Issues

IssueYearTitleAuthorsDownloads
32010Software translating of combinatorial problems to propositional logicOtpuschennikov I. V., Semenov A. A.271
42011Computational aspects of treewidth for graphBykova V. V.271
82015Some structural properties of quadratic boolean threshold functionsShurupov A.N.271
12009Teaching the models of access and information flows management within discipline "Theoretical foundations of computer security"Devyanin P. N.270
12009Fault tolerant combinational circuit designOstanin S. A.270
32010On minimal edge k-extensions of oriented starsAbrosimov M.B.270
42011Description of the class of permutations, represented as a product of two ermutations with fixed number of mobile pointsPichkur A. B.270
52012Sufficient conditions for access rights stealing in DP-model of database management systemsSmolyaninov V. Y.270
52012On digraphs with a small number of arcs in a minimal 1-vertex extensionAbrosimov M. B, Modenova O. V.270
82015Attribute based access control for key-value storesOvsyannikov S.V., Trenkaev V.N.270
82015An upper bound for reliability of non-branching programs with an unreliable stop-operatorGrabovskaya S. M.270
102017Towards ABAC Engine frameworkBroslavsky O. V., Kolegov D. N., Oleksov N. E.270
12009Stream and finite automaton ciphersystemsPankratov I. V.269
12009On exact extensions of tournamentsDolgov A. A.269
42011Weakly central clones and completeness problem for themParvatov N. G.269
42011On some prefractal graphs propertiesBolurov N.N., Sennikova L.I, Kochkarov A. A.269
42011Compact graphs and the deterministic algorithm for their synthesisMelent'ev V.A.269
52012Structural properties of primitive systems of natural numbersFomichev V. M., Kjazhin S.N.269
52012Research of mandatory and role based access control in RSBAC systemSviridov P. Y.269
82015The programming-libraries management system for LYaPASSafonov V. O.269
12009Transformation of CNF via resolutionKhnykin I. G.268
42011Approaches to development of discretionary dp-model of the modern secure operating systemsProskurin V. G.268
52012Property of Kasami bent functions multiple derivativesFrolova A. A.268
52012Analysis of some program sources semantic aspects based on formal syntax and semantics specificationsSaukh A.M.268
62013Minimal edge extensions of special type palm treesKomarov D. D.268
62013Analysis of some algorithms for smooth integers recognitionTuktarova L.I., Arbuzov D. S.268
82015On the minimal distance graph connectivity for bent functionsKolomeec N. A.268
32010An analytical approach to the synthesis of regular structures of fault-tolerant systemsMelent'ev V. A.267
42011Mapping enlargements preserving identification propertyAndreeva L. N.267
62013GPU-based implementation of DPLL algorithm with limited non-chronological backtrackingBulavintsev V.G., Semenov A. A.267
82015The capacity of a packet length covert channelKogos K. G., Epishkina A. V.267
12009The generalized automorphisms of Reed-Muller code and McEliece-Sidelnikov public key cryptosystem.Chizhov I. V.266
32010About time information flows in computer systemsKachanov M. A.266
42011Discrete logarithm diophantinessErofeev S. Y.266
52012About McEliece cryptosystem with algebraicgeometric CodesGlukhov M. M.-jr.266
62013About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented pathModenova O. V., Abrosimov M. B266
72014On a counterexample for a T-irreducible extensions of star-like treesOsipov D. U.266
32010Telectronic mail systems access control and information flow control modelingGrishchenko K. A.265
52012Mass updates on multidimensional dataBannykh A. G.265
82015On the number of symmetric coordinate functions of apn functionVitkup V.A.265
12009Analitic approach to context-free languages in the greibach normal formEgorushkin O.I., Safonov K. V.264
12009Software errors search in complex data processing algorithmsMakarov A. N.264
32010Connections between subspaces on which bent function and its dual function are affine.Kolomeec N. A.264
42011Role-based security model of SELinux computer systemKachanov M. A.264
52012Involutions numerationPoteryaeva V.A., Andreeva L.N264
72014On generalizations of markov's approach to research of block ciphersPudovkina M. A., Pogorelov B. A.264
72014Principles of associative steganographyVershinin I. S.264
32010Security analysis of systems with simple trajectories functioning within framework of the base role dp-modelDevyanin P. N.263
42011Statistical independence of the boolean function superpositionKolcheva O.L., Pankratova I. A.263
42011A denotational semantics for the aspecttalk programming languageStephantsov D.A., Kryukova A. E.263
Страница 6 из 16 1...345678910...16
Всего: 763