№11 (112), November 2010.

.
Y.A. Bryukhomitsky, O.B. Makarevich REVIEW OF RESEARCH AND DEVELOPMENT INFORMATION SECURITY based on reports XI International Scientific and Practical Conference "Information Security"
SECTION I. SECURITY OF COMPLEX FACILITIES
A.S. Mosolov, O.V. Grafova, A.V. Kashev REVIEW OF EUROPEAN PATENTS FOR METHODS OF SECURITY SYSTEM DESIGN
A.S. Kirienko, E.A. Mironov, A.S. Mosolov VERIFICATION OF VIDEO SURVEILLANCE SYSTEM
E.S. Stepanova, I.V. Mashkina, V.I. Vasilev DEVELOPMENT OF THREATS MODEL ON THE BASIS OF FUZZY COGNITIVE MAPS CONTRACTION FOR INFORMATION RISK NUMERICAL ESTIMATION
O.M. Lepeshkin WAYS SELECTION METHOD OF FUNCTIONAL SAFETY MECHANISMS REALIZATION FOR CRITICAL SOCIOTEHNICAL SYSTEMS ON THE BASIS OF RADICALS
V.Т. Kornienko APPLICATION OF ACOUSTIC HOLOGRAPHY IN TELEVISION SECUTITY SYSTEMS
SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Y.A. Bryukhomitsky HISTOGRAM RECOGNITION KEYBOARD WRITING STYLE
V.M. Fedorov, D.P. Rublev, E.M. Panchenko, O.B. Makarevich IDENTIFICATION OF CD/DVD RECORDING DEVICES BASED ON VIBROACOUSTIC NOISE
I.Yu. Polovko, E.S. Abramov MATHEMATICAL MODEL OF INTRUSION-TOLERANT SECURITY SYSTEM ARCHITECTURE
N.E. Gorlo, O.Yu. Peskova APPROACHES TO THE CONSTRUCTION OF PROTECTED CONTENT MANAGEMENT SYSTEM
M.L. Lopatin, O.Yu. Peskova SECURITY ANALYSIS OF CURRENT SYSTEM CONTENT MANAGEMENT
SECTION III. SECURITY OF TELECOMMUNICATIONS
I.A. Kirichenko, P.P. Pivnev, I.B. Starchenko TO THE QUESTION OF DATA TRANSMISSION SECURITY ON WAVEGUIDE IN THE SEA MEDIUM WITH DISPERSION
Е.A. Pakulova SWITCHING CRITERIONS IN VERTICAL HANDOVER TASKS IN MONITORING SYSTEM OF MOBILE AND FIXED OBJECTS
SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Y.V. Kosolapov, E.S. Chekunov SYMMETRIC CRYPTOSYSTEMS BASED ON ERROR CORRECTION CODES IN Φ-METRICS
V.V. Mkrtichan BROADCAST ENCRYPTION SCHEME BASED ON SOME CONCATENATED CODES, RESEARCH OF BOUND OF THE SCHEME APPLYING
S.V. Minakov, O.A. Finko INCREASING TO VALIDITY OF KEEPING AND ISSUES PRIMARY TEXT ON BASE HYBRID SEMANTICS-CODE REDUNDANCY
D.V. Samoylenko, О.А. Finko NOISE-IMMUNITY CRYPTOSYSTEM BASED ON THE CHINESE REMAINDER THEOREM, FOR N NOISE CHANNELS AND SIMULATES A CRACKER
A.K. Vishnevsky, V.A. Sharai REALIZATION OF OPERATION OF SUBSTITUTION BY THE LINEAR NUMERICAL POLYNOMS
S.E. Bardaev MULTIFACTOR BIOMETRIC THRESHOLD CRYPTOSYSTEM
R.V. Oliynykov, V.I. Ruzhentsev A NEW APPROACH OF KEY SCHEDULE CONSTRUCTION FOR SYMMETRIC BLOCK CIPHERS
A.T. Aliev LINGUISTIC STEGANOGRAPHY METHODS BASED ON THE SYNONYMOUS SUBSTITUTION FOR TEXTS IN RUSSIAN
A.F. Chipiga THE SUBSTANTIATION OF A POSSIBILITY TO MAINTAIN CONFIDENTIALITY IN SYMMETRIC CRYPTOSYSTEMS IN CASE OF A COMPROMISE OF AN ENCRYPTION KEY
I.V. Nechta, A.N. Fionov DIGITAL WATERMARKS FOR C/C++ PROGRAMS
E.Yu. Eltysheva, A.N. Fionov STEGOSYSTEM CONSTRUCTION FOR THE RASTER IMAGES BY THE PERMUTATION METHOD
V.A. Mikheev, M.M. Repin DEVELOPMENT OF STEGANOGRAPHIC MESAGGES INTEGRATED PROTECTION ALGORITHM
V.A. Mikheev, M.M. Repin THE INVESTIGATION OF POSSIBLE ATTACKS ON CPSM
L.K. Babenko, E.A. Ischukova DIFFERENTIAL CRYPTANALYSIS OF SHA-LIKE HASH FUNCTIONS
L.K. Babenko, I.D. Sidorov, A.S. Kirillov SPEEDING UP DISCRETE LOG COMPUTATIONS USING CUDA TECHNOLOGY
SECTION V. APPLICATIONS OF INFORMATION SECURITY
O.O. Varlamov, R.A. Sandu, A.N. Vladimirov, A.V. Nosov, M.L. Overchuk MIVAR APPROACH TO CREATION MULTIPREDMETNYH ACTIVE EXPERT SYSTEMS FOR TEACHING INFORMATION SECURITY AND MANAGEMENT INNOVATIVE RESOURCES IN EDUCATION
A.V. Nepomnyashchiy, N.A. Poznina PROSPECTS OF INFORMATION SAFETY OF THE PERSON INCREASING BY THE DEVELOPMENT OF CONSCIOUSNESS
V.A. Pozdnyakov PROPERTIES AND METHODS OF PROCESSING OF THE INFORMATION IN COMPETITIVE INVESTIGATION
A.F. Chipiga, V.S. Peleshenko, A.S. Babanin APPROACH TO CONTROL OF THE INTERNET BY NETWORK TRAFFIC FILTERING TO PROTECT CHILDREN FROM INFORMATION DAMAGING THEIR HEALTH AND DEVELOPMENT