Issues

IssueYearTitleAuthorsDownloads
82015NSUCRYPTO - a student's olympiad in cryptography: an idea, realization and resultsTokareva N. N.271
12009Fault tolerant combinational circuit designOstanin S. A.270
42011Description of the class of permutations, represented as a product of two ermutations with fixed number of mobile pointsPichkur A. B.270
42011Computational aspects of treewidth for graphBykova V. V.270
52012Sufficient conditions for access rights stealing in DP-model of database management systemsSmolyaninov V. Y.270
82015Some structural properties of quadratic boolean threshold functionsShurupov A.N.270
82015Attribute based access control for key-value storesOvsyannikov S.V., Trenkaev V.N.270
82015An upper bound for reliability of non-branching programs with an unreliable stop-operatorGrabovskaya S. M.270
12009Stream and finite automaton ciphersystemsPankratov I. V.269
12009Teaching the models of access and information flows management within discipline "Theoretical foundations of computer security"Devyanin P. N.269
12009On exact extensions of tournamentsDolgov A. A.269
32010On minimal edge k-extensions of oriented starsAbrosimov M.B.269
42011Compact graphs and the deterministic algorithm for their synthesisMelent'ev V.A.269
52012Structural properties of primitive systems of natural numbersKjazhin S.N., Fomichev V. M.269
52012Research of mandatory and role based access control in RSBAC systemSviridov P. Y.269
52012On digraphs with a small number of arcs in a minimal 1-vertex extensionModenova O. V., Abrosimov M. B269
102017Towards ABAC Engine frameworkKolegov D. N., Oleksov N. E., Broslavsky O. V.269
12009Transformation of CNF via resolutionKhnykin I. G.268
42011Weakly central clones and completeness problem for themParvatov N. G.268
52012Analysis of some program sources semantic aspects based on formal syntax and semantics specificationsSaukh A.M.268
62013Minimal edge extensions of special type palm treesKomarov D. D.268
62013Analysis of some algorithms for smooth integers recognitionTuktarova L.I., Arbuzov D. S.268
82015The programming-libraries management system for LYaPASSafonov V. O.268
42011Mapping enlargements preserving identification propertyAndreeva L. N.267
42011Approaches to development of discretionary dp-model of the modern secure operating systemsProskurin V. G.267
42011On some prefractal graphs propertiesSennikova L.I, Kochkarov A. A., Bolurov N.N.267
52012Property of Kasami bent functions multiple derivativesFrolova A. A.267
82015On the minimal distance graph connectivity for bent functionsKolomeec N. A.267
82015The capacity of a packet length covert channelEpishkina A. V., Kogos K. G.267
12009The generalized automorphisms of Reed-Muller code and McEliece-Sidelnikov public key cryptosystem.Chizhov I. V.266
32010About time information flows in computer systemsKachanov M. A.266
32010An analytical approach to the synthesis of regular structures of fault-tolerant systemsMelent'ev V. A.266
52012About McEliece cryptosystem with algebraicgeometric CodesGlukhov M. M.-jr.266
62013About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented pathModenova O. V., Abrosimov M. B266
62013GPU-based implementation of DPLL algorithm with limited non-chronological backtrackingSemenov A. A., Bulavintsev V.G.266
72014On a counterexample for a T-irreducible extensions of star-like treesOsipov D. U.266
42011Discrete logarithm diophantinessErofeev S. Y.265
52012Mass updates on multidimensional dataBannykh A. G.265
82015On the number of symmetric coordinate functions of apn functionVitkup V.A.265
12009Analitic approach to context-free languages in the greibach normal formSafonov K. V., Egorushkin O.I.264
32010Connections between subspaces on which bent function and its dual function are affine.Kolomeec N. A.264
32010Telectronic mail systems access control and information flow control modelingGrishchenko K. A.264
72014Principles of associative steganographyVershinin I. S.264
12009Software errors search in complex data processing algorithmsMakarov A. N.263
42011Statistical independence of the boolean function superpositionPankratova I. A., Kolcheva O.L.263
42011Role-based security model of SELinux computer systemKachanov M. A.263
52012Involutions numerationPoteryaeva V.A., Andreeva L.N263
62013An economical representation of underdeter-mined data and superimposed codesSholomov L. A.263
72014On generalizations of markov's approach to research of block ciphersPudovkina M. A., Pogorelov B. A.263
82015Research of the group of bijective differen-tiable modulo p functionsIvachev A. S.263
Страница 6 из 16 1...345678910...16
Всего: 763