RUS  ENG
Full version
PEOPLE

Kolegov Denis Nikolaevich

Publications in Math-Net.Ru

  1. WireGuard protocol with GOST cipher suites

    Prikl. Diskr. Mat. Suppl., 2021, no. 14,  81–84
  2. Threshold Diffie — Hellman Protocol

    Prikl. Diskr. Mat. Suppl., 2021, no. 14,  79–81
  3. Towards ABAC Engine framework

    Prikl. Diskr. Mat. Suppl., 2017, no. 10,  115–120
  4. Lightweight implementation of ABAC mechanism on Database Firewall

    Prikl. Diskr. Mat. Suppl., 2016, no. 9,  93–95
  5. Web application firewalls identification in MitB-model

    Prikl. Diskr. Mat. Suppl., 2016, no. 9,  92–93
  6. HMAC obfuscation method for implementation in untrusted systems

    Prikl. Diskr. Mat. Suppl., 2016, no. 9,  89–91
  7. Hooked-browser network with BeEF and Google Drive

    Prikl. Diskr. Mat., 2015, no. 4(30),  72–76
  8. Covert timing channels over HTTP cache-control headers

    Prikl. Diskr. Mat., 2015, no. 2(28),  71–85
  9. Non-invasive method of mandatory access control implementaion on DBMS layer in web applications

    Prikl. Diskr. Mat. Suppl., 2015, no. 8,  89–92
  10. Non-invasive integrity control method for cookie in web applications

    Prikl. Diskr. Mat. Suppl., 2015, no. 8,  85–89
  11. Implementation of covert timing channels based on HTTP cache headers in cloud file storage services

    Prikl. Diskr. Mat. Suppl., 2015, no. 8,  83–85
  12. Covert timing channel over HTTP cache-control headers

    Prikl. Diskr. Mat. Suppl., 2014, no. 7,  89–91
  13. General method for HTTP messages authentication based on hash functions in web applications

    Prikl. Diskr. Mat. Suppl., 2014, no. 7,  85–89
  14. Development and implementation of mandatory access control mechanisms in DBMS MySQL

    Prikl. Diskr. Mat. Suppl., 2013, no. 6,  62–67
  15. Hierarchical role-based access control development

    Prikl. Diskr. Mat., 2012, no. 3(17),  70–76
  16. “Network security architectures fundamentals” laboratory practice in Cisco Packet Tracer

    Prikl. Diskr. Mat. Suppl., 2012, no. 5,  71–73
  17. Hierarchical role-based access control

    Prikl. Diskr. Mat. Suppl., 2012, no. 5,  69–71
  18. The development feutures of network access control DP-model

    Prikl. Diskr. Mat., 2011, no. supplement № 4,  46–48
  19. Teaching the protected computer nets design at the Cisco platform

    Prikl. Diskr. Mat., 2010, no. supplement № 3,  53–55
  20. Approaches to security of computer systems with functionally or parametrically associated entities

    Prikl. Diskr. Mat., 2009, no. supplement № 1,  44–46
  21. Modeling network computer systems with vulnerabilities

    Prikl. Diskr. Mat., 2009, no. 3(5),  91–99
  22. Security analysis of the information flows by memory in the computer systems with functional and parametric associated entities

    Prikl. Diskr. Mat., 2009, no. 1(3),  117–125
  23. Usage formal models for vulnerability analysis

    Prikl. Diskr. Mat., 2009, no. 1(3),  113–116
  24. About the CTF – computer security competitions

    Prikl. Diskr. Mat., 2008, no. 2(2),  81–83
  25. Security linux extension based on system calls interposition

    Prikl. Diskr. Mat., 2008, no. 2(2),  76–80
  26. DP-model application for network security analysis

    Prikl. Diskr. Mat., 2008, no. 1(1),  71–87

  27. The Seventh International Olympiad in Cryptography: problems and solutions

    Sib. Èlektron. Mat. Izv., 18:2 (2021),  4–29


© Steklov Math. Inst. of RAS, 2026