8 | 2015 | NSUCRYPTO - a student's olympiad in cryptography: an idea, realization and results | Tokareva N. N. | 271 |
1 | 2009 | Fault tolerant combinational circuit design | Ostanin S. A. | 270 |
4 | 2011 | Description of the class of permutations, represented as a product of two ermutations with fixed number of mobile points | Pichkur A. B. | 270 |
4 | 2011 | Computational aspects of treewidth for graph | Bykova V. V. | 270 |
5 | 2012 | Sufficient conditions for access rights stealing in DP-model of database management systems | Smolyaninov V. Y. | 270 |
8 | 2015 | Some structural properties of quadratic boolean threshold functions | Shurupov A.N. | 270 |
8 | 2015 | Attribute based access control for key-value stores | Ovsyannikov S.V., Trenkaev V.N. | 270 |
8 | 2015 | An upper bound for reliability of non-branching programs with an unreliable stop-operator | Grabovskaya S. M. | 270 |
1 | 2009 | Stream and finite automaton ciphersystems | Pankratov I. V. | 269 |
1 | 2009 | Teaching the models of access and information flows management within discipline "Theoretical foundations of computer security" | Devyanin P. N. | 269 |
1 | 2009 | On exact extensions of tournaments | Dolgov A. A. | 269 |
3 | 2010 | On minimal edge k-extensions of oriented stars | Abrosimov M.B. | 269 |
4 | 2011 | Compact graphs and the deterministic algorithm for their synthesis | Melent'ev V.A. | 269 |
5 | 2012 | Structural properties of primitive systems of natural numbers | Kjazhin S.N., Fomichev V. M. | 269 |
5 | 2012 | Research of mandatory and role based access control in RSBAC system | Sviridov P. Y. | 269 |
5 | 2012 | On digraphs with a small number of arcs in a minimal 1-vertex extension | Modenova O. V., Abrosimov M. B | 269 |
10 | 2017 | Towards ABAC Engine framework | Kolegov D. N., Oleksov N. E., Broslavsky O. V. | 269 |
1 | 2009 | Transformation of CNF via resolution | Khnykin I. G. | 268 |
4 | 2011 | Weakly central clones and completeness problem for them | Parvatov N. G. | 268 |
5 | 2012 | Analysis of some program sources semantic aspects based on formal syntax and semantics specifications | Saukh A.M. | 268 |
6 | 2013 | Minimal edge extensions of special type palm trees | Komarov D. D. | 268 |
6 | 2013 | Analysis of some algorithms for smooth integers recognition | Tuktarova L.I., Arbuzov D. S. | 268 |
8 | 2015 | The programming-libraries management system for LYaPAS | Safonov V. O. | 268 |
4 | 2011 | Mapping enlargements preserving identification property | Andreeva L. N. | 267 |
4 | 2011 | Approaches to development of discretionary dp-model of the modern secure operating systems | Proskurin V. G. | 267 |
4 | 2011 | On some prefractal graphs properties | Sennikova L.I, Kochkarov A. A., Bolurov N.N. | 267 |
5 | 2012 | Property of Kasami bent functions multiple derivatives | Frolova A. A. | 267 |
8 | 2015 | On the minimal distance graph connectivity for bent functions | Kolomeec N. A. | 267 |
8 | 2015 | The capacity of a packet length covert channel | Epishkina A. V., Kogos K. G. | 267 |
1 | 2009 | The generalized automorphisms of Reed-Muller code and McEliece-Sidelnikov public key cryptosystem. | Chizhov I. V. | 266 |
3 | 2010 | About time information flows in computer systems | Kachanov M. A. | 266 |
3 | 2010 | An analytical approach to the synthesis of regular structures of fault-tolerant systems | Melent'ev V. A. | 266 |
5 | 2012 | About McEliece cryptosystem with algebraicgeometric Codes | Glukhov M. M.-jr. | 266 |
6 | 2013 | About the lower bounds for the number of additional arcs in a minimal vertex 1-extension of oriented path | Modenova O. V., Abrosimov M. B | 266 |
6 | 2013 | GPU-based implementation of DPLL algorithm with limited non-chronological backtracking | Semenov A. A., Bulavintsev V.G. | 266 |
7 | 2014 | On a counterexample for a T-irreducible extensions of star-like trees | Osipov D. U. | 266 |
4 | 2011 | Discrete logarithm diophantiness | Erofeev S. Y. | 265 |
5 | 2012 | Mass updates on multidimensional data | Bannykh A. G. | 265 |
8 | 2015 | On the number of symmetric coordinate functions of apn function | Vitkup V.A. | 265 |
1 | 2009 | Analitic approach to context-free languages in the greibach normal form | Safonov K. V., Egorushkin O.I. | 264 |
3 | 2010 | Connections between subspaces on which bent function and its dual function are affine. | Kolomeec N. A. | 264 |
3 | 2010 | Telectronic mail systems access control and information flow control modeling | Grishchenko K. A. | 264 |
7 | 2014 | Principles of associative steganography | Vershinin I. S. | 264 |
1 | 2009 | Software errors search in complex data processing algorithms | Makarov A. N. | 263 |
4 | 2011 | Statistical independence of the boolean function superposition | Pankratova I. A., Kolcheva O.L. | 263 |
4 | 2011 | Role-based security model of SELinux computer system | Kachanov M. A. | 263 |
5 | 2012 | Involutions numeration | Poteryaeva V.A., Andreeva L.N | 263 |
6 | 2013 | An economical representation of underdeter-mined data and superimposed codes | Sholomov L. A. | 263 |
7 | 2014 | On generalizations of markov's approach to research of block ciphers | Pudovkina M. A., Pogorelov B. A. | 263 |
8 | 2015 | Research of the group of bijective differen-tiable modulo p functions | Ivachev A. S. | 263 |