing schemesMedvedev N. V., Titov S. S.300
52012A parallel algorithm for searching the minimum weight spanning tree on prefractal graphSennikova L. I., Kochkarov A. A.300
72014The recognition of recurrent sequences generated by conservative functionsSergeeva O. E.300
82015Implementation of DNS rebindingMilovanov T. I.300
72014Reachability problem for continuous piece-wise-affine mappings of a circle having degree 2Kurganskyy O. M.299
72014Covert timing channel over HTTP cache-control headersBroslavsky O.V., Kolegov D.N., Oleksov N. E.299
12009Solving parallel equations over w-regular languagesBushkov V. G, Yevtushenko N. V.297
22009Review lection of security models of computer systemDevyanin P. N.297
32010High-speed pseudorandom sequence generators based on cellular automataSukhinin B.M.297
52012Statistical independence of the boolean function superposition. IIPankratova I. A., Kolcheva O.L.296
62013On non-minimal perfect ciphersTitov S. S., Medvedeva N. V.296
62013Algorithm for searching prohibitions of boolean functionsRyabokon D. V.296
72014An upper bound for the number of bent functions at the distance 2 from an arbitrary bent function in 2k variablesKolomeec N. A.296
72014On attractors in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.296
92016On the full diversity of balls for graphsEvdokimov A. A., Fedoryaeva T.I., Kutcenogaya E.P.296
12009Approaches to security of computer systems with functionally or parametrically associated entitiesKolegov D.N.295
42011FPGA implementation of finite automata public key cryptosystemTrenkaev V.N., Kovalev D.S.295
52012Decomposition and approximation of underdetermined dataSholomov L. A.295
32010On the frame of an automatonSalii V. N.294
42011Application of SAT-approach for solving combinatorial problemsOtpuschennikov I.V., Semenov A. A., Kochemazov S.E.294
42011On the uniqueness of exact vertex extensionsDolgov A. A., Abrosimov M.B.294
52012Latin squares and their applications in cryptographyTuzhilin M.E.294
52012Mathematical model of random generator based on ternary logicStolov E. L.294
12009Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access controlSmith I. V.293
Страница 3 из 16 123456...16
Всего: 763