Issues

IssueYearTitleAuthorsDownloads
12009Analysis of network safety with Markov 's chainsKuhnir V.P., Kirko I.N.305
32010Teaching the protected computer nets design at the Cisco platformKolegov D. N.305
52012Decomposition of a boolean function into sum of bent functionsTokareva N. N.305
72014On some open questions about apn functionsVitkup V.A.305
72014Unreliability of circuits in the basis by Rosser - TurkettBarsukova O. U., Alekhina M.A.305
12009Argument of knowledge of a Goppa codeword and of a bounded errorFedyukovych V. E.304
32010Cryptanalysis with graphical processing units (GPU )Bespalov D. V., Semenov A. A., Bulavintsev V. G304
62013Modification of compiled applications for the android platform by means of aspect-oriented programmingPotapkin A.I, Zaytsev G. Yu, Stefantsov D. A.304
62013On local primitiveness of graphs and nonnega-tive matricesKyazhin S. N.304
42011The security model for cross-platform web services of municipal procurement supportKononov D.D, Isaev S. V.302
72014Some properties of q-ary bent functionsShishkin V. A.302
72014Boolean functions generated by the most significant bits of linear recurrent sequencesBylkov D.N.302
72014The universal vulnerability exploitation platform for CTFIvachev A. S., Zaytsev G. Y., Sviridov P. Y.302
72014About basises with unreliability coefficient 5Vasin A. V.302
72014Formalization of combinatorial numbers in terms of entire solutions of systems of linear diophan-tine equationsGotsulenko V. V.302
12009The method for secure video streaming over distributed networksShcherba E. V.301
42011Minimal extensions for cycles with vertices of two typesBondarenko P.P., Abrosimov M.B.301
62013Development of a DDoS-attack detection system using queuing theoryShcherba E. V., Volkov D.A.301
62013Pipelining of combinational circuitsKardash S.N., Pottosin Yu.V.301
12009Correct evaluation of alternatives weight coefficients in the method of analytical hierarchiesKolesnikova S. I.300
32010Logical inference on the base of optimal subset of mixed diagnostic tests for intelligent systemsGedike A. I., Yankovskaya A.E.300
52012Estimates for the number of boolean functions having affine or quadratic approximations with a given accuracySerov A. A., Zubkov A.M.300
52012Cryptographic properties of block ciphers based on shift registersKoreneva A.M., Fomichev V. M.300
62013Parallelization of the decoding algorithm in video compression standard H.265/HEVCChernyak R. I.300
72014Sufficient conditions for local primitiveness of nonprimitive digraphsKyazhin S. N.300
82015Implementation of DNS rebindingMilovanov T. I.300
12009Discrete logarithm problem in subgroups of prime orderPankratova I. A.299
52012Problems of almost threshold secret sharing schemesTitov S. S., Medvedev N. V.299
52012A parallel algorithm for searching the minimum weight spanning tree on prefractal graphKochkarov A. A., Sennikova L. I.299
72014The recognition of recurrent sequences generated by conservative functionsSergeeva O. E.299
72014Reachability problem for continuous piece-wise-affine mappings of a circle having degree 2Kurganskyy O. M.298
72014Covert timing channel over HTTP cache-control headersKolegov D.N., Oleksov N. E., Broslavsky O.V.298
12009Solving parallel equations over w-regular languagesYevtushenko N. V., Bushkov V. G296
32010High-speed pseudorandom sequence generators based on cellular automataSukhinin B.M.296
92016On the full diversity of balls for graphsKutcenogaya E.P., Evdokimov A. A., Fedoryaeva T.I.296
52012Statistical independence of the boolean function superposition. IIPankratova I. A., Kolcheva O.L.295
62013On non-minimal perfect ciphersTitov S. S., Medvedeva N. V.295
62013Algorithm for searching prohibitions of boolean functionsRyabokon D. V.295
72014An upper bound for the number of bent functions at the distance 2 from an arbitrary bent function in 2k variablesKolomeec N. A.295
72014On attractors in finite dynamic systems of binary vectors associated with palms orientationsZharkova A. V.295
12009Approaches to security of computer systems with functionally or parametrically associated entitiesKolegov D.N.294
22009Review lection of security models of computer systemDevyanin P. N.294
42011FPGA implementation of finite automata public key cryptosystemTrenkaev V.N., Kovalev D.S.294
42011On the uniqueness of exact vertex extensionsAbrosimov M.B., Dolgov A. A.294
52012Decomposition and approximation of underdetermined dataSholomov L. A.294
32010On the frame of an automatonSalii V. N.293
42011Application of SAT-approach for solving combinatorial problemsKochemazov S.E., Otpuschennikov I.V., Semenov A. A.293
52012Latin squares and their applications in cryptographyTuzhilin M.E.293
52012Mathematical model of random generator based on ternary logicStolov E. L.293
12009Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access controlSmith I. V.292
Страница 3 из 16 123456...16
Всего: 763