Issues

IssueYearTitleAuthorsDownloads
72014Security conditions for information flows by memory within the mrosl DP-modelDevyanin P. N.310
72014Method to provide safety for customer of application's storeTolyupa E. A.310
12009Analysis of network safety with Markov 's chainsKuhnir V.P., Kirko I.N.309
62013On local primitiveness of graphs and nonnega-tive matricesKyazhin S. N.309
12009Argument of knowledge of a Goppa codeword and of a bounded errorFedyukovych V. E.308
32010Teaching the protected computer nets design at the Cisco platformKolegov D. N.308
62013Modification of compiled applications for the android platform by means of aspect-oriented programmingPotapkin A.I, Zaytsev G. Yu, Stefantsov D. A.308
72014Covert timing channel over HTTP cache-control headersKolegov D.N., Oleksov N. E., Broslavsky O.V.308
72014Unreliability of circuits in the basis by Rosser - TurkettBarsukova O. U., Alekhina M.A.308
32010Cryptanalysis with graphical processing units (GPU )Bulavintsev V. G, Bespalov D. V., Semenov A. A.307
42011The security model for cross-platform web services of municipal procurement supportKononov D.D, Isaev S. V.306
42011Minimal extensions for cycles with vertices of two typesAbrosimov M.B., Bondarenko P.P.306
72014Some properties of q-ary bent functionsShishkin V. A.306
72014Boolean functions generated by the most significant bits of linear recurrent sequencesBylkov D.N.306
72014About basises with unreliability coefficient 5Vasin A. V.306
72014Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equationsGotsulenko V. V.306
12009The method for secure video streaming over distributed networksShcherba E. V.305
22009Review lection of security models of computer systemDevyanin P. N.305
62013Development of a DDoS-attack detection system using queuing theoryShcherba E. V., Volkov D.A.305
62013Pipelining of combinational circuitsPottosin Yu.V., Kardash S.N.305
72014The universal vulnerability exploitation platform for CTFZaytsev G. Y., Sviridov P. Y., Ivachev A. S.305
72014Sufficient conditions for local primitiveness of nonprimitive digraphsKyazhin S. N.305
12009Correct evaluation of alternatives weight coefficients in the method of analytical hierarchiesKolesnikova S. I.304
52012Cryptographic properties of block ciphers based on shift registersFomichev V. M., Koreneva A.M.304
52012Problems of almost threshold secret sharing schemesTitov S. S., Medvedev N. V.304
62013Parallelization of the decoding algorithm in video compression standard H.265/HEVCChernyak R. I.304
12009Discrete logarithm problem in subgroups of prime orderPankratova I. A.303
32010Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systemsGedike A. I., Yankovskaya A.E.303
52012Estimates for the number of boolean functions having affine or quadratic approximations with a given accuracySerov A. A., Zubkov A.M.303
52012A parallel algorithm for searching the minimum weight spanning tree on prefractal graphKochkarov A. A., Sennikova L. I.303
72014Reachability problem for continuous piece-wise-affine mappings of a circle having degree 2Kurganskyy O. M.303
72014The recognition of recurrent sequences generated by conservative functionsSergeeva O. E.303
82015Implementation of DNS rebindingMilovanov T. I.303
32010High-speed pseudorandom sequence generators based on cellular automataSukhinin B.M.300
92016On the full diversity of balls for graphsKutcenogaya E.P., Evdokimov A. A., Fedoryaeva T.I.300
12009Solving parallel equations over w-regular languagesYevtushenko N. V., Bushkov V. G299
52012Statistical independence of the boolean function superposition. IIPankratova I. A., Kolcheva O.L.299
62013On non-minimal perfect ciphersTitov S. S., Medvedeva N. V.299
72014An upper bound for the number of bent functions at the distance 2 from an arbitrary bent function in 2k variablesKolomeec N. A.299
72014On attractors in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.299
12009Approaches to security of computer systems with functionally or parametrically associated entitiesKolegov D.N.298
42011FPGA implementation of finite automata public key cryptosystemTrenkaev V.N., Kovalev D.S.298
52012Decomposition and approximation of underdetermined dataSholomov L. A.298
62013Algorithm for searching prohibitions of boolean functionsRyabokon D. V.298
42011Application of SAT-approach for solving combinatorial problemsSemenov A. A., Kochemazov S.E., Otpuschennikov I.V.297
42011On the uniqueness of exact vertex extensionsDolgov A. A., Abrosimov M.B.297
52012Latin squares and their applications in cryptographyTuzhilin M.E.297
52012Mathematical model of random generator based on ternary logicStolov E. L.297
12009Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access controlSmith I. V.296
12009Digital watermarks resistant to collusion attacksStruzhkov R.S., Chernyak R. I., Solovjev T.M.296
Страница 3 из 16 123456...16
Всего: 763